02nd week of 2021 patent applcation highlights part 48 |
Patent application number | Title | Published |
20210011980 | FEEDBACK-AWARE SLACK STEALING ACROSS TRANSPARENT LATCHES EMPOWERING PERFORMANCE OPTIMIZATION OF DIGITAL INTEGRATED CIRCUITS - To increase the efficiency of electronic design automation, in a putative electronic logic circuit design, at least one transparent latch is identified as a candidate for slack stealing. An initial timing slack, available for stealing, and associated with the at least one transparent latch, is determined. Responsive to a determination that the initial timing slack available for stealing is insufficient, it is determined whether the initial timing slack available for stealing is on a feedback path. If so, responsive to determining that the initial timing slack available for stealing is on the feedback path, the initial timing slack available for stealing is replaced with a next worse slack. | 2021-01-14 |
20210011981 | CLOCK CROSSING INTERFACE FOR INTEGRATED CIRCUIT GENERATION - Systems and methods are disclosed for generation and testing of integrated circuit designs with clock crossings between clock domains. These may allow for the rapid design and testing (e.g. silicon testing) of processors and SoCs. Clock crossings may be automatically generated between modules, inferring the values of design parameters, such as a signaling protocol (e.g. a bus protocol), directionality, and/or a clock crossing type (e.g., synchronous, rational divider, or asynchronous), of a clock crossing. For example, implicit classes may be used to generate clock crossings in a flexible manner. For example, these system and methods may be used to rapidly connect a custom processor design, including one or more IP cores, to a standard input/output shell for a SoC design to facilitate rapid silicon testing of the custom processor design. | 2021-01-14 |
20210011982 | ILLEGAL CONTENT SEARCH DEVICE, ILLEGAL CONTENT SEARCH METHOD, AND PROGRAM - An illegitimate content search device | 2021-01-14 |
20210011983 | SERVER-SIDE AUDIO RENDERING LICENSING - A content server system is provided that includes at least one processor configured to store a user account for a user at a content server of the content server system that is configured to serve server-side rendered content to a client computing device of the user. Audio is played out via a sound output device associated with the client computing device. The at least one processor is further configured to determine a licensing identifier associated with a device of the user or the user account of the user, send the licensing identifier to a third-party licensing server device, receive an indication that an active license is associated with the licensing identifier, determine that the user is authorized to access a digital rights managed audio rendering software, and cause audio of the server-side rendered content to be rendered using audio rendering algorithms of the digital rights managed audio rendering software. | 2021-01-14 |
20210011984 | USING SECURE MEMORY ENCLAVES FROM THE CONTEXT OF PROCESS CONTAINERS - Memory is partitioned and isolated in container-based memory enclaves. The container-based memory enclaves have attestable security guarantees. During provisioning of the container-based memory enclaves from a container image, a purported link in the container to a memory address of the enclave is modified to verifiably link to an actual memory address of the host, such as partitioned memory enclave. In some instances, enclave attestation reports can be validated without transmitting corresponding attestation requests to remote attestation services, based on previous attestation of one or more previous container attestation reports from a similar container and without requiring end-to-end attestation between the container and remote attestation service for each new attestation request. | 2021-01-14 |
20210011985 | SYSTEMS AND METHODS FOR INTRUSION DETECTION AND PREVENTION USING SOFTWARE PATCHING AND HONEYPOTS - A variety of methods are provided for an application or operating system (OS) kernel intrusion detection and prevention, based on usage of existing vulnerability fixes and their transformation into honeypot detectors. A honeypot patch may be generated for a computing system associated with a software vulnerability in software installed on the computing system. The honeypot patch, when used to modify the installed software, can convert the computing system into a honeypot system configured to detect attempts to exploit the software vulnerability of the software, and in response, generate a security event associated with the software vulnerability. | 2021-01-14 |
20210011986 | METHOD TO VERIFY IDENTITY USING A PREVIOUSLY COLLECTED BIOMETRIC IMAGE/DATA - A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match. | 2021-01-14 |
20210011987 | OPTICAL FINGERPRINT AUTHENTICATION DEVICE - An optical fingerprint authentication device includes at least a light source and an image sensor and detects diffused light. The light source is an organic electroluminescence panel. The organic electroluminescence panel comprises a light emitting portion region and a light-transmitting non-light emitting portion, the light emitting portion region being shaped by an organic electroluminescence element. A fingerprint information reader having the image sensor arranged at a position adjacent to the non-light emitting portion is provided. | 2021-01-14 |
20210011988 | AGGREGATOR OF IDENTIFICATION DEVICES - A personal identification device for physical access control systems, including: at least one reader capable of reading data from an identification badge, the data including at least identification data; a processing unit; a data storage member; at least one wireless communication module; and an internal battery arranged to supply power to the components of the device. The processing unit is arranged for: acquiring data from at least one identification badge by way of the reader; storing the acquired data in the data storage member; if the acquired data are encrypted, decrypting the data; and transmitting at least a portion of the acquired data, via the wireless communication module and on request from a reader external to the device. | 2021-01-14 |
20210011989 | Generating a Challenge-Response For Authentication Using Relations Among Objects - Aspects described herein may allow for the application of generating captcha images using relations among objects. The objects in ground-truth images may be clustered based on the probabilities of co-occurrence. Further aspects described herein may provide for generating a first captcha image comprising a first object and a second object, and generating a second captcha image based on the first captcha image by replacing the first object with the third object. Finally, the first and second captcha images may be presented as security challenges and user access requests may be granted or denied based on responses to the security challenges. | 2021-01-14 |
20210011990 | DETECTING UNWANTED COMPONENTS IN A CRITICAL ASSET BASED ON EMI FINGERPRINTS GENERATED WITH A SINUSOIDAL LOAD - The disclosed embodiments provide a system that detects unwanted electronic components in a target asset. During operation, the system generates a sinusoidal load for the target asset. Next, the system obtains target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target asset while the target asset is executing the sinusoidal load. The system then generates a target EMI fingerprint from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target asset to determine whether the target asset contains unwanted electronic components. | 2021-01-14 |
20210011991 | PRESENCE TERMINAL-BASED SIDE CHANNEL COMMUNICATIONS - A method includes a controller detecting a signal state of a presence terminal that is associated with a bus device. The signal state is set by the bus device to indicate presence of the bus device in a connector, and the connector is connected to a bus. The method includes the controller communicating data over the bus; and in response to detecting the signal state, the controller communicating side channel data to the bus device to authenticate the data that is communicated over the bus as being provided by the controller. Communicating the side channel data with the bus device includes providing a signal to the presence terminal, which represents the side channel data. | 2021-01-14 |
20210011992 | COMPUTER-BASED SYSTEMS AND COMPUTING DEVICES CONFIGURED TO UTILIZE ONE OR MORE AUTHENTICATION SERVERS FOR SECURING DEVICE COMMANDS TRANSMISSIONS AND METHODS OF USE THEREOF - In some embodiments, securing device commands includes a first electronic device receiving a command authorization request message from a second electronic device, including a device command to be performed by the second electronic device, a command argument, and a first message authentication code (MAC) generated by applying a hash function to the device command, the command argument and a first counter value. The first electronic device generates a second MAC by applying the hash function to the device command, the command argument and a second counter value synchronized with the first counter value. The first electronic device compares the first MAC and the second MAC to authenticate the device command and transmit a command approval message or a command denial message. The command approval message causes the second electronic device to perform the device command and the command denial message causes the second electronic device to reject the device command. | 2021-01-14 |
20210011993 | Device Rotational Control of Applications - Techniques to detect one or more rotational orientations of the device and to generate, in response to a control input, a persistent setting to cause an activation or inhibition of a function or state of one or more applications to be triggered by the one or more rotational orientations of the device. | 2021-01-14 |
20210011994 | DEVICE AND METHOD FOR MANAGING AN ENCRYPTED SOFTWARE APPLICATION - An embodiment integrated circuit comprises a first memory zone having a first level of access rights that is configured to store at least one first software application containing encrypted instructions, means for verifying the integrity of the first software application, an encryption/decryption means, for example a first logic circuit, that is configured to decrypt the encrypted instructions which are considered to exhibit integrity, a processing unit that is configured to execute the decrypted instructions, the first logic circuit being further configured to encrypt the data generated by the execution operation and a second means, for example a second logic circuit, that is configured to store the encrypted data in a second memory zone having a second level of access rights that is identical to the first level of access rights. | 2021-01-14 |
20210011995 | INSTALLING AND MANIPULATING A SECURE VIRTUAL MACHINE IMAGE THROUGH AN UNTRUSTED HYPERVISOR - Systems, apparatuses and methods may provide for technology that associates a key domain of a plurality of key domains with a customer boot image, receives the customer boot image from the customer, and verifies the integrity of the customer boot image that is to be securely installed at memory locations determined from an untrusted privileged entity (e.g., a virtual machine manager). | 2021-01-14 |
20210011996 | TRUST ZONE-BASED OPERATING SYSTEM AND METHOD - A trust zone-based operating system including a secure world subsystem that runs a trusted execution environment TEE, a TEE monitoring area, and a security switching apparatus is provided. When receiving a sensitive operation request sent by a trusted application TA in the TEE, the TEE writes a sensitive instruction identifier and an operation parameter of the sensitive operation request into a general-purpose register, and sends a switching request to the security switching apparatus. The security switching apparatus receives the switching request, and switches a running environment of the secure world subsystem from the TEE to the TEE monitoring area. The TEE monitoring area stores a sensitive instruction in the operating system. After the running environment is switched, the corresponding first sensitive instruction is called based on the first sensitive instruction identifier, and a corresponding first sensitive operation is performed by using the first sensitive instruction and the first operation parameter. | 2021-01-14 |
20210011997 | SPAMMY APP DETECTION SYSTEMS AND METHODS - A spammy app detection system may search a database for any new social media application discovered during a recent time period. A spammy app detection algorithm can be executed on the spammy app detection system on an hourly basis to determine whether any of such applications is spammy (i.e., posting to a social media page anomalously). The spammy app detection algorithm has a plurality of stages. When a new social media application fails any of the stages, it is identified as a spammy app. The spammy app detection system can update the database accordingly, ban the spammy application from further posting to a social media page monitored by the spammy app detection system, notify an entity associated with the social media page, further process the spammy application, and so on. In this way, the spammy app detection system can reduce digital risk and spam attacks. | 2021-01-14 |
20210011998 | ABNORMAL ACTIVITY DETECTION - A method for detecting abnormal activity on a computing system is disclosed. In one embodiment, such a method includes observing, over a period of time, activity occurring on a computing system. The method establishes, for the computing system based on the observations, a normal range associated with the activity. The method further monitors the computing system for the activity and documents activity on the computing system that falls outside the normal range. In certain embodiments, when activity is detected on the computing system that falls outside the normal range, the method gathers or compiles additional information about the activity, notifies a user, and/or generates a report that describes the abnormal activity and events surrounding the abnormal activity. A corresponding system and computer program product are also disclosed. | 2021-01-14 |
20210011999 | Method for Systematic Collection and Analysis of Forensic Data in a Unified Communications System Deployed in a Cloud Environment - A method for systematic collection and analysis of forensic data in a unified communications system deployed in a cloud environment. Three primary forensic components, namely, evidence collectors, a forensic controller and self-forensic investigators, are utilized in the method to interface with the components of the cloud environment and of the unified communications network. The method invokes a cloud evidence collection process which collects footprint data structures continuously at runtime to enable effective real-time collection of cloud forensic evidence and a cloud evidence analyzing process which generates evidence data that can be consumed by standard forensics tools. | 2021-01-14 |
20210012000 | System And Method Of Detecting File System Modifications Via Multi-layer File System State - The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat. | 2021-01-14 |
20210012001 | STORAGE MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS - A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process, the process includes acquiring training data in which information that indicates whether or not an attack is performed from a first device to a second device is associated with each of a specific operation log from the first device to the second device and a plurality of operation logs that includes operation logs from the first device to the second device before and after the specific operation log; generating order matrix data that includes a graph structure that corresponds to each of the plurality of operation logs and an order relationship of the specific operation log and the operation logs before and after the specific operation log; and generating a machine learning model based on the training data by inputting the data of the order matrix data to a neural network. | 2021-01-14 |
20210012002 | METHODS AND SYSTEMS FOR RECOGNIZING UNINTENDED FILE SYSTEM CHANGES - A persistent storage device includes a filesystem having a data exclusion list and a protection system stored thereon. The data exclusions list identifies excluded filesystem folders. A processor is programmed to create a canary file in at least one of the excluded filesystem folders. The processor intercepts input/output (I/O) events, each being directed to a respective target filesystem object. The processor stores system event metadata associated with each of the I/O events. The system event metadata includes a file identifier of the respective target filesystem object. The processor creates a backup copy for each respective target filesystem object. The processor releases the I/O events to be performed on the respective target filesystem objects. In addition, the processor determines, based on at least one file identifier, that one of the respective target filesystem objects is the canary file, and replaces each respective target filesystem object with its respective backup copy. | 2021-01-14 |
20210012003 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - [Problem] To efficiently collect data for analyzing attack methods while preventing illegal acquisition of learned knowledge. | 2021-01-14 |
20210012004 | MEMORY TRACKING FOR MALWARE DETECTION - A device may load a process under test into virtual memory associated with the device. The virtual memory may include a plurality of memory pages. The device may insert a malware inspection element and a memory tracking element into the process under test and may provide a notification of an event associated with the process under test to a memory tracking element. The device may identify, using the memory tracking element, one or more memory pages of the plurality of memory pages. The one or more memory pages may be assigned to, and used by, the process under test. The device may generate, based on identifying the one or more memory pages, a memory map, associated with the process under test, that may include information identifying the one or more memory pages as being assigned to, and used by, the process under test. | 2021-01-14 |
20210012005 | TRACKING MALICIOUS SOFTWARE MOVEMENT WITH AN EVENT GRAPH - A multi-endpoint event graph is used to detect malware based on malicious software moving through a network. | 2021-01-14 |
20210012006 | SECURITY MANAGEMENT OF ADVERTISEMENTS AT ONLINE ADVERTISING NETWORKS AND ONLINE ADVERTISING EXCHANGES - At an advertising server: adding tracking code to advertisements served by the advertising server, wherein the tracking code is configured to cause web browsers displaying the served advertisements to transmit their contents to a security server. At the security server: scanning the received advertisements to detect presence of malicious code, and storing results of the scanning in a database. At the advertising server: prior to serving a new advertisement that has won in RTB, querying the database for scan results associated with the new advertisement. When the scan results indicate a malicious advertisement, preventing a serving of the new advertisement. When the scan results indicate a safe advertisement, allowing a serving the new advertisement. When no scan results are available for the new advertisement, adding the tracking code to the new advertisement and serving it, such that its contents are scanned by the security server. | 2021-01-14 |
20210012007 | CONTINUOUS DATABASE SECURITY AND COMPLIANCE - A method by a security system for selectively triggering different ones of a plurality of database assessment scans for a database and detecting when non-compliant database configurations of the database are being used. The method includes monitoring for occurrences of a first class of database operations, responsive to detecting an occurrence of one or more database operations of the first class, selecting one or more subsets of the plurality of database assessment scans to be rerun, triggering performance of only the selected one or more of the subsets, identifying one or more non-compliant database configurations of the database based on accessing results of the selected one or more of the subsets, determining one or more security rules for detecting occurrences of database operations that make use of the identified one or more non-compliant database configurations, and applying the determined one or more security rules. | 2021-01-14 |
20210012008 | METHOD OF INITIALIZING DEVICE AND METHOD OF UPDATING FIRMWARE OF DEVICE HAVING ENHANCED SECURITY FUNCTION - A method of initiating a device managed by an authorized manager includes maintaining a security module connected to the device in hardware and an encrypted firmware image; loading the encrypted firmware image; confirming integrity of the encrypted firmware image by reading a header of the encrypted firmware image using a public key of the manager stored in the security module; decrypting an encrypted symmetric key in the encrypted firmware image by using the encryption key of the security module when the integrity of the encrypted firmware image is confirmed; decrypting encrypted firmware of the encrypted firmware image using the decrypted public key; and executing the decrypted firmware in the device. | 2021-01-14 |
20210012009 | METHOD FOR REPROGRAMMING DATA OF A SOFTWARE FUNCTION EXECUTED BY AT LEAST ONE COMPUTER PROVIDED WITH AT LEAST ONE EXECUTION CORE, AT LEAST ONE SECURITY CORE AND AT LEAST ONE NON-VOLATILE MEMORY - A method for reprogramming data of a software function executed by an execution core and a security core, the data being present in two physically separate non-volatile memories, each managed by one of the execution or security cores, including the following steps: upon receiving a reprogramming request, a second value is stored in a first Boolean, determining whether the first Boolean is equal to the second value and if a second Boolean is equal to a first value, and if affirmative; an execution core is made to emit at a reinitialization request via a bidirectional communication channel towards a security core and a request to initialize a portion of the first non-volatile memory towards the set of functions for managing the non-volatile memory by an execution core; a second value is stored in the second Boolean; it is determined whether a predetermined reprogramming event has taken place, and if affirmative, the first value is stored in the first Boolean, while keeping the second value in the second Boolean, and each security core is made to emit a request to write predetermined stored values to the set of functions for managing the memory associated with the non-volatile memory managed by the security core. | 2021-01-14 |
20210012010 | AUTHENTICATED BOOT TO PROTECT STORAGE SYSTEM DATA BY RESTRICTING IMAGE DEPLOYMENT - A boot image is modified to require authentication based on stable system values that are uniquely associated with a storage array. The stable system values may be used as a key to decrypt a password. The modified boot image will not allow booting to proceed without the decrypted password. The password cannot be decrypted based on different stable system values such as the stable system values of other storage arrays. | 2021-01-14 |
20210012011 | BLACKBOX SECURITY FOR CONTAINERS - Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory. | 2021-01-14 |
20210012012 | SYSTEM AND METHOD FOR CONSTRUCTING A GRAPH-BASED MODEL FOR OPTIMIZING THE SECURITY POSTURE OF A COMPOSED INTERNET OF THINGS SYSTEM - Embodiments provide a system and method for constructing a graph-based model for optimizing the security posture of a composed system. During operation, the system constructs a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system constructs the multi-layer graph by the following. The system generates nodes in the configuration subgraph, including: nodes in a first class which encode information associated with a configuration parameter for a respective component, wherein the encoded information includes a name, a default value, a range of values, and a data type; and nodes in a second class which encode value assignments for configuration parameters and relationships between configuration parameters. The system generates nodes in the vulnerability subgraph based on known vulnerabilities associated with a component, bad security practices, and best security practices. | 2021-01-14 |
20210012013 | BLOCKCHAIN APPLICABILITY FRAMEWORK - Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to receive parameters for a blockchain candidate application and evaluate the parameters to determine a recommendation for types of blockchain to apply to the candidate application. The recommendation may be based on an evaluation of the parameters to determine a level of applicability of blockchain usage, a level of applicability of one or more blockchain privacy types, and a level of applicability of one or more blockchain consensus types. The system may be configured to calculate an overall percentage distribution of the levels of applicability and to output an indication of the overall percentage distribution. | 2021-01-14 |
20210012014 | VULNERABILITY CHECKING SYSTEM, DISTRIBUTION SERVER, VULNERABILITY CHECKING METHOD AND PROGRAM - A vulnerability checking system includes a terminal, a management server and a distribution server. The management server manages software installed in the terminal. The distribution server distributes information related to software in which a vulnerability is estimated to be present, as new vulnerability information to the management server. The distribution server includes a collection part and an analysis part. The collection part collects descriptions related to software vulnerabilities from information published on a network. The analysis part analyzes the collected descriptions, calculates, as a degree of activity, the number of descriptions related to vulnerabilities of software that is a target of vulnerability checking within a prescribed period, and generates new vulnerability information according to the calculated degree of activity. | 2021-01-14 |
