The present invention generally relates to the field of computer systems maintenance and security. More specifically, the present invention relates to a computer program designed to monitor, troubleshoot, and repair computer systems by utilizing an advanced learning algorithm and a 3D Avatar interface.
This summary is provided to introduce a selection of concepts in a simplified form, that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter. Nor is this summary intended to be used to limit the claimed subject matter's scope.
The present invention, called the Revise Animation Control (TAC) Program, is an advanced, adaptive AI-driven system that leverages deep machine learning to monitor, troubleshoot, and repair computer systems. TAC employs a suite of algorithms for supervision, training, prediction, and reasoning to provide a comprehensive virtual assistant experience. It includes robust security measures, such as antivirus protection, and uses advanced authentication methods, including face scans, finger print and voice recognition, to prevent unauthorized access.
There is a growing demand for a computer program that monitors, troubleshoots, and repairs computer systems through an advanced learning algorithm and a 3D avatar interface.
Modern computer systems face numerous vulnerabilities such as viruses, malware, and unauthorized access. These vulnerabilities pose serious threats to the smooth operation and security of both personal and organizational data. Current solutions, including antivirus programs and system optimization tools, present several significant issues.
Firstly, traditional antivirus and optimization tools often necessitate manual intervention, requiring users to initiate scans, apply fixes, and manage updates. This manual approach can be time-consuming and may lead to human errors. Secondly, existing tools are not always adaptive to new and emerging threats. As cyber threats evolve rapidly, static and non-learning-based systems become inefficient and may fail to protect against the latest vulnerabilities.
Additionally, current solutions typically lack robust learning mechanisms. They do not continuously learn from new data or user behaviors, limiting their ability to improve and respond effectively to new challenges. Many existing tools also have complex interfaces that can be difficult for non-technical users to navigate, leading to poor user engagement and potentially inadequate security practices.
The present invention is intended to solve the problems associated with conventional devices and methods and provide improvements on these devices.
All illustrations of the drawings are for the purpose of describing selected versions of the present invention and are not intended to limit the scope of the present invention.
As a preliminary matter, it will readily be understood by one having ordinary skill in the relevant art that the present disclosure has broad utility and application. As should be understood, any embodiment may incorporate only one or a plurality of the above-disclosed aspects of the disclosure and may further incorporate only one or a plurality of the above-disclosed features. Furthermore, any embodiment discussed and identified as being “preferred” is considered to be part of a best mode contemplated for carrying out the embodiments of the present disclosure. Other embodiments also may be discussed for additional illustrative purposes in providing a full and enabling disclosure. Moreover, many embodiments, such as adaptations, variations, modifications, and equivalent arrangements, will be implicitly disclosed by the embodiments described herein and fall within the scope of the present disclosure.
Accordingly, while embodiments are described herein in detail in relation to one or more embodiments, it is to be understood that this disclosure is illustrative and exemplary of the present disclosure, and are made merely for the purposes of providing a full and enabling disclosure. The detailed disclosure herein of one or more embodiments is not intended, nor is to be construed, to limit the scope of patent protection afforded in any claim of a patent issuing here from, which scope is to be defined by the claims and the equivalents thereof. It is not intended that the scope of patent protection be defined by reading into any claim limitation found herein and/or issuing here from that does not explicitly appear in the claim itself.
Thus, for example, any sequence(s) and/or temporal order of steps of various processes or methods that are described herein are illustrative and not restrictive. Accordingly, it should be understood that, although steps of various processes or methods may be shown and described as being in a sequence or temporal order, the steps of any such processes or methods are not limited to being carried out in any particular sequence or order, absent an indication otherwise. Indeed, the steps in such processes or methods generally may be carried out in various different sequences and orders while still falling within the scope of the present disclosure. Accordingly, it is intended that the scope of patent protection is to be defined by the issued claim(s) rather than the description set forth herein.
Additionally, it is important to note that each term used herein refers to that which an ordinary artisan would understand such term to mean based on the contextual use of such term herein. To the extent that the meaning of a term used herein—as understood by the ordinary artisan based on the contextual use of such term—differs in any way from any particular dictionary definition of such term, it is intended that the meaning of the term as understood by the ordinary artisan should prevail.
