Google Patent Applications
Google patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250053654Abstract: A method for identifying malicious software includes receiving and executing a software application, identifying a plurality of uniform resource identifiers the software application interacts with during execution of the software application, and generating a vector representation for the software application using a feed-forward neural network configured to receive the plurality of uniform resource identifiers as feature inputs. The method also includes determining similarity scores for a pool of training applications, each similarity score associated with a corresponding training application and indicating a level of similarity between the vector representation for the software application and a respective vector representation for the corresponding training application.Type: ApplicationFiled: October 24, 2024Publication date: February 13, 2025Applicant: Google LLCInventors: Richard Cannings, Sai Deep Tetali, Mo Yu, Salvador Mandujano
-
Publication number: 20250054022Abstract: The present disclosure provides a closed loop, self-learning system that automatically optimizes what experiences should be presented to each customer. Instead of relying on rules and external targeting, it observes customer reactions to continuously improve performance and adapt to environment changes.Type: ApplicationFiled: December 15, 2022Publication date: February 13, 2025Applicant: Google LLCInventors: Dimitris Meretakis, Zigmars Rasscevskis, Vinsensius B. Vega S. Naryanto, Tom Beyer, Szabolcs Payrits, Martin Stolle, Mark Steven Schadler, Jack Willow Waldron, Ali Galip Bayrak
-
Publication number: 20250055507Abstract: Techniques and apparatuses are described for multiple-input multiple-output transmissions using adaptive phase-changing devices. In aspects, a base station selects one or more adaptive phase-changing devices, APDs, to use in at least one communication path for multiple-input, multiple-output, MIMO, transmissions. The base station can perform a channel characterization process for the at least one communication path using the at least one APD and at least one UE. Based on results of the channel characterization process, the base station configures the at least one APD by which to implement single user-MIMO communication with a UE or multiple user-MIMO communication with multiple UEs. By so doing, the base station may implement MIMO transmissions using APDs to communicate with the at least one UE using same time and frequency resources, which can improve spectral efficiency of a wireless network.Type: ApplicationFiled: December 22, 2022Publication date: February 13, 2025Applicant: Google LLCInventors: Jibing Wang, Erik Richard Stauffer
-
Publication number: 20250047980Abstract: This disclosure describes a method to calibrate a position of an optical image stabilization (OIS) lensing element 308 based on an electric current reading of one or more areas of a mobile imaging device 200. The position is a deviation from a center position, where the OIS lensing element 308 is not influenced by a force. A coupling compensation coefficient is generated based on the electric current reading. A derived value for the position is adjusted based on the coupling compensation coefficient. A scaling sensitivity coefficient is generated based on the electric current reading. The derived value for the position is further adjusted based on the scaling sensitivity coefficient. The coupling compensation coefficient and the scaling sensitivity coefficient are further based on maximum and minimum values for the Hall Effect sensor at the temperature reading and a calibration temperature.Type: ApplicationFiled: October 3, 2024Publication date: February 6, 2025Applicant: Google LLCInventor: Jin Yu Lee
-
Publication number: 20250045367Abstract: A method includes processing, using a speech recognizer, a first portion of audio data to generate a first lattice, and generating a first partial transcription for an utterance based on the first lattice. The method includes processing, using the recognizer, a second portion of the data to generate, based on the first lattice, a second lattice representing a plurality of partial speech recognition hypotheses for the utterance and a plurality of corresponding speech recognition scores. For each particular partial speech recognition hypothesis, the method includes generating a corresponding re-ranked score based on the corresponding speech recognition score and whether the particular partial speech recognition hypothesis shares a prefix with the first partial transcription.Type: ApplicationFiled: August 2, 2023Publication date: February 6, 2025Applicant: Google LLCInventors: Daniel V. Klein, Ramprasad Sedouram
-
Publication number: 20250045326Abstract: A method for handling contradictory queries on a shared device includes receiving a first query issued by a first user, the first query specifying a first long-standing operation for a digital assistant to perform, and while the digital assistant is performing the first long-standing operation, receiving a second query, the second query specifying a second long-standing operation for the digital assistant to perform. The method also includes determining that the second query was issued by another user different than the first user and determining, using a query resolver, that performing the second long-standing operation would conflict with the first long-standing operation. The method further includes identifying one or more compromise operations for the digital assistant to perform, and instructing the digital assistant to perform a selected compromise operation among the identified one or more compromise operations.Type: ApplicationFiled: October 18, 2024Publication date: February 6, 2025Applicant: Google LLCInventors: Matthew Sharifi, Victor Carbune
-