20210012015 | VEHICLE SECURITY NETWORK DEVICE AND METHOD FOR CONTROLLING SAME - A vehicle security network design device may comprise: a level assigning unit for assigning an automobile safety integrity level (ASIL) which provides a risk management standard for each of a plurality of functional elements in a vehicle that is at least temporarily implemented by a processor; a calculation unit for calculating device's controllability with respect to each of the plurality of functional elements on the basis of a connection structure between the plurality of functional elements and a difference value of the ASIL; and a management unit for generating a risk analysis model of a plurality of functional elements. | 2021-01-14 |
20210012016 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROTECTING CONFIDENTIAL INTEGRATED CIRCUIT DESIGN - Methods, apparatus and computer program product for protecting a confidential integrated circuit design process. The computer-implemented method includes receiving a design specification dataset from a first untrusted computing device; extracting confidential design specification data from the design specification dataset; encrypting the confidential design specification data to produce encrypted confidential design specification data; generate a first encryption key to be associated with the encrypted confidential design specification data; retrieving a confidential design specification data subset for replacing a design element subset with a security hard macro (SHM) placeholder design element set; generating a security hard macro (SHM) placeholder feature set comprising those security hard macro (SHM) placeholder features representing mappings from the confidential design specification data subset to the SHM placeholder design element set; and transmitting, to the first untrusted computing device, the encrypted confidential design specification data, the first encryption key, and the SHM placeholder feature set. | 2021-01-14 |
20210012017 | METHOD AND APPARATUS FOR STORING AND PROCESSING APPLICATION PROGRAM INFORMATION - A method for storing application program information including segmenting the application program information into program sub-information, with an information segmentation algorithm of the application program information having undergone algorithm obfuscation processing; and storing the program sub-information. The present disclosure significantly reduces the possibility of application program information being acquired by hackers and the like, and improves the security of application program information and electronic devices. | 2021-01-14 |
20210012018 | DEVICE LOCKDOWN - Methods, systems, and apparatus, including computer programs encoded on a storage device, for securing device data in response to an event. A method includes receiving an instruction to initiate execution of a user device data protection protocol after a determination by a monitoring unit that an event has occurred at a property, determining whether the user device is located at the property, and in response to a determination that the user device is located at the first location, displaying a prompt that asks if the user device data protection protocol should be canceled. The method also include actions of determining whether user feedback responsive to the prompt has been received by the user device within a predetermined amount of time, and in response to a determination that the predetermined amount of has expired without receiving user feedback, performing one or more data protection operations to protect user device data. | 2021-01-14 |
20210012019 | DATA TRANSMISSION BASED ON VERIFICATION CODES - The present disclosure provides techniques for data transmission. According to one technique, a request from a data sender for sending data to a data receiver is received, wherein the request comprises a content indicating a verification code. Then, a first solution to the verification code based on the request can be obtained. The verification code can be sent to the data receiver. A second solution to the verification code can be received from the data receiver, wherein the second solution is generated by the data receiver. Transmission of the data from the data sender to the data receiver can be enabled in response to the first solution consistent with the second solution. | 2021-01-14 |
20210012020 | DOCUMENT MANAGEMENT SYSTEM HAVING CONTEXT-BASED ACCESS CONTROL AND RELATED METHODS - A document management system having context-based access control and related methods are provided. The document management system determines whether to perform user authentication based on derived context-information comprising one or a combination of derived user-context parameters and document-context parameters that provide additional context to document access requests. | 2021-01-14 |
20210012021 | INTERPOSED SECURE FUNCTION CALLS - Methods, systems, and apparatus, including computer programs encoded on computer storage media for Interposed Secure Function Calls. One of the operations is performed by interposing a first application function with a second application function. The second application function executes when the first application function is called by another process or other code. The process or other code makes a function call to the first application function, but instead of executing the first application function, the interposed second application function is executed. The function call includes an argument payload which is evaluated for safety and security. If the function call and/or argument payload is determined to be safe, the interposed second application function will perform the first application function using the argument payload. Otherwise, the first application function is not performed. | 2021-01-14 |
20210012022 | DATA DISTRIBUTION-TYPE INTEGRATED MANAGEMENT SYSTEM - Provided is a system which can integrate and manage data, and more specifically to a data distribution-type integrated management system which can integrate and manage data without being equipped with a DBMS and a web server for the management of a large amount of data and can enhance the security performance of data. The data distribution-type integrated management system includes: a plurality of storage servers which separates and individually stores two or more types of information selected from among content information, attribute information, and version information which shared data includes; an execution management server which connects a execution module of a logged-in user terminal to the storage servers; and a search server which searches the storage servers for the corresponding shared data in response to a request from the user terminal. | 2021-01-14 |
20210012023 | RULE BASED ACCESS TO VOLUNTARILY PROVIDED DATA HOUSED IN A PROTECTED REGION OF A DATA STORAGE DEVICE - Structured access to volunteered private data disclosed. Access can be based on security and privacy constraint information (SPCI) that can be selected by the party volunteering the private data. The volunteered data can be stored in a protected portion of a public network. The SPCI can be correlated to the volunteered data. In response to receiving a request for access to the volunteered data, an attribute of the request can be determined to satisfy one or more rules related to the SPCI prior to facilitating access to a version of a portion of the volunteered data. The version of the portion of the volunteered data can be a redaction of the portion of the volunteered data. The version of the portion of the volunteered data can be aggregated with other portions of other volunteered data determined to satisfy corresponding SPCI related rules. | 2021-01-14 |
20210012024 | SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATA - The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user interface that is configurable by a user of the user device to execute function requests. Upon receipt of a function request, a router can randomly select an available computer from a computer cluster to execute the function. The computer can access a predetermined portion of the organization's data, generate an output by executing the requested function based on the predetermined portion of the organization's data, and transmit the output to the user device. | 2021-01-14 |
20210012025 | SYSTEM AND METHOD FOR SESSION-AWARE DATASTORE FOR THE EDGE - A method includes creating a session token including a session identifier and a current node, capturing a set of queries in a cache from a client device at the current node associated with the session identification, receiving a request from the client for data access at a second node wherein the request includes the session token, transferring a subset of data records from the current node to the second node, wherein the subset of data records is selected based on the session identifier and the set of queries; and granting access to the client to the second node. | 2021-01-14 |
20210012026 | TOKENIZATION SYSTEM FOR CUSTOMER DATA IN AUDIO OR VIDEO - Various embodiments are directed to a system for identifying personally identifiable information (PII) in digital media content, such as audio files, videos, images, etc. and providing such content with one or more portions thereof appropriately tokenized based on an access level of the user requesting the content. The PII may be detected in the digital media content using a machine learning model or a classification model. | 2021-01-14 |
20210012027 | METHODS AND DEVICES FOR AUTOMATICALLY ENCRYPTING FILES - An automatic file encryption method and device for automatically encrypting a file. A processor identifies a characteristic associated with likely sensitive content based on a usage pattern of encrypting files having the characteristic. Creation of a new file is detected and the newly-created file is analyzed to determine whether the file contains sensitive content based upon it having the characteristic. If the file is found to have the characteristic, then the file is automatically encrypted. | 2021-01-14 |
20210012028 | DATA PRODUCT RELEASE METHOD OR SYSTEM - A computer implemented data product release method or system. The data product release is derived from a sensitive dataset using a privacy protection system such as a differentially private system. The privacy protection parameters, such as noise addition magnitude, are configurable as part of the data product release method or system to alter the balance between maintaining privacy of the sensitive dataset and making the data product release useful. | 2021-01-14 |
20210012029 | SYSTEMS AND METHODS OF QUERYING A FEDERATED DATABASE IN CONFORMANCE WITH JURISDICTIONAL PRIVACY RESTRICTIONS - Systems and methods of querying a federated database in conformance with jurisdictional privacy restrictions. In one embodiment, a method performed by a network node having a federated database that represents directly, or indirectly via a sub-federated database, one or more autonomous databases that are located in a same or different jurisdiction includes adapting a query that is related to identifiable information for each autonomous or sub-federated database based on one or more privacy restrictions for the jurisdiction of that autonomous or sub-federated database. An adapted response to the query is composed based on responses to the adapted query received from the autonomous or sub-federated databases so that the adapted response meets the one or more privacy restrictions for the jurisdiction of each autonomous or sub-federated database. | 2021-01-14 |
20210012030 | DE-IDENTIFYING SOURCE ENTITY DATA - De-identification of source entity data is provided, in which a process obtains source entity data having an entity identifier and entity attribute data in respective formats for entity attributes of that entity, obtains a predefined library of fictitious entities with corresponding fictitious entity attribute data, for the entity attributes, that is in the respective formats, and generates a de-identified entity lookup list by applying a transformation to the entity identifier to produce a transformed entity identifier, selecting a fictitious entity from the predefined library of fictitious entities, and writing to the de-identified entity lookup list the entity identifier, the transformed entity identifier, and the fictitious entity attribute data, for the entity attributes, that corresponds to the selected fictitious entity. The process also processes entity file(s) using the de-identified entity lookup list to de-identify the entity and produces de-identified entity file(s). | 2021-01-14 |