Furthermore, it is important to note that, as used herein, “a” and “an” each generally denotes “at least one,” but does not exclude a plurality unless the contextual use dictates otherwise. When used herein to join a list of items, “or” denotes “at least one of the items,” but does not exclude a plurality of items of the list. Finally, when used herein to join a list of items, “and” denotes “all of the items of the list.” The following detailed description refers to the accompanying drawings.
Wherever possible, the same reference numbers are used in the drawings and the following description to refer to the same or similar elements. While many embodiments of the disclosure may be described, modifications, adaptations, and other implementations are possible. For example, substitutions, additions, or modifications may be made to the elements illustrated in the drawings, and the methods described herein may be modified by substituting, reordering, or adding stages to the disclosed methods. Accordingly, the following detailed description does not limit the disclosure. Instead, the proper scope of the disclosure is defined by the claims found herein and/or issuing here from. The present disclosure contains headers. It should be understood that these headers are used as references and are not to be construed as limiting upon the subjected matter disclosed under the header.
The present disclosure includes many aspects and features. Moreover, while many aspects and features relate to, and are described in the context of methods, systems, apparatuses, and devices for monitoring, troubleshooting, and repairing computer systems, embodiments of the present disclosure are not limited to use only in this context.
In general, the method disclosed herein may be performed by one or more computing devices. For example, in some embodiments, the method may be performed by a server computer in communication with one or more client devices over a communication network such as, for example, the Internet. In some other embodiments, the method may be performed by one or more of at least one server computer, at least one client device, at least one network device, at least one sensor, and at least one actuator. Examples of the one or more client devices and/or the server computer may include, a desktop computer, a laptop computer, a tablet computer, a personal digital assistant, a portable electronic device, a wearable computer, a smartphone, an Internet of Things (IoT) device, a smart electrical appliance, a video game console, a rack server, a super-computer, a mainframe computer, mini-computer, micro-computer, a storage server, an application server (e.g. a mail server, a web server, a real-time communication server, an FTP server, a virtual server, a proxy server, a DNS server, etc.), a quantum computer, and so on. Further, one or more client devices and/or the server computer may be configured for executing a software application such as, for example, but not limited to, an operating system (e.g. Windows, Mac OS, Unix, Linux, Android, etc.) in order to provide a user interface (e.g. GUI, touch-screen based interface, voice based interface, gesture based interface, etc.) for use by the one or more users and/or a network interface for communicating with other devices over a communication network. Accordingly, the server computer may include a processing device configured for performing data processing tasks such as, for example, but not limited to, analyzing, identifying, determining, generating, transforming, calculating, computing, compressing, decompressing, encrypting, decrypting, scrambling, splitting, merging, interpolating, extrapolating, redacting, anonymizing, encoding and decoding. Further, the server computer may include a communication device configured for communicating with one or more external devices. The one or more external devices may include, for example, but are not limited to, a client device, a third party database, a public database, a private database, and so on. Further, the communication device may be configured for communicating with the one or more external devices over one or more communication channels. Further, the one or more communication channels may include a wireless communication channel and/or a wired communication channel. Accordingly, the communication device may be configured for performing one or more of transmitting and receiving of information in electronic form. Further, the server computer may include a storage device configured for performing data storage and/or data retrieval operations. In general, the storage device may be configured for providing reliable storage of digital information. Accordingly, in some embodiments, the storage device may be based on technologies such as, but not limited to, data compression, data backup, data redundancy, deduplication, error correction, data finger-printing, role based access control, and so on.
Further, one or more steps of the method disclosed herein may be initiated, maintained, controlled, and/or terminated based on a control input received from one or more devices operated by one or more users such as, for example, but not limited to, an end user, an admin, a creator, fans thereof. Further, the user as defined herein may refer to a human, an animal, or an artificially intelligent being in any state of existence, unless stated otherwise, elsewhere in the present disclosure.
A user 112, such as the one or more relevant parties, may access online platform 100 through a web based software application or browser. The web based software application may be embodied as, for example, but not be limited to, a website, a web application, a desktop application, and a mobile application compatible with a computing device 2600.
