-
公开(公告)号:US20250039187A1
公开(公告)日:2025-01-30
申请号:US18818669
申请日:2024-08-29
Applicant: Intel Corporation
Inventor: Dan HOROVITZ , Ilil BLUM SHEM-TOV , Yoni KAHANA , Yaron KLEIN , Assaf GUREVITZ
Abstract: Provided is a method for location-based access control in a wireless network. The location of a user device is determined based on a Channel State Information (CSI) matrix of the user device as trusted or untrusted. Based on the trust state, which is trusted or untrusted, of the user device, access control is performed. In some examples, in order to determine the trust state of the user device, the CSI matrix of the user device needs to be input into a machine learning model or be compared with CSI matrices corresponding to multiple trusted locations using a similarity measure. Because the access control is based on the location of the user device, the conveniency and accuracy of the access control could be better than that made by some other security measures, such as password-based mechanisms.
-
公开(公告)号:US20240201834A1
公开(公告)日:2024-06-20
申请号:US18477572
申请日:2023-09-29
Applicant: Intel Corporation
Inventor: Alex NAYSHTUT , Dan HOROVITZ , Miriam ENGEL , Victoria ALMOG-AYZENBERG , Ilil BLUM SHEM-TOV
IPC: G06F3/04845 , G06T7/20 , G06T7/70
CPC classification number: G06F3/04845 , G06T7/20 , G06T7/70
Abstract: Examples relate to an apparatus, device, method, and computer program for an image data processing system, to an image date processing system and image data processing method, and to corresponding computer systems and computer programs. An apparatus for an image data processing system is to obtain information on a user selection from a user, the user selection relating to at least one modality of computer-based processing of a depiction of the user the user is comfortable or uncomfortable with, determine a presence of a depiction of the user in image data of a camera, and determine one or more modalities of computer-based processing to be applied to the depiction of the user in the image data based on the user selection, provide control information regarding the one or more modalities of computer-based processing to be applied to the depiction of the user in the image data for the image data processing system.
-
公开(公告)号:US20240338197A1
公开(公告)日:2024-10-10
申请号:US18393733
申请日:2023-12-22
Applicant: Intel Corporation
Inventor: Dan HOROVITZ , Igor METRIK , Omer BEN-SHALOM , Ilil BLUM SHEM-TOV , Ofer RIVLIN
Abstract: A method and apparatus for anti-rollback protection for a non-persistent software in a system. A software install package includes a main version of software and a fallback version of the software. The fallback version of the software includes a vulnerable versions list that includes a list of vulnerable versions of the software determined up to a release date of the fallback version of the software. The fallback version of the software is stored in the system. The main version of the software is installed if the main version of the software is not listed in the vulnerable versions list. The fallback version may be updated automatically if the new fallback version higher than the existing fallback version is received. The fallback version is stored in a fallback versions' repository by an operating system or installer. The fallback version may include an allowed versions list.
-
公开(公告)号:US20250094878A1
公开(公告)日:2025-03-20
申请号:US18971060
申请日:2024-12-06
Applicant: Intel Corporation
Inventor: Ofer RIVLIN , Mor UZIEL , Dan HOROVITZ , David BIRNBAUM
IPC: G06N20/00
Abstract: It is provided a non-transitory computer-readable medium storing instructions that, when executed by one or more processing circuitries of an apparatus, causing the one or more processing circuitries to perform locally on the apparatus a method. The method includes obtaining a pretrained machine learning model by the apparatus. The method further includes generating training data based on user-related information. The user-related information relating to a user behavior during interaction of the user with the apparatus. The method further includes training the pretrained machine learning model based on the generated training data by the apparatus to obtain a personalized machine learning model. The method further includes executing the personalized machine learning model by the apparatus.
-
公开(公告)号:US20250063355A1
公开(公告)日:2025-02-20
申请号:US18921042
申请日:2024-10-21
Applicant: Intel Corporation
Inventor: Ilil BLUM SHEM-TOV , Yaron KLEIN , Dan HOROVITZ , Yoni KAHANA , Omer BEN-SHALOM
Abstract: A method and apparatus for authentication of a user. A user profile is generated during an initial registration. The user profile may include a trusted location of the user. During a subsequent authentication process for the user, it is determined whether the user is located in the trusted location of the user, and an access to a service for the user may be controlled based on a result of the authentication process and the determination whether the user is located in the trusted location of the user. A location-based parameter of the trusted location of the user may be determined and stored in advance, and it is determined whether the user is located in the trusted location of the user by comparing the location-based parameter of the current location of the user and the location-based parameter of the trusted location of the user.
-
公开(公告)号:US20240340161A1
公开(公告)日:2024-10-10
申请号:US18531786
申请日:2023-12-07
Applicant: Intel Corporation
Inventor: Ofer RIVLIN , Dan HOROVITZ
CPC classification number: H04L9/0825 , H04L9/008 , H04L9/3236
Abstract: It is provided an apparatus comprising interface circuitry, machine-readable instructions, and processing circuitry to execute the machine-readable instructions. The machine-readable instructions comprise instructions to encrypt data of a first agent with a homomorphic public key. The first agent is connected to a network. The machine-readable instructions further comprise instructions to transmit the encrypted data of the first agent and the homomorphic public key to a server and to request data from the server, the requested data comprising a reference value for the data of the first agent. The reference value is based on the data of the first agent and on the data of one or more second agents, the one or more second agents are connected to the network. The machine-readable instructions further comprise instructions to receive the requested data from the server. The requested data is encrypted with the homomorphic public key.
-
-
-
-
-