Virtual Machine Orchestration Spoofing Attack Mitigation

    公开(公告)号:US20220342987A1

    公开(公告)日:2022-10-27

    申请号:US17236136

    申请日:2021-04-21

    Abstract: The concepts and technologies disclosed herein are directed to virtual machine (“VM”) orchestration spoofing attack mitigation. According to one aspect disclosed herein, an anti-spoofing controller (“ASC”) can determine a target memory location in which to instantiate a new VM. The ASC can determine a challenge for a physically unclonable function (“PUF”) associated with the target memory location. The ASC can provide the challenge to the PUF, and in response, can receive and store an output value from the PUF. The ASC can instruct an orchestrator to instantiate the new VM in the target memory location. The ASC can provide the challenge to the new VM, which can forward the challenge to the orchestrator. The ASC can receive, from the orchestrator, a response to the challenge, and can determine whether the response passes the challenge. If the response does not pass the challenge, the ASC can decommission the orchestrator.

    Facilitating detection, processing and display of combination of visible and near non-visible light
    2.
    发明授权
    Facilitating detection, processing and display of combination of visible and near non-visible light 有权
    促进可见光和近乎不可见光的组合的检测,处理和显示

    公开(公告)号:US09591234B2

    公开(公告)日:2017-03-07

    申请号:US13971520

    申请日:2013-08-20

    Inventor: Dylan C. Reid

    CPC classification number: H04N5/2356 H04N5/2354 H04N5/30 H04N5/332

    Abstract: A digital camera accesses, processes and displays a combination image composed of visible light and near non-visible (“NNV”) light. A method can include accessing, by a digital camera, raw data having first information associated with a first electromagnetic spectrum range and second information associated with a second electromagnetic spectrum range. The first electromagnetic spectrum range is substantially within the visible spectrum and the second electromagnetic spectrum range is substantially within the NNV spectrum. The method can also include optimizing the raw data for the visible spectrum, thereby generating a first visual image representation, and optimizing the raw data for the NNV spectrum, thereby generating a second visual image representation. The method can also include combining the first visual image representation and the second visual image representation to generate a combination image. The digital camera can then initiate the display of the combination image.

    Abstract translation: 数码相机访问,处理和显示由可见光和近乎不可见(“NNV”)光组成的组合图像。 一种方法可以包括通过数字相机访问具有与第一电磁频谱范围相关联的第一信息的原始数据和与第二电磁频谱范围相关联的第二信息。 第一电磁光谱范围基本上在可见光谱范围内,第二电磁光谱范围基本上在NNV光谱内。 该方法还可以包括优化可见光谱的原始数据,从而生成第一视觉图像表示,并优化NNV谱的原始数据,从而生成第二视觉图像表示。 该方法还可以包括组合第一视觉图像表示和第二视觉图像表示以生成组合图像。 然后,数码相机可以启动组合图像的显示。

    AUTONOMOUS VEHICLE SENSOR SECURITY SYSTEM
    3.
    发明公开

    公开(公告)号:US20230251653A1

    公开(公告)日:2023-08-10

    申请号:US18301295

    申请日:2023-04-17

    Abstract: Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

    Facilitating detection, processing and display of combination of visible and near non-visible light

    公开(公告)号:US10523877B2

    公开(公告)日:2019-12-31

    申请号:US15966062

    申请日:2018-04-30

    Inventor: Dylan C. Reid

    Abstract: A digital camera accesses, processes and displays a combination image composed of visible light and near non-visible (“NNV”) light. A method can include accessing, by a digital camera, raw data having first information associated with a first electromagnetic spectrum range and second information associated with a second electromagnetic spectrum range. The first electromagnetic spectrum range is substantially within the visible spectrum and the second electromagnetic spectrum range is substantially within the NNV spectrum. The method can also include optimizing the raw data for the visible spectrum, thereby generating a first visual image representation, and optimizing the raw data for the NNV spectrum, thereby generating a second visual image representation. The method can also include combining the first visual image representation and the second visual image representation to generate a combination image. The digital camera can then initiate the display of the combination image.

    Facilitating detection, processing and display of combination of visible and near non-visible light

    公开(公告)号:US09992427B2

    公开(公告)日:2018-06-05

    申请号:US15412322

    申请日:2017-01-23

    Inventor: Dylan C. Reid

    CPC classification number: H04N5/2356 H04N5/2354 H04N5/30 H04N5/332

    Abstract: A digital camera accesses, processes and displays a combination image composed of visible light and near non-visible (“NNV”) light. A method can include accessing, by a digital camera, raw data having first information associated with a first electromagnetic spectrum range and second information associated with a second electromagnetic spectrum range. The first electromagnetic spectrum range is substantially within the visible spectrum and the second electromagnetic spectrum range is substantially within the NNV spectrum. The method can also include optimizing the raw data for the visible spectrum, thereby generating a first visual image representation, and optimizing the raw data for the NNV spectrum, thereby generating a second visual image representation. The method can also include combining the first visual image representation and the second visual image representation to generate a combination image. The digital camera can then initiate the display of the combination image.

    Autonomous vehicle sensor security system

    公开(公告)号:US11656619B2

    公开(公告)日:2023-05-23

    申请号:US17178471

    申请日:2021-02-18

    Abstract: Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

    Image classification attack mitigation

    公开(公告)号:US11599754B2

    公开(公告)日:2023-03-07

    申请号:US17218635

    申请日:2021-03-31

    Abstract: Concepts and technologies disclosed herein are directed to image classification attack mitigation. According to one aspect of the concepts and technologies disclosed herein, a system can obtain an original image and reduce a resolution of the original image to create a reduced resolution image. The system can classify the reduced resolution image and output a first classification. The system also can classify the original image via deep learning image classification and output a second classification. The system can compare the first classification and the second classification. In response to determining that the first classification and the second classification match, the system can output the second classification of the original image. In response to determining that the first classification and the second classification do not match, the system can output the first classification of the original image.

    Security de-escalation for data access

    公开(公告)号:US11218491B2

    公开(公告)日:2022-01-04

    申请号:US16712461

    申请日:2019-12-12

    Abstract: The concepts and technologies disclosed herein are directed to security de-escalation for data access. A user device can define a security de-escalation rule. The user device can define a multi-tiered security zone within a user device file system utilized by a memory of the user device. The multi-tiered security zone can include a plurality of security tiers. The user device can identify data for de-escalation in accordance with the security de-escalation rule. The user device can de-escalate the data to generate de-escalated data by storing the data identified for de-escalation in a less secure security tier of the plurality of security tiers of the multi-tiered security zone. The user device can receive a data access request from an external user device. The user device can verify a data access credential contained in the data access request. The user device can provide the de-escalated data to the external user device.

    AUTONOMOUS VEHICLE SENSOR SECURITY SYSTEM

    公开(公告)号:US20210200207A1

    公开(公告)日:2021-07-01

    申请号:US17178471

    申请日:2021-02-18

    Abstract: Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

    Autonomous vehicle sensor security system

    公开(公告)号:US12085934B2

    公开(公告)日:2024-09-10

    申请号:US18301295

    申请日:2023-04-17

    Abstract: Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

Patent Agency Ranking