The present invention, TAC, learns from diverse data sources, including the internet, videos, and television, to continuously update and enhance its knowledge base.
The present invention autonomously maintains the computer system by managing utilities, applications, and system updates. The present invention proactively identifies and resolves issues to prevent system crashes and ensures efficient operation.
The present invention includes a 3D avatar interface, which enhances the user experience by providing an intuitive and interactive way to manage the health and security of computer systems. The embedded advanced learning algorithms enable the program to monitor, detect, and rectify issues in real-time, improving system performance and security autonomously.
The present invention represents a significant advancement in computer system maintenance and security. The present invention provides a proactive, user-friendly solution designed to safeguard against a wide array of vulnerabilities and evolving threats.
As shown in
Algorithms Configured for Supervision, Training, and Predictions 310
The Supervision, Training, and Predictive Algorithms constitute the backbone of the program, enabling it to comprehend and incorporate new data, thereby enhancing its operational efficacy. These algorithms facilitate the continuous improvement of the program's functionality by utilizing advanced machine learning techniques to interpret and integrate incoming data.
3D Avatar Interface 320
The present invention incorporates a 3D Avatar Interface that furnishes an interactive user experience via speech recognition and synthesized voices. This interface is designed to provide a more engaging and intuitive interaction for users, enhancing the overall usability of the program.
Advanced Security Protocols 330
Included within the present invention are advanced security protocols that utilize facial scans, voice recognition, finger print and ID numbers for user authentication and access restriction. These protocols are specifically designed to ensure secure access and protect the system from unauthorized use.
Processes for Dynamic Updates and Learning 340
The present invention also features dynamic updates and learning processes. This functionality is configured to regularly update the virus definition database, ensuring that the system can adapt to and counteract emerging threats. The continuous learning process enables the system to evolve and maintain its effectiveness against new and evolving cybersecurity threats.
Backup and Recovery Components 350
Furthermore, the present invention includes a backup and recovery component that ensures data integrity and facilitates expedient recovery in the event of system failure. This component is crucial for maintaining the reliability of the system, providing a mechanism for quick restoration of functionality and data integrity in case of unforeseen issues.
Each of these components collectively contributes to the robustness and advanced capabilities of the present invention, ensuring its effectiveness and reliability in various operational contexts.
In some embodiments, the present invention may further comprises several operational features:
In some other embodiments, the present invention may also include applications for the following functions:
In one embodiment, the present invention can be implemented as follows:
In some embodiments, the present invention may include additional features as follows:
Incorporation of Webster Dictionary and Drafting Capabilities (the TAC Program Will Learn from the Webster Dictionary and the Drafting Program on it Own about Robot)
The TAC program can be designed to include a pre-programmed Webster dictionary and drafting functionalities within its application software. This integration allows for enhanced user experience by providing immediate access to vocabulary and drafting tools. The program is capable of automatically training online through the TAC learning module. Leveraging its advanced algorithms and voice recognition technology, the TAC program can autonomously study from free educational resources, such as school and college courses, available via the new TAC Improvement Application. This educational feature becomes accessible once the TAC has completed its essential computer safety functions. In addition, the TAC program dedicates time to its AI antivirus application. Both functionalities work in tandem to answer user queries by searching the internet for accurate information to pass various tests. The UnSupervised Algorithms within the TAC will function independently to automatically search for answers that are unknown to the TAC program, thereby enhancing its knowledge base through integrated learning modalities.
Integration with AI Antivirus Application
The TAC program may incorporate an AI antivirus application designed to scan every accessible free training and college site for potential viruses. This integration ensures that the TAC becomes increasingly intelligent and innovative with each correct query response. The AI-powered antivirus employs non-supervised algorithms, machine learning, behavior analytics, and anomaly detection to train itself. Continuous exposure to an extensive dataset of viruses and hacker information enables the TAC program and its antivirus component to develop an inherent understanding of threat detection and mitigation strategies. This approach allows TAC to autonomously improve its functionality, ensuring comprehensive protection against evolving cybersecurity threats.
