In some examples, a system includes a kernel scheduler to schedule, for execution, threads to run in an address space of an operating system (OS) kernel according to respective priorities associated with the threads, where each thread of the threads has a user persona and a kernel persona. The kernel scheduler switches each respective thread of the threads to the kernel persona of the respective thread in response to scheduling the respective thread for execution responsive to a kernel call from the respective thread. The kernel scheduler preempts a thread in the kernel persona of the thread that is actively executing in response to an event.
Methods and systems for dynamically routing pulse-code modulated (PCM) audio subchannels to one or more sink devices using a software-based router. The PCM router may set a pre-conversion buffer in the conversion path to a sink device for a particular subchannel if the source PCM fragment size differs from the sink fragment size. It may also compare characteristics of the audio subchannel to the sink device to identify a mismatch and, on that basis, configure the conversion path to include a sample rate converter, a channel converter, or a format converter, as needed. Subchannels can be dynamically routed to two or more sink devices and routing may be changed during playback.
G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
G10L 19/008 - Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
H04H 60/04 - Studio equipment; Interconnection of studios
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
A method for creating a model to add a code summary to functions of assembly language code, the method including tokenizing an assembly code dataset; inputting the tokenized assembly code dataset to a pre-trained transformer-based model; using an encoder to create fixed length embeddings; and using a decoder on the fixed length embeddings to generate the code summary.
In some examples, a system detects a first alert associated with activities of a first group of entities, the first alert generated by a first type of security agent. The system predicts an alert collection including one or more alerts expected to occur based on occurrence of the first alert, wherein a second alert of the alert collection is from a second type of security agent different from the first type of security agent. The system generates one or more remediation actions to apply in response to a pattern of alerts including the first alert and the one or more alerts of the alert collection. The system provides, in an electronic device to be protected against attacks, information of the one or more remediation actions to be applied by the electronic device responsive to occurrence of the pattern of alerts.
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
In some examples, a system includes an operating system (OS) kernel, one or more hardware processors, and a kernel scheduler. The kernel scheduler receives a first indication that a first thread is to wait for an event, receives a second indication that the first thread has transitioned to a blocked state in which the first thread is blocked on the event, and receives a third indication from a second thread delivering the event, the third indication to unblock the first thread. In response to the third indication, the kernel scheduler causes a transition of the first thread from the wait state to an active state if the first thread is in the wait state and has not yet transitioned to the blocked state, and causes a transition of the first thread from the blocked state to a ready state if the first thread is in the blocked state.
In some examples, a system includes one or more hardware processors, an interrupt service thread to handle an interrupt, and a kernel scheduler to schedule the interrupt service thread as part of a collection of threads to be scheduled.
There are provided methods and apparatuses for a control flow execution-guided deep learning framework for binary code vulnerability detection. Reinforcement learning is to enhance the branching decision at every program state transition and create a dynamic environment to learn the dependency between a vulnerability and certain program states. An implicitly defined neural network enables state transition until convergence, which captures the structural information at a higher level.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
In some examples, a system monitors operations in at least one electronic device in which entities are started, created, or modified, and generates an alert based on the monitoring. The system adapts an amount of data collected based on contextual information associated with the alert, where the adapting of the amount of data collected comprises determining whether to include or exclude data associated with a subset of the entities based on any relationships of the subset of the entities to an entity associated with the alert.
Methods and systems for controlling an asset tracking device and, in particular, determining when an asset tracking device attached to a trailer is in close proximity to a truck. The device may enter a sleep mode when the trailer has been coupled to a truck with an electronic logging device (ELD). Thereafter, the device ceases obtaining a GPS location and transmitting the location to a central server. While the trailer and truck remain coupled, the device leverages the ELD by using it to send its GPS location to the central server and therefore, prolong its battery life.
In some examples, a security system detects an alert generated in response to an operation on a device, the operation involving a first process and a first entity. In response to the alert, the security system discovers a second entity that is outside a scope of the alert, and applies remediation actions with respect to the first process, the first entity, and the second entity to address the alert.
