-
公开(公告)号:US20210389805A1
公开(公告)日:2021-12-16
申请号:US16639714
申请日:2017-09-20
Applicant: Intel Corporation
Inventor: Ali MORADI , Joseph B. PETRINI , Michael A. SCHROEDER , Shankar DEVANSENATHIPATHY , Atul N. HATALKAR
Abstract: Embodiments include apparatuses, systems and methods for a computer device with a casing and a substance in the casing substantially surrounding a computer component in the casing. In embodiments, the computer device may be a command and control computer, such as for example, an autonomous or semi-autonomous vehicle. In embodiments, the substance may be an electrically isolative and shear-thickening fluid to provide thermo-mechanical protection to a computer component. In the described embodiments, the substance may dampen mechanical shock or vibrational impact on the processor and the memory. The shear-thickening gel may further be thermally conductive in embodiments. In the embodiments, the casing may be substantially filled with the substance and the substance is to conduct heat away from the processor and the memory toward an outer edge of the casing. Other embodiments may also be described and claimed.
-
2.
公开(公告)号:US20240054502A1
公开(公告)日:2024-02-15
申请号:US17883718
申请日:2022-08-09
Applicant: Intel Corporation
Inventor: Michael A. SCHROEDER , Sean BUSHELL , William F. HERRINGTON , Hannah ROWE , Sarah SHAHRAINI , Ryan PATE , Erasenthiran POONJOLAI , Saikumar JAYARAMAN , Fariaz KARIM
CPC classification number: G06Q30/018 , G06V20/95 , G06V20/80 , G06V10/14 , H04L9/3236
Abstract: The present disclosure is directed to an authentication system, tools, and methods for authentication including a first inspection tool that generates first images for a first inspection of a device, and a first processor for processing the first images using a hashing algorithm, for which the first inspection tool and the first processor are sited at a first location, and a second inspection tool that generates second images for a second inspection of the device, and a second processor for processing the second images using the hashing algorithm, for which the second inspection tool and the second processor are sited at a second location. The second processor compares the first and second sets of hash values to authenticate the device as being authentic and untampered.
-