Pre-Coded Firewall Comprehension
The TAC startup program can be pre-coded to understand various computer firewall functions, allowing it to select and implement the most appropriate firewalls for comprehensive system protection. Upon initial operation, the program continues to learn and update its firewall systems by notifying users of the most effective firewall options available. During training, the TAC program dedicates effort to safeguarding against hackers, malware, and other types of viruses. To enhance security, the program includes fingerprint recognition features, ensuring that only authorized users can access critical firewall settings and other sensitive functions.
Secure Update Mechanism
The TAC program can be equipped with a unique code, 1953/919, which is essential for incorporating new functionalities. This code allows the rightful purchaser to upload new program codes to the TAC software application, effectively merging new software components with the existing system. Entering the pre-programmed code 1953/919 initiates the TAC-2, which completes and integrates new functions seamlessly. Although this advanced system application is yet to be fully implemented, it holds the potential to revolutionize how TAC operates, enhancing user capabilities and overall program efficiency.
Highlighting and Selective Printing Capability
The TAC program may include a sophisticated highlighting feature designed to facilitate selective printing. Users can highlight sections of text numerically (e.g., 1 for the first section, 2 for the second) to prompt the printer to print only the highlighted segments. This capability makes writing and printing more efficient by ensuring that only essential information is processed for print. For example:
This numerical labeling system allows users to focus on pertinent information, significantly optimizing the printing process by reducing unnecessary output and saving resources.
Artificial Intelligence (AI)
Artificial Intelligence, commonly abbreviated as AI, refers to the field dedicated to creating systems that can perform tasks which normally require human intelligence. Within AI, there is a subfield known as machine learning. Machine learning focuses on creating algorithms that enable machines to learn from data and experiences, improving their ability to perform specific tasks over time.
A key component of machine learning is the artificial neural network (ANN). An ANN is a model inspired by the human brain. It consists of artificial neurons, also called nodes, which are interconnected through synapses. This network structure allows the ANN to solve complex problems. The effectiveness of an ANN depends on its structure, the learning process for updating the network's parameters, and the activation functions that generate its output values.
An ANN typically consists of several layers: an input layer, an output layer, and, in many cases, one or more hidden layers. Each layer includes multiple neurons. Synapses link these neurons, enabling them to communicate. When a neuron receives input signals, it processes these signals by applying weights and biases. Then, it uses an activation function to produce an output.
The model parameters are the values, such as weights and biases, that the ANN learns and adjusts during the training process. Hyperparameters, on the other hand, are settings defined before the training begins. These include the learning rate, the number of training iterations, the size of data batches used in training, and the initialization methods.
The purpose of training an artificial neural network is to determine the best model parameters that minimize a loss function. The loss function serves as a metric to evaluate the performance of the network, guiding it toward optimizing its parameters.
Machine learning techniques can be classified into three main types based on the learning method: supervised learning, unsupervised learning, and reinforcement learning. In supervised learning, the ANN is trained using labeled data, which means the correct answers are provided. Unsupervised learning involves training the ANN with unlabeled data, so it has to identify patterns and structures by itself. Reinforcement learning is a process where an agent learns to take actions in an environment to maximize cumulative rewards. Deep learning is a more advanced subset of machine learning that uses deep neural networks (DNNs) with multiple hidden layers. For the purposes of clarity in this document, the term “machine learning” will be used to refer specifically to deep learning.
The communication device 202 of the present invention may be configured to obtain information regarding a computing device 202 and the surrounding environment. The present invention may utilize this information to operate the computing device 2600 according to an operation feature or to assist a user in operating the computing device 2600. To monitor the computing device 2600, the communication device 202 of the present invention may include one or more sensors that can be installed within the computing device 2600 and communicate with the processing device 204 of the present invention. The present invention may further process the sensor data using the processing device 204 to determine when the computing device 2600 is in operation and information regarding the computing device 2600.
In some embodiments, the communication device 202 may communicate with the processing device 204 via a network. The communication device 202 may communicate with the processing device 204 via the network to allow the storage device 206 to record information regarding computing device usage. The storage device 206 may use one or more servers to receive data from the communication device 202 or the processing device 204, store the received data, process the received data, and/or communicate information associated with the received or processed data.
