HYBRID MESH-BASED FOLDABLE DISPLAY BACKING
    1.
    发明公开

    公开(公告)号:US20240365653A1

    公开(公告)日:2024-10-31

    申请号:US18685975

    申请日:2022-08-24

    申请人: GOOGLE LLC

    摘要: A foldable display device includes: a foldable display layer, and a backing film coupled to the display layer. The backing film has a stiffness in a first direction parallel to a bending axis of a plane of the display layer that is at least ten times higher than a stiffness of the backing film in a second direction perpendicular to the bending axis in the plane of the display layer. The backing film includes a plurality of metal fibers arranged parallel to each other in the first direction and a film that mechanically couples the plurality of metal fibers to each other and that mechanically couples the plurality of metal fibers to the display layer, where the film includes material that has a modulus of elasticity that is less than 3% of a modulus of elasticity of a material of the plurality of metal fibers.

    METHOD FOR IDENTIFYING NEW AUDIENCES FOR CONTENT OF A CONTENT PROVIDER

    公开(公告)号:US20240364441A1

    公开(公告)日:2024-10-31

    申请号:US18766528

    申请日:2024-07-08

    申请人: Google LLC

    摘要: A method is disclosed for providing, for display to a content provider, a user interface (UI) indicating one or more characteristics of existing audiences including a plurality of users currently designated to receive content of the content provider, the UI comprising a new audiences UI element selectable to view new audiences to be added to the existing audiences, receiving a user selection of the new audiences UI element, and in response to the user selection of the new audiences UI element, predicting, using a machine learning model, an increase in a number of user actions related to the content of the content provider in response to an addition of the new audiences to the existing audiences, and causing display of information identifying the new audiences, and an indication of the predicted increased number of user actions related to the content of the content provider in response to the addition of the new audiences to the existing audiences.

    TRAIN-ONCE-FOR-ALL PERSONALIZATION
    4.
    发明公开

    公开(公告)号:US20240362460A1

    公开(公告)日:2024-10-31

    申请号:US18626833

    申请日:2024-04-04

    申请人: Google LLC

    IPC分类号: G06N3/0455 G06N3/084

    CPC分类号: G06N3/0455 G06N3/084

    摘要: The technology relates to providing personalized neural network-based models according to user input, which can be generated upon request or otherwise as needed. This may include receiving, by one or more processors of a computing device, input corresponding to a task description. Then the input corresponding to the task description is encoded into a set of text embeddings. Based on this, the system applies mixer prediction to the set of text embeddings to generate a set of mixers and learns a set of basis models according to the set of mixers. The set of basis models are combined to form a single personalized model corresponding to the task description. This personalized model can then be used in video understanding, quality assessment, providing a recommendation, performing a classification, or performing a search.

    Gamification through Threat Hunt Packs and/or Threat Hunting Functions

    公开(公告)号:US20240362323A1

    公开(公告)日:2024-10-31

    申请号:US18309392

    申请日:2023-04-28

    申请人: Google LLC

    IPC分类号: G06F21/55

    CPC分类号: G06F21/554 G06F2221/034

    摘要: A non-transitory storage medium includes logic associated with a cybersecurity threat hunting system. Upon execution, the logic analyzes input event data to detect whether the input event data constitutes a cyberthreat. The logic includes a function evaluator, which is configured to extract features from the input event data that is relevant, based on experiential knowledge or past analyses, for use in determining whether one or more cyberthreats are associated with the input event data. The function evaluator includes one or more hunt packs, each of the one or more hunt packs includes one or more hunting functions, and each hunting function of the one or more hunting functions is configured to analyze the input event data received from at least one cybersecurity source.

    Enterprise Application Query Enrichment For Language Models

    公开(公告)号:US20240362257A1

    公开(公告)日:2024-10-31

    申请号:US18531159

    申请日:2023-12-06

    申请人: Google LLC

    IPC分类号: G06F16/33

    CPC分类号: G06F16/334

    摘要: The technology described herein is directed to generating prompts for a language model, such as a large language model. In this regard, an enterprise interpretation model may receive a request for assistance with an enterprise application record. In response to receiving the request for assistance, the enterprise interpretation model may determine data corresponding to the record. Based on the determined data, the enterprise interpretation model may generate a query corresponding to the record. The query may include at least a subset of the data corresponding to the record. The query may then be provided to the language model for a response to be generated.

    Read-Only Memory (ROM) Security
    10.
    发明公开

    公开(公告)号:US20240361923A1

    公开(公告)日:2024-10-31

    申请号:US18553488

    申请日:2022-04-01

    申请人: Google LLC

    IPC分类号: G06F3/06

    摘要: An apparatus with an integrated circuit (IC) chip can provide protection against attacks on a read-only memory (ROM), such as a boot ROM for security circuitry. An attacker can gain control of an IC by modifying ROM contents and/or redirecting ROM reads. To combat these attacks, example implementations store encrypted ROM data in the ROM array. A ROM controller is used to cryptographically tie the address of each ROM line to the corresponding encrypted ROM datum. To access the encrypted ROM datum, cryptographic circuitry decrypts the encrypted ROM datum using a key that is generated based on the corresponding ROM address. As part of an integrity checking procedure, a digest can be computed based on the encrypted ROM data. To further thwart would-be attacks, the ROM address can be adjusted (e.g., scrambled) before the controller uses the adjusted address to read encrypted data from the ROM array.