Publication number: 20250045184Abstract: A method includes obtaining a pre-trained machine learning model and a training embedding snapshot from a remote system, and obtaining one or more input data samples captured by a user device. The method includes, for each particular input data sample of the one or more input data samples, processing, using an on-device machine learning model corresponding to the pre-trained machine learning model, the particular input data sample to generate a corresponding on-device embedding and one or more corresponding predicted outputs, and generating, using the training embedding snapshot and the corresponding on-device embedding, corresponding performance data. The method includes aggregating the corresponding performance data for the one or more input data samples to determine one or more performance metrics for the on-device machine learning model, and transmitting the one or more performance metrics to the remote system.Type: ApplicationFiled: August 3, 2023Publication date: February 6, 2025Applicant: Google LLCInventor: Hari Bhaskar Sankaranarayanan
-
Publication number: 20250045059Abstract: A method including receiving, from a developer device, a request to build an execution environment for a software application, the software application comprising a manifest of dependencies. The method also includes generating, using a bootstrap execution environment based on the manifest of dependencies, the execution environment for the software application comprising a set of application dependencies, and storing the execution environment at a data store. The method further includes executing the software application in the execution environment.Type: ApplicationFiled: October 22, 2024Publication date: February 6, 2025Applicant: Google LLCInventors: Dominic Kramer, Ryan Day
-
Publication number: 20250047508Abstract: Permission control and management for messaging application bots is described. A method can include providing a messaging application, on a first computing device associated with a first user, to enable communication between the first user and another user, and detecting, at the messaging application, a user request. The method can also include programmatically determining that an action in response to the user request requires access to data associated with the first user, and causing a permission interface to be rendered in the messaging application, the permission interface enabling the first user to approve or prohibit access to the data associated with the first user. The method can include accessing the data associated with the first user and performing the action in response to the user request, upon receiving user input from the first user indicating approval of the access to the data associated with the first user.Type: ApplicationFiled: October 21, 2024Publication date: February 6, 2025Applicant: Google LLCInventors: Shelbian Fung, Richard Dunn, Anton Volkov, Adam Rodriguez
-
Publication number: 20250045448Abstract: A method for sharing read access to a document stored on memory hardware. The method includes receiving a shared read access command from a sharor sharing read access to a sharee for a document stored on memory hardware in communication with the data processing hardware, and receiving a shared read access request from the sharee. The shared read access command includes an encrypted value and a first cryptographic share value based on a write key, a read key, a document identifier, and a sharee identifier. The method also includes multiplying the first and second cryptographic share values to determine a cryptographic read access value. The cryptographic read access value authorizes read access to the sharee for the document. The method also includes storing a read access token for the sharee including the cryptographic read access value and the encrypted value in a user read set of the memory hardware.Type: ApplicationFiled: October 22, 2024Publication date: February 6, 2025Applicant: Google LLCInventors: Kevin Yeo, Sarvar Patel, Giuseppe Persiano
-
Publication number: 20250046241Abstract: This document describes systems and techniques directed at zonal attenuation compensation. In aspects, a system includes a graphics processing unit configured to provide image data to a display panel. A zonal attenuation module is configured to combine a zonal attenuation mask with the image data to generate masked image data, the masked image data having a reduced brightness for portions of data corresponding to one or more regions on the display panel based on the zonal attenuation mask. An inverse zonal attenuation module is configured to apply an inverse zonal attenuation mask to the masked image data to reduce a brightness for additional portions of data corresponding to one or more additional regions on the display panel effective to offset increased brightness in the one or more additional regions on the display panel.Type: ApplicationFiled: July 22, 2024Publication date: February 6, 2025Applicant: Google LLCInventors: Hyunchul Kim, Chien-Hui Wen, Ken Kok Foo
-
Publication number: 20250046296Abstract: A method, device, and computer-readable storage medium for predicting pronunciation of a text sample. The method includes selecting a predicted text sample corresponding to an audio sample, receiving a correction text sample corresponding to the audio sample, updating an encoding of allowable pronunciations of the correction text sample based on the predicted text sample and the audio sample, the updated encoding of allowable pronunciations of the correction text sample including a pronunciation of the predicted text sample, and predicting a pronunciation of the correction text sample based on the updated encoding of allowable pronunciations of the correction text sample.Type: ApplicationFiled: July 31, 2023Publication date: February 6, 2025Applicant: GOOGLE LLCInventors: Leonid VELIKOVICH, Ágoston WEISZ
-
Publication number: 20250036596Abstract: A method for in process asynchronous out of memory logs for remote containerized deployments includes executing a container process within a container. The method further includes, writing, by the container process, a log of the container process to a first log file. The method also includes storing, by the container process, the first log file at non-volatile memory mounted to the container. The method includes determining, by the container process, that the first log file satisfies a threshold size. In response to determining that the first log file satisfies the threshold size, the method includes writing the log of the container process to a second log file, compressing the first log file into a first compressed log file, and transmitting the first compressed log file to a remote endpoint.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Applicant: Google LLCInventors: Alankrit Kharbanda, Aj Ortega