The communication device (e.g., sensors) 202 may be disposed within or communicatively connected to one or more processing device 204, which may be permanently or removably installed in the computing device 2600. The processing device 204 may interface with the one or more sensors and related devices (e.g., a digital camera, a LIDAR sensor, an ultrasonic sensor, an infrared sensor, an ignition sensor, an odometer, a system clock, a speedometer, a tachometer, an accelerometer, a gyroscope, a compass, a geolocation unit, radar unit, etc.).
The communication device 202 may further include a communication component to transmit information to and receive information from external sources, including internet, video devices or televisions connected to the present invention.
In some embodiments, as shown in
The expert knowledge base module 360 may include data regarding maintenance operation with expert knowledge which can be updated via the communication device 202 (which can obtain information via internet) and, in some embodiments, may provide a maintenance configuration interface, and the user performs operations such as updating and editing on the contents in the expert knowledge base module 360.
The artificial intelligence module 370 can be based on neural networks, pattern recognition, machine learning, genetic algorithms, genetic programming and other artificial intelligence theories to realize signal processing and feature extraction of complex signals, operation state recognition and reliability analysis of the computing device 2600 or similarly complex equipment.
Operation data may include image data from multiple computer components and application. Operation data, in some embodiments, may include sequential temporal data corresponding to observed status of the various computer components of the computing device 2600. As a result, the training data that can be used in the present invention and for a training method may include received sensor data with time-ordered sequences of the extracted performance information (e.g., temporal sequences of observed status of the computing device 2600).
A trained model used in the present invention can be a generative artificial intelligence (AI) model comprising a transformer deep learning neural network.
In some embodiments, the present invention may include a first trained model for training with operation data for finding out faults and a second trained model for training with the operating data after performing the one or more restoration task to repair the faults for finding out proper repairing.
In some embodiments, the storage device 204 may feature a restoration database that comprises a library of restoration (repair) instructions and identification diagrams for various parts and applications. Additionally, the database can facilitate the updating of these parts and applications using predictive algorithms to ensure that updates are consistently maintained. The library of restoration (repair) instructions may include one or more known or predetermined restoration tasks.
As shown in
The baseline data can be related to a baseline operational use of a computing device. The baseline data may include historical computer usage or functional information from internet or a relevant network.
At 403, the method may include detecting a performance change of a component of the computing device based upon the operating data and the baseline data; at 404, generating a first training data; at 405, providing the baseline data as an input to a first trained model, wherein the first trained model is trained with the first training data; at 406, performing diagnosis based on an expert knowledge base module 360, an artificial intelligence module 370, and the first trained module.
The diagnosis is to find out malfunction of the computer components and may include comparison between the baseline data and the detected performance change of a component of the computing device 2600.
At 407, the method may include acquiring a fault recognition algorithm based on performing diagnosis. The fault recognition algorithm can be preset by the user or the system of the present invention or acquired via internet or a network. In some embodiments, the fault recognition algorithm can be identified by an expert knowledge base module 360 and an artificial intelligence module 370 as described above.
At 408, the method may include determining one or more predictions of probabilities of a malfunction of the component based on the fault recognition algorithm; and at 409, determining one or more restoration task to perform based on the one or more predictions and a restoration database; at 410, monitoring the operating data after performing the one or more restoration task. This step 410 is to check if the issues or fault is fixed by the restoration task.
At 411, the method may include generating second training data based on the monitoring of the operating data. The second training data may include received sensor data with time-ordered sequences of the extracted performance information after performing the restoration task, and information related to success or failure of the restoration task in resolving the problems.
At 412, the method may include training the second trained model with the second training data; and at 411, the method may include deploying the second trained model to a restoration device configured to perform the restoration task.
The restoration devices may include software repair programs, hardware repair devices or warning devices which may be preinstalled in a computing device. The restoration task includes troubleshooting, and repairing the computing device.