20210012031 | SYSTEMS AND METHODS TO MAINTAIN USER PRIVACY WHILE PROVIDING RECOMMENDATIONS - A systematic method of introducing obfuscating “organic” noise to a user's content engagement history leverages a recommender system by creating a public history on a client device which is a superset of the user's true engagement history. The method builds up the superset history over time through a client's interaction with the recommender system by simulating organic growth in a user's actual engagement history. The organic superset prevents an adversary with access to the underlying recommendation model from readily distinguishing between signal and noise in a user's query and obfuscates the user's engagement history with the recommender system. | 2021-01-14 |
20210012032 | ANONYMISING ROBOTIC DATA - A method is provided of anonymising data in a surgical robotic system. The surgical robotic system comprises a robot having a base and an arm extending from the base to an attachment for an instrument, the arm comprising a plurality of joints whereby the configuration of the arm can be altered. The method comprises receiving a data stream captured by the surgical robotic system, the data stream comprising data relating to a surgical procedure and comprising personally-identifiable data; determining one or more personally-identifiable feature in the received data stream; and generating, in dependence on the determined personally-identifiable feature and the received data stream, an anonymised data stream omitting the personally-identifiable data. | 2021-01-14 |
20210012033 | METHOD FOR THE COMPUTER-AIDED PARAMETERISATION OF A TECHNICAL SYSTEM - The invention relates to a method for the computer-aided parameterisation of a technical system ( | 2021-01-14 |
20210012034 | Phosphor-Loaded Waveguide - An improved waveguide is disclosed. The waveguide utilizes a luminescent material disposed within or around its perimeter to introduce additional light into the waveguide. For example, the waveguide may include a plurality of planar layers having different refractive indexes. A luminescent material may be disposed along the outer edge of these layers. When light from within the waveguide strikes the luminescent material, it emits light, thereby adding to the light in the waveguide. Not only does the luminescent material introduce more light into the waveguide, it also introduces more light sources, thereby making it more difficult to introduce a probe without blocking at least a portion of the light destined for the image sensor. The luminescent material may be a phosphor. | 2021-01-14 |
20210012035 | RECONFIGURABLE DEVICE BITSTREAM KEY AUTHENTICATION - An embodiment of an electronic processing system may include a processor, persistent storage media communicatively coupled to the processor, a reconfigurable device communicatively coupled to the processor over a physically isolated trusted communication channel, a secure provisioner communicatively coupled to the processor and the reconfigurable device to provision a secure storage area and to securely store a remotely generated bitstream security key in the provisioned secure o storage area, and a device configurer to configure the reconfigurable device with a remotely generated bitstream and the remotely generated bitstream security key. Other embodiments are disclosed and claimed. | 2021-01-14 |
20210012036 | SYSTEMS, DEVICES, AND METHODS FOR PREVENTION OF RECORDING CONTENT - A non-transitory computer readable medium includes instructions that when executed by a processor, cause the processor to detect an attempt to record content being displayed on a display, cause, in response to detecting the attempt, an obstruction to be displayed on the display to block viewing of the content on the display, and remove the obstruction on the display to allow viewing of the content on the display when one or more conditions are met. | 2021-01-14 |
20210012037 | PROOFING AGAINST TAMPERING WITH A COMPUTER - There is provided a technique of proofing against tampering with a computer comprising a chassis with a plurality of fasteners. The technique comprises: obtaining by the computer data indicative of a sequence of implication events associated with the fasteners of the plurality of fasteners; generating a pattern corresponding to the sequence of implication events; matching between data corresponding to the generated pattern and a reference data; and initiating one or more anti-tampering actions responsive to a mismatching result. The method can further comprise generating a cryptographic signature corresponding to the generated pattern, wherein matching between data corresponding to the generated pattern and the reference data comprises matching the generated cryptographic signature to a cryptographic reference corresponding to the reference data. Alternatively or additionally, the generated cryptographic signature can be usable for secure access to information stored on the computer. | 2021-01-14 |
20210012038 | OPTIMIZATION OF PYROLYSIS TUBE CRACKING EFFICIENCY - A method for optimizing a cracking efficiency with which a pyrolysis tube of a deposition apparatus cracks a precursor material into reactive species is disclosed, including measuring an input pressure at an entrance to the pyrolysis tube, outside of the pyrolysis tube; measuring an output pressure at an exit from the pyrolysis tube, outside of the pyrolysis tube; measuring a pyrolysis temperature within the pyrolysis tube; calculating a cracking efficiency based on the input pressure, the output pressure and the pyrolysis temperature; and determining an adjustment to be made to at least one of the input pressure, the output pressure and the pyrolysis temperature to increase the cracking efficiency. | 2021-01-14 |
20210012039 | COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS - A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system. | 2021-01-14 |
20210012040 | SYSTEM FOR MANAGING DESIGN BASES ON ROOM BASIS IN DESIGN BASES MANAGEMENT SYSTEM OF NUCLEAR POWER PLANT USING BUILDING INFORMATION MODEL AND METHOD THEREOF - Provided is a method of managing design bases applied to a nuclear power plant in an integrated manner by using a building information model so that design bases attributes are precisely provided to a subsequent design by using a design bases information layer to ensure consistency between design drawings. | 2021-01-14 |