-
Publication number: 20250039590Abstract: This document describes systems and techniques for determining whether an earbud is removed from within an ear of a user. The systems and techniques employ an earbud including a housing having a distal end and a proximal end. The distal end includes a magnetically-sensitive section, the distal end of the housing being configured to be magnetically attracted to a charging receptacle and insertable within an ear of a user. On-head detection (OHD) logic is electrically coupled to the magnetically-sensitive section at the distal end, the OHD logic configured to determine based on a distal-end capacitance measured using the magnetically-sensitive section whether the distal end of the housing is within the ear of the user.Type: ApplicationFiled: July 10, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Yao Ding, Tauseef Muzaffar
-
Publication number: 20250036567Abstract: A method for providing elastic columnar cache includes receiving cache configuration information indicating a maximum size and an incremental size for a cache associated with a user. The cache is configured to store a portion of a table in a row-major format. The method includes caching, in a column-major format, a subset of the plurality of columns of the table in the cache and receiving a plurality of data requests requesting access to the table and associated with a corresponding access pattern requiring access to one or more of the columns. While executing one or more workloads, the method includes, for each column of the table, determining an access frequency indicating a number of times the corresponding column is accessed over a predetermined time period and dynamically adjusting the subset of columns based on the access patterns, the maximum size, and the incremental size.Type: ApplicationFiled: October 14, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Anjan Kumar Amirishetty, Xun Cheng, Viral Shah
-
Publication number: 20250036501Abstract: A method includes determining a cluster reliability of a computing cluster including a maximum computing capacity and representative of a reliability of the computing cluster when utilizing an entirety of the maximum computing capacity. The operations include receiving a provisioning request of the computing cluster including a threshold reliability of the computing cluster. In response to the provisioning request, determining, using the cluster reliability, a reserved computing capacity of the computing cluster based on the threshold reliability. The reserved computing capacity is less than the maximum computing capacity. Based on the reserved computing capacity and the maximum computing capacity, the operations include determining an unreserved computing capacity of the computing cluster. The operations include provisioning the computing cluster for execution of a user workload. The user workload executes on the unreserved computing capacity.Type: ApplicationFiled: October 11, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Gobind Jit Singh Johar, Stephen James Muir, Philip William Stoneman, William Mark Pulford, Jonathan Buckley, Bodie William Francis, Andrew Oates
-
Publication number: 20250037700Abstract: A method includes receiving a reference audio signal corresponding to reference speech spoken by a target speaker with atypical speech, and generating, by a speaker embedding network configured to receive the reference audio signal as input, a speaker embedding for the target speaker. The speaker embedding conveys speaker characteristics of the target speaker. The method also includes receiving a speech conversion request that includes input audio data corresponding to an utterance spoken by the target speaker associated with the atypical speech. The method also includes biasing, using the speaker embedding generated for the target speaker by the speaker embedding network, a speech conversion model to convert the input audio data corresponding to the utterance spoken by the target speaker associated with atypical speech into an output canonical representation of the utterance spoken by the target speaker.Type: ApplicationFiled: October 17, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Fadi Biadsy, Dirk Ryan Padfield, Victoria Zayats
-
Publication number: 20250032011Abstract: This document describes techniques and devices for blood-solute calculation with a mobile device using non-invasive spectroscopy. A mobile device includes a light source that emits light toward an interferometer that uses mirrors to separate and recombine the light. The interferometer directs the recombined light toward a person. Light reflected from, or transmitted through, the person is received through a reception port to a photodetector that outputs photodetector data that corresponds to a measured light intensity of the reflected and transmitted light as a function of a path length of the light or a mirror position of the interferometer. Based on the photodetector data, an interferogram is generated. Applying a technique such as a Fourier transform to the interferogram, a spectrum data set of the reflected and transmitted light is generated. Based on the spectrum data set, a concentration of solutes in the person's blood is calculated.Type: ApplicationFiled: October 17, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Christopher David Workman, Ricky Bomber, Kelly Dobson
-
Publication number: 20250039186Abstract: A method includes assigning a plurality of workloads to an isolated secure compute environment on a distributed computing system based on respective security criteria for each of the plurality of workloads, the isolated secure compute environment isolated from one or more other isolated secure compute environments on the distributed computing system. While executing the plurality of workloads in the isolated secure compute environment on the distributed computing system, the method also includes determining resource utilization for the isolated secure compute environment, and adjusting, using the determined resource utilization, a number of computing resources assigned to the isolated secure compute environment.Type: ApplicationFiled: October 18, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Rainer Wolafka, Aaron Joyner, Ken Stillson, Michael Czapinski