In some embodiments, the method may further include generating an avatar for display, wherein the avatar is a computer animated graphical representation with speech recognition and synthesized voices. The computing device 2600 may use the data captured by capture device to generate an avatar. The avatar may be three-dimensional. The computing device 2600 may use movement data captured by capture device to understand movements made by the user and to make the avatar make the same movements as the user, a process that may take place in real-time, with a predetermined delay, or at a later point in time.
The method, in some embodiments, may further include receiving user control input of the avatar, the user control input based on detected movements of the user; converting the user control input into avatar movement; and displaying the avatar with the avatar movement.
In some embodiments, the method may further include providing authentication using advanced security protocols that employ face scans, voice recognition, and ID numbers for user authentication and access control. The authentication may include displaying a question for password and IDs that can be preregistered or any other authentication process known in the art. The method may further include displaying a user interface to supply information to and/or receive information; receiving, via the user interface, a submission requesting to generate and train the second trained model for the restoration task.
In some embodiments, the method may further include providing customization options allowing users to add other primary users with permissions through an approval process. The customization options may include displaying questions regarding number of additional users and user profiles.
In some embodiments, the restoration task may include providing updates and learning mechanisms that enable the program to counter new threats by regularly updating its virus definition database. The updates an be done by replacing the old version to a new version and the learning mechanism can be the usage duration of the old version without updates and historical number of updates to learn update needs.
In some embodiments, the restoration task may include providing security measures that automatically scan documents and websites for safety. The security measures can be providing virus scan software known in the art using the real time internet search or based on the expert knowledge base module, that can be run under the user permissions.
In some embodiments, the restoration task may include providing a backup and recovery system that ensures data integrity and facilitates quick recovery in case of failure. The backup and recovery system can be a backup and recovery software or similar functioning software known in the art.
In some embodiments, the restoration task may include providing energy-efficient modes that conserve power by entering sleep mode and shutting down during periods of inactivity. The energy-efficient modes can be configured to turn on the sleep mode or shut down when computing device is used by an application or the user.
In some embodiments, the method may include updating the library of restoration instructions s with data retrieved from internet and communication with video device and televisions. The library of restoration (repair) instructions may include how the identified problem should be solved by which restoration tasks or which repair software.
In one embodiment, the present invention provides an artificial intelligence apparatus for generating training data, comprising: a memory configured to store a target artificial intelligence model; and a processor configured to perform the method described above.
With reference to
Computing device 2600 may have additional features or functionality. For example, computing device 2600 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Such additional storage is illustrated in
Computing device 2600 may also contain a communication connection 2616 that may allow device 2600 to communicate with other computing devices 2618, such as over a network in a distributed computing environment, for example, an intranet or the Internet. Communication connection 2616 is one example of communication media. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media. The term computer readable media as used herein may include both storage media and communication media.
As stated above, a number of program modules and data files may be stored in system memory 2604, including operating system 2605. While executing on processing unit 2602, programming modules 2606 may perform processes including, for example, one or more stages of methods, algorithms, systems, applications, servers, databases as described above. The aforementioned process is an example, and processing unit 2602 may perform other processes. Other programming modules that may be used in accordance with embodiments of the present disclosure may include machine learning applications.
Generally, consistent with embodiments of the disclosure, program modules may include routines, programs, components, data structures, and other types of structures that may perform particular tasks or that may implement particular abstract data types. Moreover, embodiments of the disclosure may be practiced with other computer system configurations, including hand-held devices, general purpose graphics processor-based systems, multiprocessor systems, microprocessor-based or programmable consumer electronics, application specific integrated circuit-based electronics, minicomputers, mainframe computers, and the like. Embodiments of the disclosure may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
Furthermore, embodiments of the disclosure may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. Embodiments of the disclosure may also be practiced using other technologies capable of performing logical operations such as, for example, AND, OR, and NOT, including but not limited to mechanical, optical, fluidic, and quantum technologies. In addition, embodiments of the disclosure may be practiced within a general-purpose computer or in any other circuits or systems.
