Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

APPARATUS AND METHOD TO MONITOR AND PREVENT MALICIOUS ANCHORING IN A SPATIAL COMPUTING ENVIRONMENT

Inventiv.org
July 22, 2025
Software

Invented by Singh; Shailendra, Sethia; Maneesh, Behera; Abhijit

Spatial computing is changing the way we interact with the world, blending the digital and real in ways that were once the stuff of science fiction. In this article, we take a close look at a new patent application centered on spatial computing security—especially how it anchors digital objects to our physical environment while keeping users safe. Let’s break down what this means, why it matters, and how this invention could shape the future.

Background and Market Context

Spatial computing is a fancy way of saying that computers can understand the space around you. With tools like wearable glasses and headsets, it adds digital things—like notes, pictures, or even games—right onto what you see in real life. It’s like magic, but real, and it’s slowly becoming a part of our daily lives. But as with any new technology, there are big questions about safety and privacy.

Think about using smart glasses at work. You might pin a virtual calendar to your real desk or have a shopping link float over your coffee mug. These digital objects, or “virtual objects,” are not just decorations. They can link to websites, open apps, or even handle your money. All this is possible because the device knows where you are, what’s around you, and what you want to do.

Companies like Apple, Microsoft, and Google are all racing to build the next big thing in spatial computing. The market is growing, and more people are starting to use these devices at home, at school, and at work. But with this growth comes a new set of risks. If your device can see everything around you, what happens if someone else gets access to that information? What if someone tricks your device to show something dangerous, or steals your private data?

Hackers are always looking for new ways to get in. With spatial computing, they have a new target: the images and data your device collects to understand your world. For example, a hacker could try to change the links tied to your virtual objects, sending you to a fake website or stealing your information. Or they could try to grab pictures of your room, which might show private or sensitive things.

This is where the patent we’re exploring steps in. The goal is clear: make sure that when you anchor a virtual object in your world, you do it safely. The patent is all about watching for anything that looks odd or risky—like someone trying to sneak in, change what you see, or grab information they shouldn’t have. The invention uses smart computer programs, called deep learning algorithms, to spot trouble and stop it before it causes harm.

As spatial computing becomes part of more jobs and homes, the need for strong security grows. This patent tackles that challenge head-on, aiming to protect users by keeping an eye on the digital objects they anchor in their world and stopping attacks before they happen. It’s a step toward making spatial computing safe for everyone.

Scientific Rationale and Prior Art

To understand why this invention matters, let’s look at what’s already out there and what’s missing. The basic idea behind spatial computing is to merge what you see in real life with digital things. Devices do this by mapping your room in three dimensions. They use cameras, special sensors like LiDAR, or even radar to figure out where things are—your desk, chair, or the wall—and then place digital objects on top.

One of the key tricks in spatial computing is something called “anchoring.” Imagine sticking a digital sticky note onto your real fridge, so every time you look at it with your smart glasses, it’s right where you left it. This anchoring is done by the device understanding where the fridge is, where you are, and keeping the sticky note in place even if you walk around.

There are already some ways to do this. Big tech companies have made tools to help devices understand and track the world. For example:

Apple’s ARKit uses “visual-inertial odometry,” which means it mixes camera images with motion sensors to figure out where everything is. It can find flat surfaces, like tables, and let you put virtual things on them.
WebXR lets web browsers work with virtual and augmented reality, finding surfaces and letting you interact with digital objects.
Other algorithms use “raycasting” and “hit-testing” to spot where you’re looking and what you might want to click or touch.

These tools are really good at making the digital world line up with the real one. But they don’t focus much on security. Most of the time, once you anchor a digital object, the device just trusts that it’s safe. If someone tricks the system—say, by sending a fake anchoring command or swapping out a link for a bad website—the user usually has no idea. And since these devices often upload images and data to the cloud, there’s a risk that private information could leak out.

Some companies use encryption and other standard security methods to protect data, but these are mostly about stopping outside hackers from breaking in. They don’t look closely at what’s happening inside the system—like a new anchor popping up somewhere strange, or a link suddenly changing to something suspicious.

That’s where the scientific leap in this patent comes in. Instead of just locking the doors, this invention sets up a smart guard inside the system. It uses deep learning—computer programs that get better and smarter over time—to watch for anything out of the ordinary. It checks every anchoring instruction, every link, and even the images and data that move between your device and the cloud.

Deep learning networks are like brains for computers. They learn by looking at lots of data, spotting patterns, and figuring out what’s normal and what’s not. In this invention, the deep learning system keeps track of all the anchors, links, and metadata—the digital fingerprints of everything happening in your virtual space. If something looks odd, like a new anchor pointing to a place with personal info, or a link that seems off, the system can act fast. It can block the instruction, disable the link, or stop images from leaving the device.

What’s special is that this approach isn’t just about stopping known threats. It’s designed to catch new tricks hackers might try in the future. By always learning and adapting, the system keeps users safer as spatial computing grows and changes.

No other system in the market puts such a smart, watchful eye right at the heart of spatial computing. That’s the scientific gap this patent fills. It brings together anchoring, deep learning, metadata analysis, and real-time action to make sure your digital and real worlds stay safe and private.

Invention Description and Key Innovations

Now let’s dive into what the patent really covers and what makes it stand out. The invention is a complete system for safe anchoring in spatial computing, built around a wearable device—think smart glasses or a headset—and a set of advanced computer programs working together.