A device includes a link layer configured to use a first link layer address and a second link layer address, maintain the first link layer address unchanged for a duration of an association of the device with a wireless network, and change the second link layer address from a first value to a second value during the duration.
A method for natural language processing of a corpus of documents, the method including evaluating the corpus of documents to choose a plurality of topics, using the plurality of topics to generate a topic of topics; and assessing the topic of topics to determine a quality of the natural language processing of the corpus.
A method for natural language processing of a corpus of documents, the method including evaluating the corpus of documents to choose a plurality of topics, using the plurality of topics to generate a topic of topics; and assessing the topic of topics to determine a quality of the natural language processing of the corpus.
A method at a sensor module within a sensor system for communicating with a gateway, the method including storing a timing profile for communications with the gateway; waking a radio core of the sensor module at a threshold time prior to a beacon signal being expected from the gateway; sampling a channel for the beacon signal at the radio core; if the beacon signal is detected: waking a processor on the sensor module; exchanging communication with the gateway; and powering down the processor and radio core upon completion of the exchanging communication.
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
G08G 1/0967 - Systems involving transmission of highway information, e.g. weather, speed limits
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
18.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
Systems, methods, and software can be used to determine whether a local area network (LAN) is secure. In some aspects, a method includes: determining, by an electronic device that is connected to a local area network (LAN), whether the LAN meets a security condition, wherein the determining whether the LAN meets a security condition comprises: determining whether an Internet Protocol (IP) address of a reference server in a security list is included in a range indicated by a subnet mask of the LAN; and determining whether a hostname of a device at the IP address matches a hostname corresponding to the reference server in the security list; and determining whether to initiate a secured network connection based on whether the LAN meets the security condition.
Devices and methods for detecting and reporting a battery tamper event with regard to an intrinsically-safe or explosion-proof device while the device is located in a hazardous environment. The device may include a location sensor for determining that the device is in a hazardous location. While in the hazardous location, the device may detect an open enclosure event using a sensor and, if so, it may monitor for detection of a battery tampering event. The battery tampering event may include battery replacement or battery charging. The battery tamper event may be reported to a remote server over a wireless channel when it occurs.
H05K 5/02 - Casings, cabinets or drawers for electric apparatus - Details
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
H05K 5/00 - Casings, cabinets or drawers for electric apparatus
In some examples, a system receives information based on wireless sensing performed using wireless signals of a wireless interface of a wireless node, the wireless interface of the wireless node to communicate data over a wireless connection established with another wireless device. The system performs authentication in response to the received information.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Systems, methods, and software can be used to perform a two-factor authentication. In some aspects, a method includes: receiving, by an electronic device from a device authentication server, a two-factor authentication (2FA) token; transmitting, by the electronic device to an identity provider (IDP), an authentication request for a 2FA operation, wherein the authentication request comprises the 2FA token; receiving, by the electronic device from the IDP, an authentication response; and determining, by the electronic device, whether the 2FA operation succeeds based on the authentication response.
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
A method at a computing device, the method including receiving an indication of a desired test environment; accessing a configuration catalog to obtain configuration information for the desired test environment; configuring a test node based on the configuration information; obtaining test signals for the desired test environment; and performing testing on the configured test node using the test signals.
A method at a computing device, the method including placing a trace on a plurality of behaviors within a kernel on the computing device; generating data from the trace; assembling the data into an event; and formatting the event into a security sensor output. Further, a computing device having a processor and communications subsystem, wherein the computing device is configured to place a trace on a plurality of behaviors within a kernel on the computing device; generate data from the trace; assemble the data into an event; and format the event into a security sensor output.
A method at a computing device, the method including receiving security sensor data; normalizing the security sensor data to create normalized security sensor data; determining that an anomaly exists within the normalized security sensor data; and generating an alert based on the determining. Also, computing device comprising a processor, and a communications subsystem, where the computing device is configured to receive security sensor data; normalize the security sensor data to create normalized security sensor data; determine that an anomaly exists within the normalized security sensor data; and generate an alert based on the determining.
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Methods and systems for building a coverage map for a mobile network operator based on a plurality of location reports received from a plurality of deployed asset tracking devices, the reports including geolocation data and mobile network identifiers. On request from a user device the coverage map is used to generate an overlay atop a geographical map showing the boundaries of coverage for that mobile network operator.
Systems, methods, and software can be used to control permissions of vehicle signals. In some aspects, one example method includes: receiving a permission map, wherein the permission map comprises a configured permission value of a permission element of a node in a vehicle signal catalog; and setting a permission value of the permission element of the node in the vehicle signal catalog according to the configured permission value in the permission map.
A method of controlling a portable electronic device that has a touch-sensitive display includes displaying information on the touch-sensitive display, detecting a gesture on the touch-sensitive display, scrolling through the information in a first scrolling mode when the gesture is associated with a first area of the touch-sensitive display, and scrolling through the information in a second scrolling mode when the gesture is associated with a second area of the touch-sensitive display.
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
31.
SYSTEM AND METHOD FOR SUPPORTING INTER-BAND CARRIER AGGREGATION WITH DIFFERENT UL/DL TDD CONFIGURATIONS
In some implementations, a method of wireless communications between a wireless communications network and wireless user equipment includes receiving, using a primary Time Division Duplex (TDD) configuration, data on a primary component carrier in a first frequency band. Using a secondary TDD configuration, data on a secondary component carrier is received in a second frequency band different from the first frequency band. A Hybrid Automatic Repeat Request (HARQ) for data received on the secondary component carrier is transmitted using a supplemental TDD configuration. A transmission or retransmission on the secondary component carrier uses a supplemental TDD configuration as well. The supplemental TDD configuration is different from the secondary TDD configuration. Furthermore, an uplink supplemental configuration may be different from a downlink supplemental configuration.
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
H04J 3/16 - Time-division multiplex systems in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
H04L 1/1607 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals - Details of the supervisory signal
H04L 1/1829 - Arrangements specially adapted for the receiver end
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04L 5/14 - Two-way operation using the same type of signal, i.e. duplex
H04L 5/22 - Arrangements affording multiple use of the transmission path using time-division multiplexing
An asset tracking device and method for detecting the presence of an intermodal shipping container and responsively selecting a preferred location determination. The device may include a controller, a sensor coupled to the controller, a global navigation satellite system chip, and a cellular signal transceiver. While not detecting a container, the controller obtains location data via a global satellite system chip. While a container is detected, the sensor sends a detection signal to the controller and, responsive to the detection signal, the controller obtains location data from a cellular signal transceiver and not from the global satellite system chip.
Methods and systems for automatically selecting a mobile network rate plan for an asset tracking device based on a set of reported geolocations of the device overtime, coverage data for various mobile networks, and a set of possible network rate plans. A change in mobility rate plans may be implemented through remote provisioning of a new mobile network profile to the asset tracking device.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
34.
COMMUNICATING VEHICLE SIGNAL INFORMATION USING EXTENDED IDENTIFIERS
Systems, methods, and software can be used to communicates vehicle signals. In some aspects, one example method includes: receiving, at a server, a query for a vehicle signal; and transmitting, from the server, a response message comprising an identifier of the vehicle signal, wherein the identifier comprises a representation of a name of the vehicle signal and a definition of at least one other element of the vehicle signal.
G07C 5/00 - Registering or indicating the working of vehicles
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
35.
OCEAN-TRAVEL CONFIGURATION OF ASSET TRACKING DEVICES
Methods and systems for controlling an asset tracking device and, in particular, determining when an asset tracking device is aboard a ship. The device may have a ship mode in which the device determines it has been loaded onto a ship and in which geolocation is not determined. The device may further have an ocean mode to which it transitions from the ship mode in which it ceases to look for a cellular connection in order to send location reports. The device may detect a beacon signal from a ship-mounted base-station to trigger the ship mode and may detect, or fail to detect, one or more wireless signals or identifiers as the trigger to transition to ocean mode.
Systems, methods, and software can be used to process a control channel at a user agent (UA) within a wireless communication system. In some aspects, the method includes identifying one carrier as an anchor carrier and at least one other another carrier as a non-anchor carrier; for each carrier: determining a location of a UA specific search space including one or more control channel candidates for the carrier based on a linear congruential random number; and attempting to decode each of the control channel candidates in the UA specific search space to identify at least one of an uplink or a downlink grant associated with the carrier and receiving information indicating a first number of control channel candidates for a first aggregation level for the anchor carrier and a second number of control channel candidates for the first aggregation level for the non-anchor carrier, wherein the first number of control channel candidates is different from the second number of control channel candidates.
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
In some examples, a system accesses service facility information relating to a plurality of vehicle service facilities, and determines, based on the vehicle component information and the service facility information, at least one vehicle service facility of the plurality of vehicle service facilities that is able to perform servicing of the one or more vehicle components. The system causes presentation, in a user interface, of service information relating to vehicle component servicing to be provided by the at least one vehicle service facility.
Systems, methods, and software can be used to detect distribution assessments of production data sample of a machine learning operation. In some aspects, a method includes: receiving, from a first machine learning model, pre-activation data, wherein the pre-activation data comprises pre-activation information of one or more neurons of the first machine learning model, and the pre-activation data is obtained when the first machine learning model processes a production data sample to generate a prediction outcome; using, a second machine learning model to process the pre-activation data to generate a distribution assessment; and determining, based on the distribution assessment, wherein the production data sample is an adversarial data sample or a drift data sample.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
40.
METHOD AND SYSTEM FOR CROWD SOURCED DANGEROUS DRIVING DETECTION AND ACCIDENT MITIGATION
A method at a computing device for a vehicle, the method including observing, using sensors of the vehicle, behavior of an external road user; producing at the computing device a normalized safety score for the external road user; recording identifying information for the external road user; and reporting the normalized safety score and identifying information to a server.
A method at a permission service on a computing device for managing permissions, the method including receiving a request at the permission service from a first application, the request comprising an identifier associated with an operating system for a second application and a permission for the second application to access resources; performing an action at the permission service based on the received request; and returning results of the action to the first application indicating whether the second application has the permission to access the resources.
Systems, methods, and software can be used to control audio output of a vehicle. In some aspects, a method is disclosed comprising: determining, at a vehicle, a current driving mode of the vehicle; determining, at the vehicle, a plurality of audio output levels based on the current driving mode and one or more preconfigured audio zone profiles; and controlling, by the vehicle, audio equipment of the vehicle to output audio according to the plurality of audio output levels.
An Internet of Things device and method for controlling the flow of power to a device through remote instructions. The device may include a battery and a switch coupling the battery to a main circuit, the switch including a sensor detecting a first condition. While detecting the first condition, the switch may be open-circuited, decoupling the battery from the main circuit. While not detecting the first condition, the switch is close-circuited, coupling the battery to the main circuit and providing power. The device may further include a controller coupled to a wireless communications module, which may receive instructions from a remote server. These instructions may instruct the controller to send a disable signal to the switch, preventing the switch from becoming open-circuited when the sensor detects the first condition.
G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
G06F 1/28 - Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
44.
METHOD AND SYSTEM FOR SHARING SENSOR INSIGHTS BASED ON APPLICATION REQUESTS
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
45.
PREDICTIVE CODING OF POINT CLOUDS USING MULTIPLE FRAMES OF REFERENCES
Methods and devices for encoding a point cloud. More than one frame of reference is identified and a transform defines the relative motion of a second frame of reference to a first frame of reference. The space is segmented into regions and each region is associated with one of the frames of reference. Local motion vectors within a region are expressed relative to the frame of reference associated with that region. Occupancy of the bitstream is entropy encoded based on predictions determined using the location motion vectors and the transform associated with the attached frame of reference.
H04N 19/184 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being bits, e.g. of the compressed video stream
H04N 19/52 - Processing of motion vectors by encoding by predictive encoding
46.
INTERNET-OF-THINGS DEVICES AND METHODS OF CONTROLLING POWER THERETO
An Internet of Things device and method for controlling the flow of power to a device through remote instructions. The device may include a battery and a switch coupling the battery to a main circuit, the switch including a sensor detecting a first condition. While detecting the first condition, the switch may be open-circuited, decoupling the battery from the main circuit. While not detecting the first condition, the switch is close-circuited, coupling the battery to the main circuit and providing power. The device may further include a controller coupled to a wireless communications module, which may receive instructions from a remote server. These instructions may instruct the controller to send a disable signal to the switch, preventing the switch from becoming open-circuited when the sensor detects the first condition.
A method at a computing device for anomaly detection, the method including storing, at the computing device, a full batch model for a plurality of data points, wherein each of the plurality of data points is associated with one of a plurality of clusters, and wherein the storing comprises a table for storing information about the plurality of clusters without storing the plurality of data points; receiving a new data point from a hardware sensor; determining that the new data point falls outside the full batch model, thereby detecting an anomaly; and performing an action based on the anomaly.
A method at a computing device for anomaly detection, the method including storing, at the computing device, a full batch model for a plurality of data points, wherein each of the plurality of data points is associated with one of a plurality of clusters, and wherein the storing comprises a table for storing information about the plurality of clusters without storing the plurality of data points; receiving a new data point from a hardware sensor; determining that the new data point falls outside the full batch model, thereby detecting an anomaly; and performing an action based on the anomaly.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
In some examples, in response to determining that a new communication channel is required, a wireless device retrieves information provided from a network node of availability of alternative communication channels for the wireless device. In response to retrieving information that a second communication channel is available for a location within which the wireless device is located, the wireless device removes wireless device specific information and initiates a request to connect to the second communication channel, where the second communication channel is in a frequency range different from a frequency range of the first communication channel.
A method, mobile device (101) and radio access network RAN (102) are disclosed for suspending and re-establishing a radio resource control (RRC) connection. In some examples, the mobile device (101) indicates a preference to have the RRC connection either suspended or released. In other examples, RAN (102) sends to the mobile device (101) a connection suspend command message instructing the mobile device to suspend a RRC connection with the RAN (102). The mobile device (101), in response to the connection suspend command message, suspends the RRC connection. When the RRC connection is suspended the mobile device (101) cannot transmit or receive user plane data to the RAN (102) and performs functions the same as or similar to idle mode functions. On suspension, RRC connection information is stored and can be used to re-establish the suspended RRC connection.
A method for reporting power headroom-related information for a plurality of aggregated carriers. The method includes reporting in a bitmap the power headroom-related information for a number of the aggregated carriers that is less than or equal to the total number of aggregated carriers, wherein the power headroom-related information is one of a power headroom for at least one of the aggregated carriers and a path loss for at least one of the aggregated carriers.
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
H04W 52/34 - TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
H04W 72/20 - Control channels or signalling for resource management
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
55.
ACCESS RESTRICTION OF VEHICLE-ASSOCIATED INFORMATION
In some examples, a system receives vehicle-associated information from a data source associated with a vehicle, and restricts access to the vehicle-associated information based on at least one privacy criterion selected from among a machine learning use criterion relating to use of the vehicle-associated information by a machine learning model, a vehicle motion criterion relating to a movement status of the vehicle, or a person identity criterion relating to an identity of a person in the vehicle.
In some examples, a system receives vehicle-associated information from a data source associated with a vehicle, and restricts access to the vehicle- associated information based on at least one privacy criterion selected from among a machine learning use criterion relating to use of the vehicle-associated information by a machine learning model, a vehicle motion criterion relating to a movement status of the vehicle, or a person identity criterion relating to an identity of a person in the vehicle.
There is provided a method and apparatus for identifying malicious code. The method uses machine learning to compare a new code segment to known code segments of malicious code. Code segments are converted to vectors and the cosine similarity of two vectors is used to identify clones. Techniques to train a neural network for handling very long code sequences and obfuscated malicious code are used.
Systems, methods, and software can be used to control audio output of a vehicle. In some aspects, a rnethod is disclosed cornprising: deterrnining, at a vehicle, a current driving mode of the vehicle; determining, at the vehicle, a plurality of audio output levels based on the current driving mode and one or more preconfigured audio zone profiles; and controlling, by the vehicle, audio equipment of the vehicle to output audio according to the plurality of audio output levels.
B60R 11/02 - Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
G10K 11/00 - Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
There is provided a method and apparatus for identifying malicious code. The method uses machine learning to compare a new code segment to known code segments of malicious code. Code segments are converted to vectors and the cosine similarity of two vectors is used to identify clones. Techniques to train a neural network for handling very long code sequences and obfuscated malicious code are used.
A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
63.
METHOD AND SYSTEM FOR AUTOMATED PROVISIONING OF DATA FROM MULTIPLE SENSORS
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
A server-implemented method is disclosed. The method includes: receiving a request from an IP Multimedia Subsystem (IMS) network node of an IMS network; and in response to receiving the request, providing NAS registration state information associated with a user equipment (UE) to the IMS network node, the NAS registration state information indicating at least one of fourth-generation (4G) single radio voice call continuity (SRVCC) capability of the UE or fifth-generation (5G) SRVCC capability of the UE that is applicable when using an access network supported by a core network, wherein the server is configured to store separate instances of UE SRVCC capabilities, the separate instances including indications of at least one of 4G UE SRVCC capability or 5G UE SRVCC capability that is applicable when using the access network supported by the core network, and wherein the UE is registered with the IMS network using a session initiation protocol (SIP) via the access network.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
In an aspect, the present disclosures provides a computer-implemented method for applying user settings to a vehicle, the method comprising receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle, the user settings being associated with a user; unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
B60R 25/01 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
G06Q 30/06 - Buying, selling or leasing transactions
67.
SYSTEM AND METHOD FOR PORTABLE USER AND VEHICLE SETTINGS
In an aspect, the present disclosures provides a computer-implemented method for applying user settings to a vehicle, the method comprising receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle, the user settings being associated with a user; unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
B60R 16/02 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric
In some examples, a first device receives a stream of application audio data, encodes the stream of application audio data, and in response to detecting an end of the stream of application audio data, provides pre-encoded filler audio data from a buffer in the first device as an encoded stream of filler audio data. The first device transmits the encoded stream of application audio data and the encoded stream of filler audio data in an encoded output data stream over a transport to a second device.
In some examples, a first wireless device transmits, within a first band designated for vehicle-related communications, service information for a service, the service information comprising information of a channel in a second band for communication of data of the service, the second band being outside of the first band.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/63 - Routing a service request depending on the request content or context
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
Methods, devices, and systems for multi-carrier network operation are disclosed. In one embodiment, a method of performing channel scrambling in a multi-carrier network, wherein the multi-carrier network includes a first component carrier (“CC”) and a second CC between a base station and a user equipment (“UE”) comprises receiving a Cell Radio Network Temporary Identifier (“C-RNTI”) and a cell identification (“ID”) for at least one of the first CC and the second CC; and using the RNTI and the cell ID to perform scrambling of information transmitted on at least one of the first CC and the second CC.
A method for control of data transmission in a wireless communication system includes receiving, by an application, from a modem, information indicative of a radio coverage condition, where a user equipment (UE) includes the application and the modem; based on the received information, determining that the UE is in an enhanced coverage state; and in response to the determining, controlling uplink data transmission by the modem to reduce power consumption of the UE.
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest “a” belonging to a semigroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker “c” and an endpoint “e”, checker “c” and endpoint “e” belonging to the semigroup and the endpoint comprising a multiplication of a private key “b” for the first party and the checker “c”, multiplying the message digest “a” and the endpoint “e” to create an endmatter “ae”; extracting a signature “d” from the signed message, the signature “d” belonging to the semigroup and being a multiplication of message digest “a” and private key “b”; multiplying the signature “d” and the checker “c” to create a signcheck “dc”; and verifying that the endmatter “ae” matches the signcheck “dc”.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A method for balancing sensors within a sensor system, the method including receiving, at a gateway, data from a plurality of sensors, each of the plurality of sensors being connected to one of a plurality of sensor modules or the gateway; determining, at the gateway, that a signal strength from a first sensor falls below a threshold, the first sensor being one of the plurality of sensors; and based on the determining, allocating the first sensor to connect to a different one of the plurality of sensor modules, or to the gateway if connected to one of the plurality of sensor modules.
H04L 41/083 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 24/02 - Arrangements for optimising operational condition
H04W 36/30 - Reselection being triggered by specific parameters by measured or perceived connection quality data
H04W 40/14 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
H04W 48/00 - Access restriction; Network selection; Access point selection
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04W 24/04 - Arrangements for maintaining operational condition
H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
Provided are a method for a terminal transmitting uplink control information (UCI) through a physical uplink control channel (PUCCH) in a wireless communication system, and a terminal using the method. A transmission power to be applied to the uplink control channel is determined on the basis of a value subordinate to a PUCCH format, and at least one type of UCI is transmitted from the physical uplink control channel by using the transmission power that is determined, wherein when the PUCCH format is PUCCH format 3, and the at least one type of UCI includes acknowledgement/negative-acknowledgement (ACK/NACK) and periodic channel state information (CSI), the value subordinate to the PUCCH format is determined on the basis of the number of bits of the ACK/NACK and the number of bits of the periodic CSI.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/1607 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals - Details of the supervisory signal
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/14 - Separate analysis of uplink or downlink
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
Systems, methods, and software can be used to detect domain name system tunneling (DNST). In some aspects, a method comprises: receiving a plurality of domain name system (DNS) requests to access one or more domains; processing, by using a machine learning model, the plurality of DNS requests to determine one or more suspicious DNS requests among the plurality of DNS requests; and processing, by using a statistical analysis model, the one or more suspicious DNS requests to determine whether the one or more suspicious DNS requests are potentially malicious DNS requests.
Systems, methods, and software can be used to detect anomalies in source code. In some aspects, a method comprises: obtaining, by a server, one or more attribute values associated with one or more code commits of source code; and generating, by the server and based on the one or more attribute values, an anomaly report indicating a risk level of the source code.
Systems, methods, and software can be used to identify security risks in software code based on software bill of materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
Methods and systems for monitoring the behavior of a process. A profile of a software module is obtained. An association request is received from a process. The association request includes an identifier. In response to receiving the association request, successfully validating the identifier based on the profile and establishing an association of a token to data associated with the identifier. A disassociation request is received from the process. The disassociation request includes a token. In response to receiving the disassociation request, using the token to retrieve the data associated with the identifier, determining that the disassociation request is invalid based on the profile and the data associated with the identifier, and based on the determination that the disassociation request is invalid, taking an action.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
87.
METHOD AND SYSTEM FOR ADDITION OF ASSURANCE INFORMATION TO V2X MESSAGING
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 12/069 - Authentication using certificates or pre-shared keys
Systems, methods, and software can be used to detect backdoors in binary software code. In some aspects, a method comprises: obtaining, by a server, binary software code corresponding to source code; generating, by the server, a backdoor abstraction of the binary software code; and generating, by the server, a backdoor risk assessment based on the backdoor abstraction of the binary software code.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
89.
RISK ASSESSMENT BASED ON AUGMENTED SOFTWARE BILL OF MATERIALS
Systems, methods, and software can be used to identify security risks in software code based on Software Bill of Materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
A method comprises obtaining a training set of network data that includes benign network data and malware network data; engaging a feature extraction engine to generate a set of dyads for each source-destination pair in the training set of network data; and training, using the set of dyads, a machine learning engine to differentiate between the benign network data and the malware network data.
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
A method comprises obtaining a training set of network data that includes benign network data and malware network data; engaging a feature extraction engine to generate a set of dyads for each source-destination pair in the training set of network data; and training, using the set of dyads, a machine learning engine to differentiate between the benign network data and the inalware network data.