Embodiments of the disclosure, for example, may be implemented as a computer process (method), a computing system, or as an article of manufacture, such as a computer program product or computer readable media. The computer program product may be a computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process. The computer program product may also be a propagated signal on a carrier readable by a computing system and encoding a computer program of instructions for executing a computer process. Accordingly, the present disclosure may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). In other words, embodiments of the present disclosure may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. A computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific computer-readable medium examples (a non-exhaustive list), the computer-readable medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a random-access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CD-ROM). Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
While certain embodiments of the disclosure have been described, other embodiments may exist. Furthermore, although embodiments of the present disclosure have been described as being associated with data stored in memory and other storage mediums, data can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, solid state storage (e.g., USB drive), or a CD-ROM, a carrier wave from the Internet, or other forms of RAM or ROM. Further, the disclosed methods' stages may be modified in any manner, including by reordering stages and/or inserting or deleting stages, without departing from the disclosure.
Although the invention has been explained in relation to its preferred embodiment, it is to be understood that many other possible modifications and variations can be made without departing from the spirit and scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
8018860 | Cook | Sep 2011 | B1 |
8973133 | Cooley | Mar 2015 | B1 |
9038180 | Neil | May 2015 | B2 |
9439081 | Knebl | Sep 2016 | B1 |
9472084 | Barak | Oct 2016 | B1 |
9594624 | Charters | Mar 2017 | B2 |
9612896 | Traylor | Apr 2017 | B1 |
10048996 | Bell | Aug 2018 | B1 |
10050987 | Mohta | Aug 2018 | B1 |
10268709 | Suehs | Apr 2019 | B1 |
10353764 | Cazzanti | Jul 2019 | B1 |
10642719 | Balasubramanian | May 2020 | B1 |
10691528 | Ferreira | Jun 2020 | B1 |
10747544 | Balasubramanian | Aug 2020 | B1 |
10771489 | Bisht | Sep 2020 | B1 |
10970183 | Aberg | Apr 2021 | B1 |
11012454 | Han | May 2021 | B1 |
11113144 | Gadepalli | Sep 2021 | B1 |
11126486 | Ganesan | Sep 2021 | B2 |
11200137 | Serita | Dec 2021 | B1 |
11457031 | Bisht | Sep 2022 | B1 |
11552975 | Zhang | Jan 2023 | B1 |
11636004 | Ni | Apr 2023 | B1 |
12013824 | Reeves | Jun 2024 | B1 |
12057993 | Zafer | Aug 2024 | B1 |
12086024 | Yang | Sep 2024 | B2 |
20040117153 | Siegel | Jun 2004 | A1 |
20060153089 | Silverman | Jul 2006 | A1 |
20060195745 | Keromytis | Aug 2006 | A1 |
20060259274 | Greco | Nov 2006 | A1 |
20070055914 | Chandwani | Mar 2007 | A1 |
20080021883 | Alstrin | Jan 2008 | A1 |
20090204382 | Tung | Aug 2009 | A1 |
20140122546 | Liao | May 2014 | A1 |
20140281713 | Hampapur | Sep 2014 | A1 |
20140372091 | Larimore | Dec 2014 | A1 |
20150199223 | Banerjee | Jul 2015 | A1 |
20150339414 | Kuo | Nov 2015 | A1 |
20160266962 | Rajasekharan | Sep 2016 | A1 |
20160269436 | Danielson | Sep 2016 | A1 |
20160300049 | Guedalia | Oct 2016 | A1 |
20170052814 | Aguiar | Feb 2017 | A1 |
20170083822 | Adendorff | Mar 2017 | A1 |
20170249234 | Kalech | Aug 2017 | A1 |
20170300018 | Block | Oct 2017 | A1 |
20170364402 | Chua | Dec 2017 | A1 |
20180032405 | Chen | Feb 2018 | A1 |
20180197092 | Acar | Jul 2018 | A1 |
20190087249 | Togawa | Mar 2019 | A1 |
20190095265 | Dome | Mar 2019 | A1 |
20190155271 | Matthews | May 2019 | A1 |
20190163666 | Cakmak | May 2019 | A1 |
20190340392 | Khorrami | Nov 2019 | A1 |
20190342308 | Chai | Nov 2019 | A1 |
20190361784 | Savanur | Nov 2019 | A1 |
20190377625 | Chintalapati | Dec 2019 | A1 |
20190384257 | Zhang | Dec 2019 | A1 |
20200089558 | Stankevichus | Mar 2020 | A1 |
20200097347 | Mahindru | Mar 2020 | A1 |
20200097348 | Mahindru | Mar 2020 | A1 |
20200118665 | Bender | Apr 2020 | A1 |
20200133758 | Liu | Apr 2020 | A1 |
20200137094 | Janakiraman | Apr 2020 | A1 |
20200152328 | Bender | May 2020 | A1 |
20200167259 | Cannata | May 2020 | A1 |
20200220892 | Gibson | Jul 2020 | A1 |
20200293657 | Chai | Sep 2020 | A1 |
20200371509 | Mark | Nov 2020 | A1 |
20210064456 | Shetty | Mar 2021 | A1 |
20210184916 | Ramanujan | Jun 2021 | A1 |
20210304061 | Kolar | Sep 2021 | A1 |
20210342204 | Choudhury | Nov 2021 | A1 |
20210357282 | Verma | Nov 2021 | A1 |
20210374568 | Vishwakarma | Dec 2021 | A1 |
20210383706 | Gibbons, II | Dec 2021 | A1 |
20210389894 | Zhou | Dec 2021 | A1 |
20210406727 | Wang | Dec 2021 | A1 |
20220004429 | Bhamidipaty | Jan 2022 | A1 |
20220027199 | Desikachari | Jan 2022 | A1 |
20220029902 | Shemer | Jan 2022 | A1 |
20220043703 | Hwang | Feb 2022 | A1 |
20220058099 | Damera Venkata | Feb 2022 | A1 |
20220067460 | Raj | Mar 2022 | A1 |
20220091923 | O'Toole | Mar 2022 | A1 |
20220253522 | Yang | Aug 2022 | A1 |
20220345475 | Otto | Oct 2022 | A1 |
20230018199 | Mahamuni | Jan 2023 | A1 |
20230044470 | Singla | Feb 2023 | A1 |
20230055527 | Majithia | Feb 2023 | A1 |
20230069498 | Wiranata | Mar 2023 | A1 |
20230087336 | Hadlock | Mar 2023 | A1 |
20230095870 | Du | Mar 2023 | A1 |
20230116207 | Paduvalli | Apr 2023 | A1 |
20230153191 | Gennetten | May 2023 | A1 |
20230153223 | Sankaranarayanan | May 2023 | A1 |
20230177152 | Lee | Jun 2023 | A1 |
20230188408 | Pick | Jun 2023 | A1 |
20230195558 | Purushothaman | Jun 2023 | A1 |
20230208869 | Bisht | Jun 2023 | A1 |
20230229220 | Suryanarayana | Jul 2023 | A1 |
20230231860 | Tian | Jul 2023 | A1 |
20230289327 | Patel | Sep 2023 | A1 |
20230396511 | Zhou | Dec 2023 | A1 |
20230396512 | Malleshaiah | Dec 2023 | A1 |
20230409412 | Kruegel | Dec 2023 | A1 |
20230418722 | Aird | Dec 2023 | A1 |
20240005177 | Singh | Jan 2024 | A1 |
20240005199 | Butvinik | Jan 2024 | A1 |
20240073107 | Kochiev | Feb 2024 | A1 |
20240089277 | Friedlander | Mar 2024 | A1 |
20240103959 | Murali | Mar 2024 | A1 |
20240135242 | Yogaraj | Apr 2024 | A1 |
20240143993 | Schneuwly | May 2024 | A1 |
20240256945 | Mantravadi | Aug 2024 | A1 |
20240267239 | Zoldi | Aug 2024 | A1 |
20240281522 | Kuo | Aug 2024 | A1 |
20240281661 | Gottin | Aug 2024 | A1 |
Number | Date | Country |
---|---|---|
111786949 | Oct 2020 | CN |
108933791 | Feb 2021 | CN |
113961939 | Jan 2022 | CN |
110795917 | Oct 2023 | CN |
3002648 | Jun 2021 | EP |