Patents by Inventor Moreno Ambrosin

Moreno Ambrosin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200137580
    Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
    Type: Application
    Filed: December 27, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
  • Publication number: 20190387401
    Abstract: Systems and methods are provided for efficient group-based handling of massive internet of things (M-IoT) devices that are compatible with both current cellular networks, and next generation 5G systems. Examples allow reduced overhead between a (radio) access network (R)AN and a core network (CN) that originates from unnecessary signaling traffic for IoT devices transitioning from IDLE to CONNECTED mode, especially when sending small data packets. In addition, or in other embodiments, mobility solutions are provided for group based M-IoT.
    Type: Application
    Filed: April 16, 2018
    Publication date: December 19, 2019
    Inventors: Ching-Yu Liao, Xiruo Liu, Liuyang Yang, Moreno Ambrosin
  • Publication number: 20190319964
    Abstract: Systems and techniques for information-centric network namespace policy-based content delivery are described herein. A registration request may be received from a node on an information-centric network (ICN). Credentials of the node may be validated. The node may be registered with the ICN based on results of the validation. A set of content items associated with the node may be registered with the ICN. An interest packet may be received from a consumer node for a content item of the set of content items that includes an interest packet security level for the content item. Compliance of the security level of the node with the interest packet security level may be determined. The content item may be transmitted to the consumer node.
    Type: Application
    Filed: June 27, 2019
    Publication date: October 17, 2019
    Inventors: Ned M. Smith, Srikathyayani Srikanteswara, Ravikumar Balakrishnan, Rajesh Poornachandran, Moreno Ambrosin
  • Publication number: 20190215695
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Application
    Filed: December 21, 2018
    Publication date: July 11, 2019
    Inventors: Liuyang Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Publication number: 20190141568
    Abstract: System and techniques for publisher control in an information centric network (ICN) are described herein. Named data criteria to identify data for a workload may be constructed. A discriminator for potential publishers of the data may be constructed. An interest packet may be transmitted based on the named data criteria and the discriminator and a response to the interest packet received from one of the potential publishers.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Ravikumar Balakrishnan, Venkatesan Nallampatti Ekambaram, Srikathyayani Srikanteswara, Jessica C. McCarthy, Eve M. Schooler, Sebastian Schoenberg, Rath Vannithamby, Moreno Ambrosin, Maruti Gupta Hyde
  • Publication number: 20190140850
    Abstract: Systems, apparatuses and methods may provide for infrastructure node technology that conducts a mutual authentication with a vehicle and verifies, if the mutual authentication is successful, location information received from the vehicle. The infrastructure node technology may also send a token to the vehicle if the location information is verified, wherein the token includes an attestation that the vehicle was present in a location associated with the location information at a specified moment in time. Additionally, vehicle technology may conduct a mutual authentication with an infrastructure node and send, if the mutual authentication is successful, location information to the infrastructure node. The vehicle technology may also receive a token from the infrastructure node.
    Type: Application
    Filed: December 29, 2018
    Publication date: May 9, 2019
    Inventors: Moreno Ambrosin, Kathiravetpillai Sivanesan, Rafael Misoczki, Sridhar Sharma, Ignacio Alvarez
  • Publication number: 20190130762
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
    Type: Application
    Filed: December 27, 2018
    Publication date: May 2, 2019
    Inventors: Liuyang Yang, Yair Yona, Moreno Ambrosin, Xiruo Liu, Hosein Nikopour, Shilpa Talwar, Kathiravetpillai Sivanesan, Sridhar Sharma, Debabani Choudhury, Kuilin Clark Chen, Jeffrey Ota, Justin Gottschlich
  • Publication number: 20190044738
    Abstract: Disclosed herein are mobile device distribution methods and apparatuses. In embodiments, a system for managing cryptographic exchanges between devices capable of operating in accord with the Wireless Access Vehicular Environment (WAVE) functionality may comprise a device operable in at least a first environment in which the device is configured to: receive a first message with an associated first certificate chain; and add a second certificate chain associated with the device to a second message. The device may further determine if the first certificate chain includes an unknown certificate, and if so, set a flag associated with the second message; as well as determine if all certificates in the first certificate chain are known, and if so, check if message has the set flag, and if the flag is set, then unset the flag; and send the second message. Other embodiments may be disclosed and claimed.
    Type: Application
    Filed: May 4, 2018
    Publication date: February 7, 2019
    Inventors: Xiruo Liu, Liuyang Yang, Manoj R. Sastry, Moreno Ambrosin
  • Publication number: 20190039612
    Abstract: In an automated method for providing driving assistance, an electronic control unit (ECU) of a first driving assistance system of a first vehicle receives local object information from at least one sensing component of the first driving assistance system. The first driving assistance system automatically detects external objects outside of the first vehicle, based on the local object information received from the at least one sensing component. The first driving assistance system also receives a reported object list (ROL) from a second vehicle, wherein the ROL describes objects detected by a second driving assistance system in the second vehicle. The first driving assistance system also affects operation of the first vehicle, based on (a) the external objects detected by the first vehicle and (b) the ROL from the second vehicle. Other embodiments are described and claimed.
    Type: Application
    Filed: September 28, 2018
    Publication date: February 7, 2019
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin, Shabbir Ahmed, Marcio Juliato, Christopher N. Gutierrez
  • Publication number: 20190044728
    Abstract: Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.
    Type: Application
    Filed: December 20, 2017
    Publication date: February 7, 2019
    Inventors: Mohammed Karmoose, Rafael Misoczki, Liuyang Yang, Xiruo Liu, Moreno Ambrosin, Manoj R. Sastry
  • Publication number: 20180101688
    Abstract: Embodiments are directed to protecting, and recovering protected information, with attribute-based encryption. a predefined attribute policy defines one or more combinations of recipient attributes that entitle the recipient entity to attain access to the protected information. A set of at least one trust criterion is derived from the predefined attribute policy. The at least one trust criterion represents a measure of trust attainable by at least one combination or relationship of the plurality of recipient attributes. At least one trust assessment is produced based on application of the predefined attribute policy to the plurality of recipient attributes. The at least one trust assessment is compared to the at least one trust criterion, the result of the comparison providing an access grant to a decryption process to recover the protected information from the cyphertext.
    Type: Application
    Filed: October 11, 2016
    Publication date: April 12, 2018
    Inventors: David John Zage, Eve M. Schooler, Moreno Ambrosin