Data is scrambled at a transmitter according to one of a number of predetermined scrambling sequences which are associated with a particular one of a number of predetermined transmit antenna diversity schemes (i.e., a specific number of transmit antenna ports). Received data is decoded using one or more of the known transmit antenna diversity schemes and the scrambled data is descrambled according to a corresponding descrambling sequence (related to the scrambling sequence). Based on the descrambled data, the receiver determines which transmit antenna diversity scheme (i.e., the number of antenna ports) is used by the transmitter. In one specific embodiment, CRC parity data is scrambled in the transmitter and the receiver descrambles the recovered CRC parity data according to a descrambling sequence, computes CRC parity data from the received data, and compares the descrambled CRC parity data to the newly computed CRC parity data.
H04W 72/30 - Resource management for broadcast services
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
94.
Method and system for data object identification in vehicles
A method at a computing device for finding an association between data objects in a structure, the method including selecting a coordinate location from a grid, the grid defining locations within the structure; finding whether a data object having a data object type is located at the coordinate location; when the data object is located at the coordinate location, associating the data object with other data objects at the coordinate location; and when the data object is not located at the coordinate location: determining through an explicit association that the data object at a second location services the first location; and associating the data object with the coordinate location.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
95.
Uplink control channel resource allocation for an enhanced downlink control channel of a mobile communication system
Uplink control channel resource allocation for an enhanced downlink control channel is disclosed. A first example method disclosed herein includes receiving, at a user equipment (UE), a downlink control channel carrying a physical uplink control channel (PUCCH) resource indicator, mapping the PUCCH resource indicator to a first offset, mapping a position of the downlink control channel to a second offset, and mapping a linear combination of the first and second offsets to an index identifying a first PUCCH resource. A second example method disclosed herein includes, in response to receiving, at a UE, an indication of a dynamic resource offset in an enhanced physical downlink control channel (ePDCCH) transmitted in a first ePDCCH set, determining a position of the ePDCCH and a subframe offset, and processing the indication of the dynamic resource offset, the position and the subframe offset to determine an allocated uplink control channel resource for the UE.
A method at a computing device for finding an association between data objects in a structure, the method including selecting a coordinate location from a grid, the grid defining locations within the structure; finding whether a data object having a data object type is located at the coordinate location; when the data object is located at the coordinate location, associating the data object with other data objects at the coordinate location; and when the data object is not located at the coordinate location: determining through an explicit association that the data object at a second location services the first location; and associating the data object with the coordinate location.
Systems and methods are disclosed for identifying at least one cause of noise in a vehicle audio system. The vehicle audio system may include a plurality of audio channels. Acoustic output may be generated and received through each of the audio channels. Acoustic input may be received from one or more of the audio channels and may be processed to generate processed acoustic input. The processed acoustic input may include a frequency response of the acoustic input. The processed acoustic input may be compared to corresponding channel target input and at least one deviation may be determined. A cause of the at least one deviation may then be determined based on a relationship between the at least one deviation and a set of resolved indications of cause, each of the set of resolved indications of cause corresponding to at least one of a set of recorded causes.
98.
INDIVIDUALIZED AUTOMATIC AUDIO SYSTEM ADJUSTMENT USING INTEGRATED MICROPHONES
Systems and methods are disclosed for identifying at least one cause of noise in a vehicle audio system. The vehicle audio system may include a plurality of audio channels. Acoustic output may be generated and received through each of the audio channels. Acoustic input may be received from one or more of the audio channels and may be processed to generate processed acoustic input. The processed acoustic input may include a frequency response of the acoustic input. The processed acoustic input may be compared to corresponding channel target input and at least one deviation may be determined. A cause of the at least one deviation may then be determined based on a relationship between the at least one deviation and a set of resolved indications of cause, each of the set of resolved indications of cause corresponding to at least one of a set of recorded causes.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
A method of processing data for a driving automation system, the method comprising steps of: obtaining sound data from a microphone of an autonomous vehicle; processing the sound data to obtain a sound characteristic; and updating a context of the autonomous vehicle based on the sound characteristic.
A method of generating a display object is provided, the method comprising operating a first processor comprised within a first device to: execute an application; generate an display object associated with the application; output the active display object on the first device; transmit the display object to a second device for output by the second device; and receive user input to the application via the display object output on the second device.