Scenera, Inc. (Palo Alto, CA)

Security and access control are offered to sensors, data gathered by sensors, as well as the results of processing that data. In one sense, SceneData related to a Scene is obtained from the sensor-side technology stack, and at least a portion of the SceneData is secured with encryption, such as. Different SceneData are protected with different levels of security. This gives you granular security. A separate privacy management system is employed to protect information. Another benefit is that sensors are secure against threats coming from the external network. The security layer of the device is comprised of an execution environment and an independent layer for network management. This safeguards the environment for execution from threats from the outside network. In one configuration, the sensor device is divided into a trusted region as well as a non-trusted area, and the security layer of the network is integrated within the region that is trusted.

1. Field of the Invention

This disclosure relates generally to protecting sensor devices and information from sensor devices, including cameras for example.

2. Description of Related Art

There are currently thousands of cameras as well as other sensors. Camera images aren’t in a position to be manipulated in meaningful ways by computers. Camera data is not processed in real-time , and the majority of photos captured by cameras are only utilized for forensic reasons after an incident has occurred. This results in a lot of data being wasted on video that is not relevant to the analysis. Human monitoring is usually required to understand video. Machine assistance is not sufficient to comprehend and understand the information contained in videos.

The issue with modern-day information processing is its highly application-specific nature. Software that is designed for specific applications typically comes as an entire stack that starts with sensors that have low-level interfaces and moves through various levels of analysis until reaching the desired results. The development of software that uses sensors networks is difficult and slow. The applications are also not able to utilize the analysis carried out by different applications.

Applications are able to communicate sensor data and provide access to sensors in very limited situations. The sharing of data is generally done with minimal security precautions. Cameras and other sensors that are accessible over networks could create security vulnerabilities. This applies not only to the particular device but also to the larger network. Furthermore, access to sensors and data is distributed in an application-specific way. Access rights as well as other restrictions are customized for each app. This makes sharing more challenging and complicated.

That’s why sensor networks devices and the data they store require more advanced security measures. They also need greater flexibility and ease in creating those security measures.

This disclosure addresses the deficiencies of the prior art by providing access control and security to sensor devices as well as the data collected by them, and the results of analyzing and processing that data.

Another aspect is SceneData that is related to Scenes is requested through a sensor-side technology stack. At a minimum, SceneData is secured with encryption. Different SceneData can be protected separately and with different levels of security, thus providing fine-grained security of the SceneData. Other data, for instance, MetaData or SceneMarks are also protected. The SceneData that is provided by the sensor-side technology stack is usually made up of a range of kinds of sensor data that are captured by the sensor group. It generally requires processing or analysis of the collected sensor data. The SceneData is separated into SceneShots, which represent samples of the Scene. Security can be applied at various levels of analysis and processing. An additional privacy management system is a different way to ensure data security.

In another aspect, sensors themselves are protected against network-wide threats. The execution environment and the layers of management for networks are part of the sensor device. The execution environment allows the sensor device in order to collect sensor data. The layer that manages networks acts as an interface between sensor devices and the external network. It is distinct from the network management layers. The network management layer includes a network security stack which shields the operating environment against threats from external networks. In one configuration the device that is used for sensor detection is divided into a trusted region and the non-trusted area, and the network security stack is installed within the trusted region.

Other aspects include components and devices, systems, and improvements. Methods and processes, applications. Computer-readable media. Other technologies that are connected to one or more of the above.

Click here to view the patent on USPTO website.

 

Get Patents with PatentPC

What is a patent?

Granted by the government to safeguard an invention, a patent provides the inventor with the exclusive right to develop, utilize, sell and promote the invention? society gains when a innovative technology is introduced into the marketplace. The benefits can be directly realized when people can achieve previously impossible feats or through the economic opportunities which innovation can bring (business growth, jobs).

Many pharmaceutical companies and researchers at universities seek patent protection for their research and developments. A patent can cover a physical or abstract process or product, or even a technique or composition of materials that are new to the area. Patent protection must be granted to any invention that is valuable, novel, and not previously known to others in the same field.

Patents recognize and reward inventors for their commercially successful inventions. They act as a motivator for inventors to come up with new ideas. Small companies and inventors are assured that they will get a return on their investment in technology advancement through patents. They can earn a living from their work.

Businesses that have the capacity to:

Protect your innovative products and services.

Increase the visibility and value of your products ‘ presence on the market

Your business and your products should be distinguished from the rest;

Access to business and technical knowledge and data;

Beware of the possibility of accidentally using proprietary third-party content, or losing valuable information, innovative outputs, or another creative output.

Patents effectively transform the inventor’s knowledge into a commercially tradeable asset which opens new opportunities to create jobs and boost expansion of businesses by licensing or joint ventures.

Small-scale businesses with patent protection are more attractive to investors involved in the commercialization and development of technology.

Patents can spark innovative ideas and inventions. This information could be eligible for protection under patents.

Patents can be used to prevent untrustworthy third-party companies from earning through the work of inventions.

The profits from technology patents that are successful and commercially viable can be used to fund the development of technology through research and development (R&D) and increase the chance of better technology in the coming years.

Intellectual ownership of property can be used to convince investors and lenders that there are genuine opportunities to market your product. One powerful patent may lead to many financing opportunities. Patents and other IP assets can be utilized as collateral or security for financing debt. Investors can also see your patent assets to increase the value of your company. Forbes and other publications have noted that each patent could increase the value of a company by anything from $500,000 to $1 Million.