-
Publication number: 20250039085Abstract: A method for a virtual network of a mobile device includes, for the mobile device executing a user application and simultaneously connected to a first wireless network and a second wireless network, selecting a remote server from a plurality of remote servers. The method also includes establishing the virtual network between the mobile device and the selected remote server. The virtual network includes at least one tunnel between the mobile device and the selected remote server over the first wireless network and the second wireless network. The method also includes transmitting data from the user application to the selected remote server over the virtual network. The data, when received by the selected remote server, causes the selected remote server to route the data to a destination server.Type: ApplicationFiled: October 11, 2024Publication date: January 30, 2025Applicant: GOOGLE LLCInventors: Benedict Seng Sum Wong, Nathan C. Harold
-
Publication number: 20250039260Abstract: A method for on demand serverless container based storage transfer includes receiving a request to transfer data from a first device to a second device, the first device hosted at a private cloud, the private cloud isolated from the Internet. The method includes determining that the first device is communicatively connected to the private cloud. The method also includes, in response to determining that the first device is communicatively connected to the private cloud, instantiating a container at the first device, the container configured to receive the data from the first device without directly accessing a local storage of the first device. The method includes transferring, using the container, the data from the first device to the second device.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Applicant: Google LLCInventors: Alankrit Kharbanda, Shyam Venkataraman, Sowmya Dayanand, Xiangqian Yu, Juan Esteller
-
Publication number: 20250038397Abstract: Various arrangements of antenna systems are detailed herein. Such an antenna system can include first antenna connected to a printed circuit board. The antenna system further includes a second antenna connected to the printed circuit board. The antenna system further includes a decoupling structure connected to the printed circuit board at a location between the first antenna and the second antenna.Type: ApplicationFiled: October 15, 2024Publication date: January 30, 2025Applicant: Google LLCInventors: Ming Zheng, Peter Joseph Bevelacqua
-
Publication number: 20250036816Abstract: This document discloses techniques, apparatuses, and systems for efficient and secure data handling using domain-oriented masking. In aspects, efficient and secure data handling using domain-oriented masking enables circuit resources (e.g., flip flops, data) to be shared between portions of an integrated circuit (IC). Specifically, an input register of a Galois-Field (GF) multiplier and a pipeline register within a stage of an Advanced Encryption Standard Substitution-Box (S-Box) may be implemented as sharing a single flip flop. Some ICs may utilize multiple S-Boxes, including multiple GF multipliers that are provided randomness each time the input is updated. In this case, an output from a previous stage of a first S-box may be provided as randomness to a subsequent stage of a second S-Box to limit the need for entropy generation circuitry. In this way, efficient and secure data handling using domain-oriented masking may decrease circuit cost and circuit area without impacting security.Type: ApplicationFiled: December 16, 2022Publication date: January 30, 2025Applicant: Google LLCInventor: Pirmin Robert Vogel
-
Publication number: 20250031022Abstract: This document discloses technology generally related to an accessory that may wirelessly connect to one or more host devices such that the accessory is able to receive content from two or more of the host devices simultaneously. The accessory may have two or more wireless communication interfaces connected to two or more respective host devices via a type of wireless connection. The accessory may determine a time to simultaneously receive content from and/or transmit content to each of the host devices. The time may be determined by adjusting the start times for reception and/or transmission of content from the two or more host devices, and/or it may be determined based on the type of wireless connection. According to some examples, the accessory may determine a priority for each of the wireless connections using arbitration rules. The accessory may output the received content simultaneously.Type: ApplicationFiled: November 30, 2022Publication date: January 23, 2025Applicant: Google LLCInventors: Xuemei Ouyang, Dennis Yee, Michael Scot Pate, Ethan Aren Grabau, Chi Kin Benjamin Leung
-
Publication number: 20250028186Abstract: This disclosure describes a method to calibrate a position of an optical image stabilization (OIS) lensing element 308 based on a temperature reading. The temperature reading is of one or more sensors, such as a Hall Effect sensor, and the position is a deviation from a center position, which is the position of the OIS lensing element 308 when it is not influenced by a force. A center drift coefficient is generated based on the temperature reading. A derived value for the position is adjusted based on the center drift coefficient. Additionally, a scaling sensitivity coefficient is generated based on the temperature reading. The adjusting of the derived value for the position is further based on the scaling sensitivity coefficient. The center drift coefficient and the scaling sensitivity coefficient are further based on maximum and minimum values for the Hall Effect sensor at the temperature reading and a calibration temperature.Type: ApplicationFiled: October 1, 2024Publication date: January 23, 2025Applicant: Google LLCInventor: Jin Yu Lee
-
Publication number: 20250028771Abstract: In general, the subject matter described in this specification can be embodied in methods, systems, and program products for providing search results automatically to a user of a computing device. A spoken input provided by a user to a computing device is received. The spoken input is transmitted to a computer server system that is remote from the computing device. Search result information that is responsive to the spoken input is receiving by the computing device and in response to the transmitted spoken input. An alert is provided to the user that the device will connect the user to a target of the search result information if the user does not intervene to stop the connecting of the user. The user is connected to the target of the search result information based on a determination that the user has not intervened to stop the connecting of the user.Type: ApplicationFiled: October 7, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Michael J Lebeau, John Nicholas Jitkoff, William J. Byrne
-
Publication number: 20250029460Abstract: A method of detecting and responding to a visitor to a smart home environment via an electronic greeting system of the smart home environment, including determining that a visitor is approaching an entryway of the smart home environment; initiating a facial recognition operation while the visitor is approaching the entryway; initiating an observation window in response to the determination that a visitor is approaching the entryway; obtaining context information from one or more sensors of the smart home environment during the observation window; and at the end of the time window, initiating a response to the detected approach of the visitor based on the context information and/or an outcome of the facial recognition operation.Type: ApplicationFiled: October 8, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Jason Evans Goulden, Rengarajan Aravamudhan, Hae Rim Jeong, Michael Dixon, James Edward Stewart, Sayed Yusef Shafi, Sahana Mysore, Seungho Yang, Yu-An Lien, Christopher Charles Burns, Rajeev Nongpiur, Jeffrey Boyd
-
Publication number: 20250030971Abstract: Techniques and apparatuses are described for an earbud with low enoise. An electronic device includes: a flexible printed circuit (FPC) having first, second, and third regions, the FPC being shaped to form multiple layers including first, second, and third layers, the second region forming the second layer and being between the first layer formed by the first region and the third layer formed by the third region. The electronic device further includes a multi-layer board (MLB) in the first region. A battery connected to the FPC in the first region and disposed between the first and second regions. A speaker connected to the FPC in the second region and disposed between the second and third regions. Charger pins connected to the FPC in the third region. A microphone connected to the FPC in the third region. An infrared sensor connected to the FPC in the third region.Type: ApplicationFiled: October 8, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Mingfeng Xue, Shengyin Ding
-
Publication number: 20250029624Abstract: A method for automatic speech recognition using joint acoustic echo cancellation, speech enhancement, and voice separation includes receiving, at a contextual frontend processing model, input speech features corresponding to a target utterance. The method also includes receiving, at the contextual frontend processing model, at least one of a reference audio signal, a contextual noise signal including noise prior to the target utterance, or a speaker embedding including voice characteristics of a target speaker that spoke the target utterance. The method further includes processing, using the contextual frontend processing model, the input speech features and the at least one of the reference audio signal, the contextual noise signal, or the speaker embedding vector to generate enhanced speech features.Type: ApplicationFiled: October 4, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Arun Narayanan, Tom O'malley, Quan Wang, Alex Park, James Walker, Nathan David Howard, Yanzhang He, Chung-Cheng Chiu
-
Publication number: 20250028403Abstract: This document describes systems and techniques directed to touch sensor integration with enlarged active area displays. In aspects, a display includes a cover layer, an array of pixels, and a plurality of transistors that control an electrical activation of one or more pixels of the array of pixels. The plurality of transistors define a smaller area than the array of pixels such that at least one pixel of the array of pixels extends beyond the area defined by the plurality of transistors and above driving circuitry (“extended emitting area”). Variable pixel and/or transistor densities can support the extended emitting area. A touch sensor is integrated between the cover layer and the array of pixels and is operatively coupled to one or more touch trace routings that are, at least partially, disposed between the cover layer and one or more pixels within the extended emitting area.Type: ApplicationFiled: July 15, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Chun-Yen Liu, Ion Bita, Young Seok Oh, Premal Parekh, Chiaching Chu
-
Publication number: 20250030257Abstract: The various implementations described herein include methods, devices, and systems for managing battery usage and charging In one aspect, a method is performed at a battery charging device that includes one or more processors and memory. The method includes receiving first battery life information for a first battery installed in an electronic device, receiving user demand information for the electronic device, and based on the first battery life information and the user demand information, adjusting a charging rate for a second battery electrically coupled to the battery charging device for charging, the second battery configured for use in the electronic device.Type: ApplicationFiled: October 4, 2024Publication date: January 23, 2025Applicant: Google LLCInventors: Hae Rim Jeong, Jimmy Lim, Dietrich Shing-Quan Ho, Kevin Zeng
-
Publication number: 20250023709Abstract: A method includes obtaining first code in a high-level programming language. The first code represents a first function for performing one or more operations on plaintext. The method also includes converting the first code into an intermediate representation comprising a list of nodes. Each node of the list of nodes includes one or more logical operations. The method also includes converting the intermediate representation into a Boolean intermediate representation that includes a plurality of single-bit logical operations. The method also includes transpiling the Boolean intermediate representation into second code in the high-level programming language. The second code represents a second function for performing, using fully homomorphic encryption (FHE), the one or more operations on ciphertext.Type: ApplicationFiled: October 1, 2024Publication date: January 16, 2025Applicant: Google LLCInventors: Robert Coleman Springer, IV, Bryant Gipson, Shruthi Gorantala, Sean Purser-Haskell
-
Publication number: 20250021517Abstract: A method for data storage includes specifying a plurality of File Systems (FSs) for use by multiple clients, including assigning to the FSs both respective global identifiers and respective client-specific names. The plurality of FSs is managed using the global identifiers, and files are stored for the clients in the FSs using the client-specific names.Type: ApplicationFiled: October 1, 2024Publication date: January 16, 2025Applicant: Google LLCInventors: Shahar Frank, Amos Ben-Ari
-
Publication number: 20250023752Abstract: This document describes systems and techniques directed at low-cost event history for monitoring device users. In aspects, the techniques include selectively uploading images captured at a monitoring device, such as a doorbell camera or a surveillance camera, to a client device (e.g., a smartphone) or a remote device (e.g., a server). In so doing, the described systems and techniques reduce data transmission and storage overhead.Type: ApplicationFiled: October 13, 2023Publication date: January 16, 2025Applicant: Google LLCInventors: Yu-sheng Chen, John-Ashton Allen, Ankit Mohan
-
Publication number: 20250022174Abstract: This document describes asymmetric camera sensor positioning for enhanced package detection. In aspects, an electronic doorbell has an image sensor that is rotated to a portrait orientation and vertically shifted relative to a lens of a camera, resulting in asymmetric positioning of the image sensor relative to the lens. The lens projects an image circle onto the image sensor and the image sensor has a sensor detection area having upper corners within the image circle and lower corners outside of the image circle to enable capture of an object located in a lower portion of the image circle and proximate to an edge of the image circle. Then, lens distortion correction is performed on a captured image to provide a final image usable to detect the package, which may be located within the image circle but outside of a conventional sensor detection area.Type: ApplicationFiled: October 1, 2024Publication date: January 16, 2025Applicant: Google LLCInventors: Jacobi Colton Grillo, Adrian Mircea Proca, William Vincent Duran, ChihHao Chen
-
Publication number: 20250022458Abstract: A method for an automated speech recognition (ASR) model for unifying streaming and non-streaming speech recognition including receiving a sequence of acoustic frames. The method includes generating, using an audio encoder of an automatic speech recognition (ASR) model, a higher order feature representation for a corresponding acoustic frame in the sequence of acoustic frames. The method further includes generating, using a joint encoder of the ASR model, a probability distribution over possible speech recognition hypothesis at the corresponding time step based on the higher order feature representation generated by the audio encoder at the corresponding time step. The audio encoder comprises a neural network that applies mixture model (MiMo) attention to compute an attention probability distribution function (PDF) using a set of mixture components of softmaxes over a context window.Type: ApplicationFiled: September 25, 2024Publication date: January 16, 2025Applicant: Google LLCInventors: Kartik Audhkhasi, Bhuvana Ramabhadran, Tongzhou Chen, Pedro J. Moreno Mengibar
-
Publication number: 20250021401Abstract: A method includes executing a pool of primary virtual machine (VM) instances, each primary VM instance executing a corresponding individual service instance, and instantiating a shared secondary VM instance. The method includes identifying unavailability of a particular primary VM instance of the pool of primary VM instances, and causing the corresponding individual service instance executing on the particular primary VM instance to failover to the shared secondary VM instance to commence executing the corresponding individual service instance. The method includes, after the failover to the shared secondary VM instance, determining a difference between a current resource level of the shared secondary VM instance and a target resource level associated with the corresponding individual service instance, and adjusting the current resource level of the secondary VM instance based on the difference.Type: ApplicationFiled: September 25, 2024Publication date: January 16, 2025Applicant: Google LLCInventors: Grigor Avagyan, Dean Hildebrand
-
Publication number: 20250015839Abstract: This document describes techniques and apparatuses for a user equipment (UE)-coordination set for a wireless network. In aspects, a base station specifies a set of UEs to form a UE-coordination set for joint transmission and reception of data intended for a target UE within the UE-coordination set. The base station selects one of the UEs within the UE-coordination set to act as a coordinating UE for the UE-coordination set and transmits a request message that directs the coordinating UE to coordinate the joint transmission and reception of the data intended for the target UE. Then, the base station transmits a downlink signal to each UE within the UE-coordination set. Each UE within the UE-coordination set demodulates and samples the downlink signal and then forwards the samples to the coordinating UE, which combines the samples and processes the combined samples to provide decoded data.Type: ApplicationFiled: September 25, 2024Publication date: January 9, 2025Applicant: Google LLCInventors: Jibing Wang, Erik Richard Stauffer