First, the wearable device comes loaded with a sensor and a screen. The sensor can spot and take pictures of physical objects around you—like a desk, chair, or wall—using tools like cameras or LiDAR. The screen then projects virtual objects right into your view, lining them up perfectly with the real world. For example, you might see a virtual clock floating above your real desk, or a helpful link pinned to your office wall.

The magic happens with “anchoring instructions.” When you want to stick a virtual object somewhere, you give the device a command—maybe by looking at a spot, pressing a button, or using your voice. The system then remembers that spot and keeps the virtual object locked there, even as you move around.

But here’s where things can get risky. What if someone tries to send a fake anchoring instruction? What if a link tied to a virtual object gets changed, leading you to a bad website? Or what if the images your device captures include private details, like your credit card on the table, and someone tries to steal them?

The patent’s system fights these risks in a few smart ways:

1. Dual Computer Processors: The device uses two brains. The first processor handles normal tasks—anchoring objects, showing digital things, and so on. The second processor is the security guard. It watches every anchoring instruction and link, checking for anything weird or dangerous.

2. Deep Learning Algorithms: This is the real star. The security processor runs a deep learning program that’s always learning what’s normal for each user and each environment. It can spot strange patterns—like an anchor appearing on an object that usually isn’t used, or a link that suddenly points somewhere new. If it finds something odd, it sends an alert.

3. Real-Time Alerts and Blocking: When the system spots trouble, it acts fast. It can block a suspicious anchoring instruction, disable a risky link, or stop images from being sent to outside servers. This way, even if a hacker tries something new, the system can react before any harm is done.

4. Smart Modules Working Together: The invention isn’t just one big program. It’s made up of smaller pieces, each with a job. For example, the spatial telemetry extraction module pulls out metadata about where objects are and how they’re moving. The anchor validation module double-checks each anchoring instruction before it goes live. The session management module can end your spatial session if something looks wrong. All these modules talk to each other, sharing information and working as a team to keep you safe.

5. Secure Cloud and Encryption: Sometimes, the deep learning program runs on a cloud server, not just on your device. To keep your data safe, the system uses homomorphic encryption. This means the cloud can analyze your data without ever seeing the raw, private details. It’s like doing math on a locked box without opening it.

6. Flexible and Adaptable: The system can plug into existing spatial computing platforms. If a company already uses spatial computing, they can add this security layer without starting from scratch. This makes it easy to upgrade safety without throwing away what already works.

7. Protection Against Many Threats: The system doesn’t just watch for hackers. It also guards against mistakes, like accidentally anchoring a virtual object to something that shows private info. If a suspicious meta tag or link is found, the system can shut down the session or warn the user.

8. Blockchain Integration: Some versions of the system can store important events and messages on a private blockchain, making it even harder for anyone to tamper with the anchored information.

In simple terms, this invention acts like a smart, always-alert security officer inside your spatial computing system. It understands your world, knows what’s normal, and stops bad things before they happen. It’s not just about keeping out hackers—it’s about giving users confidence that their digital world is as safe as their real one.

The patent covers many different ways this can work. The system watches for anomalies in anchoring commands, hyperlink changes, metadata, and even unusual user movements. It can stop, block, or disable anything that looks risky, all in real time. And because it uses deep learning, it keeps getting better at spotting new types of threats.

By combining all these tools, this patent sets a new standard for safety in spatial computing. It gives users the freedom to anchor digital objects wherever they want, without worrying that someone might hijack their experience or steal their data.

Conclusion

Spatial computing is opening up new ways to work, play, and connect with the world. But with these new opportunities come new risks. The patent we’ve explored here offers a powerful solution, using smart technology to watch over every anchoring command, every link, and every image moving through your device. By bringing together deep learning, real-time alerts, secure cloud computing, and flexible modules, it creates a safer future for everyone using spatial computing.

As this technology becomes more common, systems like the one described here will be key. They don’t just protect users from today’s threats—they learn, adapt, and keep watch for the dangers of tomorrow. With innovations like these, we can look forward to a digital world that’s as safe and secure as the one we see with our own eyes.

Click here https://ppubs.uspto.gov/pubwebapp/ and search 20250217474.

Tags: Facebook/Meta Patent Review
Previous Story
AUTOMATED GENERATION OF PROMPTS FOR RESEARCH SUMMARIES USING GENERATIVE ARTIFICIAL INTELLIGENCE
Next Story
SYSTEMS AND METHODS FOR DATA STRUCTURE GENERATION TO DETERMINE A COMPATIBILITY DATUM

Related Articles

PHOTONIC INTEGRATED CIRCUITS WITH SUBSTRATE NOISE COUPLING MITIGATION

Invented by Wang; Zhechao, Vazimali; Milad Gholipour, Liu; Qing Photonic...

RESAMPLER FOR ELECTRONIC DISPLAY HAVING MULTIPLE PIXEL LAYOUTS

Invented by Boo; Hyun H., Miscuglio; Mario, Hu; Jenny, Guan;...

Menu

  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

Disclaimer Communications between you and Inventiv Foundation are protected by our Privacy Policy but not by the attorney-client privilege or as work product. Inventiv Foundation, Inc. can connect you to independent attorneys and self-help services at your specific direction. We are not a law firm or a substitute for an attorney or law firm. We cannot provide any kind of advice, explanation, opinion, or recommendation about possible legal rights, remedies, defenses, options, selection of forms or strategies. Your access to the website is subject to our Terms of Use.

Tags

Alphabet Amazon Facebook/Meta Microsoft Patent Review Samsung
  • Home
  • About
  • Inventiv’s Daily
  • Inventiv Cloud
  • Blogs
  • Contact
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs