-
公开(公告)号:US20250119340A1
公开(公告)日:2025-04-10
申请号:US18987127
申请日:2024-12-19
Applicant: Intel Corporation
Inventor: Balvinder Pal Singh , Kobi Guetta , Yoni Kahana , Amichay Israel , Ehud Apsel , Anubhav David , Gila Kamhi
IPC: H04L41/0631 , H04L41/069 , H04L41/16 , H04W24/02
Abstract: Logic may monitor quality of communication of data to a wireless receiver device based on transport characteristics at a wireless source device. Logic may evaluate the transport characteristics to identify indication(s) of a problem with the quality of the communication. Logic may identify a root cause associated with the indication(s). Logic may associate the root cause with one or more actions to mitigate the degradation of the quality. And logic may cause performance of an operation to mitigate the degradation of the quality based on the one or more actions. The logic to evaluate the transport characteristics may determine an upper limit for an achievable mean opinion score (MOS) based on the transport characteristics; and, based on the upper limit for the achievable MOS being less than a threshold MOS, may identify the indication(s) associated with the upper limit for the achievable MOS.
-
公开(公告)号:US20250097249A1
公开(公告)日:2025-03-20
申请号:US18965769
申请日:2024-12-02
Applicant: Intel Corporation
Inventor: Omer Ben-Shalom , Yoni Kahana , Yaron Klein , Ilil Blum Shem-Tov , Dan Horovitz
IPC: H04L9/40
Abstract: An example apparatus includes interface circuitry, machine-readable instructions, and at least one processor circuit to be programmed by the machine-readable instructions to interface circuitry to obtain a pre-trained detection model, machine-readable instructions, and at least one processor circuit to be programmed by the machine-readable instructions to tune the pre-trained detection model based on first local behavior data and execute the tuned detection model to detect an anomaly in second local behavior data associated with the apparatus.
-
公开(公告)号:US20250023824A1
公开(公告)日:2025-01-16
申请号:US18897939
申请日:2024-09-26
Applicant: Intel Corporation
Inventor: Dan Horovitz , Mordechai Alon , Kobi Guetta , Yoni Kahana
IPC: H04L47/2441 , H04L47/2425
Abstract: An apparatus, including: a classifier configured to classify, in real time, an application type of an application traffic stream based on one or more indicators received from one or more components of an edge device and associated with the application traffic stream; and a quality-of-service (QOS) engine configured to assign a priority to the application traffic stream by modifying its packet headers, enabling a network module to dynamically prioritize the application traffic stream based on the classification.
-
公开(公告)号:US20240275587A1
公开(公告)日:2024-08-15
申请号:US18620197
申请日:2024-03-28
Applicant: Intel Corporation
Inventor: Yaron Klein , Dan Horovitz , Yoni Kahana , Ilil Blum Shem-Tov
IPC: H04L9/08
CPC classification number: H04L9/0872
Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to generate location-based cryptographic keys. An example includes a non-transitory computer readable medium comprising instructions that, when executed, cause a machine to at least determine an encryption key, and combine the encryption key with a parameter based on a physical characteristic of a wireless network environment to generate a cryptographic key.
-
5.
公开(公告)号:US20240171563A1
公开(公告)日:2024-05-23
申请号:US18057303
申请日:2022-11-21
Applicant: Intel Corporation
Inventor: Yoni Kahana , Eytan Mann
IPC: H04L9/40
CPC classification number: H04L63/0823 , H04L63/0435
Abstract: An architecture is provided that enables a trust on first use (TOFU) scheme to be realized for two modules (such as an SoC and a companion module) that comprise part of a hardware platform. The architecture leverages symmetric encryption schemes and relies upon an initial setup process in a controlled environment, during which time unencrypted communications may initially be used until the SoC and companion module each store a security key that is generated by the SoC. The key may be a bit string that is generated via a random number generator, thereby obviating the need to utilize hardware secure module (HSM) provisioning and complex encryption hardware. Moreover, the disclosure is directed to supporting additional phases of the manufacturing process, such as debugging and a restoration process that functions to delete or invalidate the keys stored in the SoC and companion module.
-
-
-
-