-
Publication number: 20250016495Abstract: An impedance-tuned microphone tunnel for an electronic device is disclosed. The impedance-tuned microphone tunnel includes a ring-like structure having a central opening positioned within a microphone tunnel of an electronic device. The central opening of the ring-like structure has a diameter that is smaller than diameters of other central openings within the microphone tunnel. The ring-like structure may be used to tune an impedance of the microphone tunnel by varying the diameter of the central opening. In this way, the impedance of the microphone tunnel may be tuned to a frequency response target to reduce a resonant peak of the microphone tunnel. The ring-like structure may be coated with a non-stick material, such as with polyethylene terephthalate (PET), biaxially orientated polyethylene terephthalate (BoPET), polyimide (PI), and the like.Type: ApplicationFiled: September 18, 2024Publication date: January 9, 2025Applicant: Google LLCInventor: YuTing Tsai
-
Publication number: 20250014494Abstract: This document describes systems and techniques for mitigating a display artifact that may result from first frame rate effects at low luminance levels. For example, in an implementation, a computer-implemented method includes receiving display data to be presented on a display of an electronic device at a display driver. At the display driver, a luminance level of the display data is determined. Responsive to determining at the display driver that the luminance level is below a threshold luminance level, a gray level is determined for one or more regions of the display data. Responsive to determining at the display driver that the gray level for at least one region of the one or more regions is below a baseline gray level for the threshold luminance level, the gray level is increased to an adjusted gray level equal to at least the baseline gray level.Type: ApplicationFiled: September 13, 2024Publication date: January 9, 2025Applicant: Google LLCInventors: Sangmoo Choi, Ka Ho Liu
-
Publication number: 20250013438Abstract: A method include receiving a natural language prompt from a user comprising a command to generate a code script for an automated assistant to perform a routine. The routine includes multiple discrete actions specified by the natural language prompt. The method further includes processing, by a pre-trained large language model (LLM), the natural language prompt to generate the code script as an LLM output, and processing the code script to determine the code script is incomplete, thereby rendering the code script unsuitable for the automated assistant to fulfill performance of the routine. Based on determining the code script is incomplete, the method includes issuing a user prompt soliciting the user to provide additional information needed to complete the code script and receiving user input of the additional information needed to complete the code script. The method includes supplementing the code script with the additional information to render completed code script.Type: ApplicationFiled: June 18, 2024Publication date: January 9, 2025Applicant: Google LLCInventors: Michael Andrew Goodman, Deepak Goyal
-
Publication number: 20250016045Abstract: An electronic device includes a first processor; a first commissioning element to communicate with external devices using wireless communication and a first memory storing programs for commissioning a target device onto a communication network. The communication network has configuration data including a network identifier and a network key. The programs provide a user interface for commissioning the target device. The target device includes a second processor, a second wireless radio, and a second commissioning element to receive the network configuration data. The target device decodes the network configuration data to commission the target device onto the communication network. The electronic device sends the network configuration data to the target device and receives confirmation that the target device has successfully connected to the communication network. The electronic device displays the success in a user interface.Type: ApplicationFiled: September 24, 2024Publication date: January 9, 2025Applicant: Google LLCInventors: Jeffrey P. Matthews, Lee R. Taylor
-
Publication number: 20250016216Abstract: This document describes an accessory that may wirelessly connect to one or more host devices such that the accessory is able to receive content from two or more of the host devices at the same or substantially the same time. When each of the host devices is wirelessly coupled to the accessory, the accessory and each host device may determine a bit rate for the accessory to receive content from each host device. The accessory may receive content from a first host device at a first bit rate. Based on the content received, the accessory may determine a new bit rate for other host devices.Type: ApplicationFiled: November 23, 2022Publication date: January 9, 2025Applicant: Google LLCInventors: Xuemei Ouyang, Michael Scot Pate, Ethan Grabau, Dennis Yee, Daniel Fernandes Barros, Chi Kin Benjamin Leung
-
Publication number: 20250014591Abstract: Various systems, devices, and methods for social interaction measurement that preserve privacy are presented. An audio signal can be captured using a microphone. The audio signal can be processed using an audio-based machine learning model that is trained to detect the presence of speech. The audio signal can be discarded such that content of the audio signal is not stored after the audio signal is processed using the machine learning model. An indication of whether speech is present within the audio signal can be output based at least in part on processing the audio signal using the audio-based machine learning model.Type: ApplicationFiled: September 16, 2024Publication date: January 9, 2025Applicant: Google LLCInventors: Julian Maclaren, Karolis Misiunas, Vahe Tshitoyan, Brian Foo, Kelly Dobson
-
Method and System of Static Charge Variation Sensing Based Human Jaw Motion Detection for User Voice