A solid business plan is vital for new businesses. It should be based on IP and demonstrate what your service or product stands out. In addition, investors will be impressed when you demonstrate that your IP rights are secured or are on the verge of becoming secure and that they support your business strategy.

It is crucial to keep your invention secret until you apply for patent protection. A public disclosure of an invention, before it is filed, can often ruin its novelty and make it invalid. Therefore, pre-filing disclosures (e.g. for test-marketing investors, investors, or for other business partners) must only be done following the signing of a confidentiality agreement.

There are many kinds of patents. Understanding the different types of patents is vital to safeguard your invention. Patents for utility cover methods and inventions made by machines. Design patents cover ornamental designs. Patents for utility are the most effective as they protect the owner from copycats as well as other competition. Frequently the utility patent is issued to improve or modify existing inventions. Utility patents can also be used to improve or alter existing inventions. A process patent could describe the methods or actions of performing a specific act. However, a chemical composition will include a combination of components.

What is the average length of a patent? While utility patents are valid up to 20 years from the initial filing, they can be extended through delays in the Patent Office.

Are you interested in patenting your ideas? Patents are only granted to the first-to-file applicants which is why you must file as quickly as possible. Call PatentPC now to have your patent application submitted!

A patent search is essential when you’re preparing a patent application. This allows you to look at different ideas and provide insight into their creations. This allows you to restrict the potential of your idea. You can also find out about the latest developments in your field of invention. You’ll have a better idea of what your invention ought to be and will be better prepared to write your patent application.

How to Search for Patents

The first step in getting your patent is to do an internet search for patents. You can do a google patent search or do a USPTO search. Patent-pending refers to the product included in the patent application. You can use for the public pair to locate the patent application. When the patent office is satisfied with your application, you’ll be able do an examination of the patent number to discover the patent issued. Your product now has the potential to be patentable. Alongside the USPTO search engine, you can also utilize other search engines, such as espacenet, which is described below. For assistance, consult an attorney for patents. Patents granted in the United States are granted by the US trademark and patent office, or the United States patent office. The office also examines trademark applications.

Are you interested in similar patents? Here are the steps to follow:

1. Think of terms that describe your invention, based on its purpose, composition, or use.

Write down a concise, precise description of your idea. Avoid using generic terms like “device,” “process,” and “system.” Instead, think about synonyms for the terms you chose initially. Also, keep track of significant technical terms as well as keywords.

Utilize the following questions to help you find key words or concepts.

  • What is the goal of the invention? Is it a utilitarian device or an ornamental design?
  • Invention is a method to create something or perform a function? Is it a product or process?
  • What is the structure of the invention? What is the physical makeup of the invention?
  • What’s the objective of the invention?
  • What are the terms and phrases in the field of technology used to define the nature of an invention? To find the correct terms, consult an online dictionary of technical terms.

2. These terms allow you to find relevant Cooperative Patent Classifications on the Classification Search Tool. To determine the most suitable classification for your invention, scan the class scheme of the classification (class schedules). You may want to consider substituting the terms that you’ve used for describing your invention, if you fail to get any results from your Classification Text Search with synonyms similar to the words you used in the first step.

3. Examine the CPC Classification Definition to verify the validity of the CPC classification that you have located. If the chosen classification has a blue box with an “D” to its left, the hyperlink will direct you to the CPC classification definition. CPC classification definitions can help determine the scope of the classification which is why you can be certain to choose the one that is pertinent. These definitions may also include some search tips or other recommendations that could be helpful for further investigation.

4. Find patent documents that have the CPC classification from the Patents Full-Text and Image Database. You can look through and select the relevant patent publications focusing first on the abstract and the drawings that are representative.

5. Use this selection of the most relevant patent publications to examine each in detail for similarity to your invention. Take note of the specifications and claims. It is possible to find additional patents by consulting the patent examiner and applicant.

6. You can retrieve patent applications published in the past that fit the CPC classification you picked in Step 3. You can use the same strategy of searching as Step 4, narrowing your search results to the most pertinent patent applications through the abstract and drawings that appear on each page. After that, you must review all published patent applications carefully, paying special attention to the claims as well as other drawings.

7. Find additional US patents by keyword searching in PatFT or AppFT databases, classification search of non-U.S. patents according to below, and searching for non-patent literature disclosures of inventions using internet search engines. For example:

  • Add keywords to your search. Keyword searches may turn up documents that are not well-categorized or have missed classifications during Step 2. For example, US patent examiners often supplement their classification searches with keyword searches. Think about the use of technical engineering terminology rather than everyday words.
  • Search for foreign patents using the CPC classification. Then, re-run the search using international patent office search engines such as Espacenet, the European Patent Office’s worldwide patent publication database of over 130 million patent publications. Other national databases include:
  • Search non-patent literature. Inventions can be made public in many non-patent publications. It is recommended that you search journals, books, websites, technical catalogs, conference proceedings, and other print and electronic publications.

To review your search, you can hire a registered patent attorney to assist. A preliminary search will help one better prepare to talk about their invention and other related inventions with a professional patent attorney. In addition, the attorney will not spend too much time or money on patenting basics.