摘要:
A method and system for mapping network attacks onto a strategy game is presented. A log file generated by network security monitoring tools is received by a transformer. The log file is transformed by the transformer into a set of characters with associated action inputs, such that each of the characters is associated with an action input.
摘要:
In accordance with some embodiments, multiple navigation changes to a navigation system may be managed. The navigation system may receive and first set of navigation changes. Then, the navigation system may establish communication with a user device. The navigation system may then receive a second set of navigation changes associated with the user device. As a result, the navigation system may merge the first set of navigation changes with the second set of navigation changes.
摘要:
A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated with a vehicle; configuring a bus controller to verify authenticity of the message filtering rule, wherein the bus controller is programmed through an interface, the interface inaccessible from the host processor; filtering messages from the host processor using the verified message filtering rule, wherein the filtering is performed by the bus controller; and transmitting the filtered messages from the bus controller over a bus to one or more electronic control units (ECUs), the ECUs communicatively coupled to the bus.
摘要:
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc.
摘要:
In accordance with some embodiments, an automated system may be implemented in which alerts to drivers are automatically distributed and implemented at the driver's vehicle. Thus, in some embodiments, no involvement by the driver is needed and everything may be done in an automated fashion including filtering alerts and responding to alerts. In some embodiments, each vehicle need not provide its current location to the Amber Alert System, providing greater privacy in some cases.
摘要:
An apparatus, system, and method to identify a region of an image including a barcode based on, at least in part, an entity specific feature associated with the barcode; detect a codeword boundary for the barcode based on, at least in part, an adaptive boundary determination mechanism; and decode the codeword based on, at least in part, a plurality of metrics associated with the entity.
摘要:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
摘要:
Speech recognition is performed utilizing a dynamically maintained set of grammar elements. A plurality of grammar elements may be identified, and the grammar elements may be ordered based at least in part upon contextual information. In other words, contextual information may be utilized to bias speech recognition. Once a speech input is received, the ordered plurality of grammar elements may be evaluated, and a correspondence between the received speech input and a grammar element included in the plurality of grammar elements may be determined.
摘要:
In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed. Moreover, in some cases, the information that is to be collected, the collection sources, and the handling of the data may be specified after the processor-based devices have already been deployed.
摘要:
Techniques and mechanisms for generating image data representing a storage region in a commercial establishment. In an embodiment, image recognition analysis of first image data detects a difference between respective states of inventory storage represented by different areas of a captured image. In another embodiment, other image data is generated to represent a modified version of the image, wherein, based on the detected difference, a filter is applied to only one two portions of the first image data.