Publication number: 20250008252Abstract: The present disclosure provides a system and method using a charge collection antenna in a wearable device to collect charge variation based on a user's jawbone and muscle motion. The collected charge variation may be used to determine an on-body status of the wearable device. For example, in wireless earbuds, information acquired from a charge collection antenna may be used to determine whether the earbud is worn in-ear by the user. The collected charge variation may also be used to detect jaw motion by the user.Type: ApplicationFiled: December 14, 2021Publication date: January 2, 2025Applicant: Google LLCInventors: Fang Liu, Trausti Thormundsson, Yuan Jen Chang, Nicholas Jordan Sanders, Kari Antero Pulli, Kuan-Lin Chen -
Publication number: 20250007948Abstract: This document describes techniques and apparatuses directed at implementing control flow integrity measurements to validate control flow in computing systems. Within a scope, a local variable is initialized and configured to store a measurement value of a local control flow. During operations within the scope, at least one expression is computed, outputting a return value. A fingerprinting algorithm obtains the return value, combines the return value and the measurement value, and hashes the combination to produce a digest value. The local variable is then redefined as the digest value. Next, the return value is compared to the expected, distinguished success return value in a branch instruction. Before returning a final return value, the measurement value is compared against an expected value stored in a static variable. If the comparison fails, then the program can detect an attack on the control flow.Type: ApplicationFiled: March 25, 2022Publication date: January 2, 2025Applicant: Google LLCInventors: Miguel Cristian Young de la Sota, Miguel Angel Osorio Lozano
-
Publication number: 20250002205Abstract: This document describes systems directed at a lip feature in tube packaging structures. In aspects, a system includes a sleeve portion having a hollow tube structure. The system also includes an open-faced enclosure (a box) configured to be slidably placed inside the sleeve portion such that at least a portion of the open-faced enclosure is disposed within the sleeve portion. The system further includes a lip feature configured to fold from a first position to a second position such that when the open-faced enclosure is slidably placed inside the sleeve portion, the lip feature folds from the first position to the second position and reverts back to the first position once the open-faced enclosure is at least partially disposed within the sleeve portion. Through such techniques, the lip feature can prevent boxes from falling out of tube structures.Type: ApplicationFiled: September 16, 2024Publication date: January 2, 2025Applicant: Google LLCInventor: Nicole Danielle Hermann
-
Publication number: 20250000380Abstract: Various arrangements for performing radar-based measurement of vital signs. Waveform data may be received then filtered of data indicative of static objects to obtain motion-indicative waveform data. The motion-indicative waveform data may be analyzed to determine one or more frequencies of movement present within the motion-indicative waveform data. A spectral analysis may be performed on the motion-indicative waveform data to determine a spectral-analysis state of a monitored region. The spectral-analysis state of the monitored region may be determined to match a predefined spectral-analysis state during which vital sign monitoring is permitted. One or more vital signs of a monitored user present within the monitored region may be determined and output based on analyzing the motion-indicative waveform data.Type: ApplicationFiled: September 10, 2024Publication date: January 2, 2025Applicant: Google LLCInventors: Dongeek Shin, Brandon Barbello, Shwetak Patel, Anupam Pathak, Michael Dixon
-
Publication number: 20250006217Abstract: A method includes receiving training data that includes a set of transcribed speech utterances where each respective transcribed speech utterance is paired with a corresponding transcription. For each respective transcribed speech utterance, the method includes generating an encoded audio representation and an encoded textual representation, generating a higher order audio feature representation for a corresponding encoded audio representation, generating a higher order textual feature representation for a corresponding encoded textual representation, and determining a loss for the respective transcribed speech utterance based on the higher order audio feature representation and the higher order textual feature representation. The method also includes training a speech encoder and a text encoder of a correction model based on the loss determined for each transcribed speech utterance of the set of transcribed speech utterances.Type: ApplicationFiled: June 29, 2023Publication date: January 2, 2025Applicant: Google LLCInventors: Christopher Li, Kyle Scott Kastner, Yuan Wang, Zhehuai Chen, Andrew Maxwell Rosenberg, Heng Su, Qian Chen, Leonid Aleksandrovich Velikovich, Patrick Maxim Rondon, Diamantino Antonio Caseiro, Zelin Wu
-
Publication number: 20240427997Abstract: A method includes obtaining a set of training queries that each specify a corresponding operation to perform and include a corresponding plurality of speech recognition hypotheses that each represent a corresponding candidate transcription of the training query, and a corresponding ground-truth transcription of the training query. For each training query, the method includes processing, using an encoder of a neural semantic parsing (NSP) model, the corresponding plurality of speech recognition hypotheses to generate a corresponding NSP embedding, processing, using a transcription decoder, the corresponding NSP embedding to generate a corresponding predicted transcription, and determining a corresponding first loss based on the corresponding predicted transcription and the corresponding ground-truth transcription.Type: ApplicationFiled: June 20, 2023Publication date: December 26, 2024Applicant: Google LLCInventors: Khalid Salama, Ágoston Weisz