20210012041 | PITCH DETERMINATION SYSTEMS AND METHODS FOR AERIAL ROOF ESTIMATION - User interface systems and methods for roof estimation are described. Example embodiments include a roof estimation system that provides a user interface configured to facilitate roof model generation based on one or more aerial images of a building roof. In one embodiment, roof model generation includes image registration, image lean correction, roof section pitch determination, wire frame model construction, and/or roof model review. The described user interface provides user interface controls that may be manipulated by an operator to perform at least some of the functions of roof model generation. In one embodiment, the user interface provides user interface controls that facilitate the determination of pitch of one or more sections of a building roof. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 2021-01-14 |
20210012042 | METHOD AND SYSTEM FOR SPACE DESIGN - A method for space design includes: receiving first information of a physical space by a terminal device, the first information including size measurement information of the physical space; acquiring second information of a target object, the second information including size measurement information of the target object; performing a visual presentation of the first information of the physical space and the second information of the target object on a display interface of the terminal device; calculating construction information of the target object being placed in the physical space by the terminal device based on a layout of the target object on the visual presentation according to the first information of the physical space and the second information of the target object; outputting the calculated construction information through a communication interface of the terminal device to a ranging and positioning apparatus; and guiding a user to position the target object in the physical space using a positioning function of the ranging and positioning apparatus according to the construction information, the size measurement information of the physical space, and the size measurement information of the target object. | 2021-01-14 |
20210012043 | Design Assist Apparatus, Design Assist Method, and Design Assist Program - In the design of a mechanical component for a mechanical device driven by a feedback controlled electric motor, the user is enabled to easily know how the properties of mechanical component affect the generation of abnormal vibrations of the mechanical device. In a design assist apparatus ( | 2021-01-14 |
20210012044 | SYSTEM AND METHOD FOR INTERNAL STRUCTURAL DEFECT ANALYSIS USING THREE-DIMENSIONAL SENSOR DATA - A method and system for structural analysis of an object detects deviations between a physical object model and a predetermined three-dimensional model of the object. The physical object model is generated from scanned surface data of an object produced by a three-dimensional sensor. The physical object model is aligned with the predetermined three-dimensional model of the object to identify an interference between a location of the aligned physical object model and the predetermined three-dimensional model of the object that corresponds with any elastic deformation of an internal component within the predetermined three-dimensional model. An indicator of expected damage to the internal component arising from the elastic deformation is generated. | 2021-01-14 |
20210012045 | METHOD OF SIMULATING QUANTUM COMPUTING SYSTEM AND QUANTUM COMPUTING SIMULATION SYSTEM - Provided is a method of simulating a quantum computing system having an error correction function. The method includes generating a quantum information density matrix, generating a coded density matrix by performing quantum error correction coding on the quantum information density matrix, applying quantum computing to the coded density matrix and calculating a change in a first reliability of the coded density matrix, applying the quantum computing to the quantum information density matrix and calculating a change in a second reliability of the quantum information density matrix, and determining an operation time of the quantum computing, based on the change in the first reliability and the change in the second reliability. | 2021-01-14 |
20210012046 | MESHLESS METHOD FOR SOLID MECHANICS SIMULATION, ELECTRONIC DEVICE, AND STORAGE MEDIUM - The present disclosure discloses a meshless method for solid mechanics simulation, which includes the following steps: first constructing a trial function and a test function by distributing points according to a geometric shape of a structure; then introducing numerical flux to correct the traditional Galerkin weak form; and finally substituting the trial and test functions into the weak form to construct a global stiffness matrix of the structure and a system of algebraic equations, and solving the system of algebraic equations to obtain displacement and stress of each point, thus completing simulation and analysis of the structure deformation and stress. | 2021-01-14 |
20210012047 | Multi-Platform Model Processing and Execution Management Engine - Systems and methods are disclosed for managing the processing and execution of models that may have been developed on a variety of platforms. A multi-model execution module specifying a sequence of models to be executed may be determined. A multi-platform model processing and execution management engine may execute the multi-model execution module internally, or outsource the execution to a distributed model execution orchestration engine. A model data monitoring and analysis engine may monitor the internal and/or distributed execution of the multi-model execution module, and may further transmit notifications to various computing systems. | 2021-01-14 |
20210012048 | Method for Providing Details to a Computer Aided Design (CAD) Model, a Computer Program Product and a Server Therefore - In a first aspect, the current invention provides a method for manipulating a computer aided design (CAD) model, comprising the following computer-implemented steps of: —obtaining a composite object comprising a 3D geometry; —defining a 2D cross section of the composite object; —selecting a pattern of an event; —displaying the pattern; —applying modifications to the pattern, whereby the modifications are saved as a 2D patch, directly linked to the 3D geometry. The method according to an embodiment of the invention is particularly suitable for linking the maps providing 2D details, used on a construction site, to 3D composite objects and is particularly useful to avoid incompatibilities between the 2D and 3D information. In a second aspect, the present invention provides a computer program product for manipulating a CAD model. In a third aspect, the present invention provides a server for manipulating a CAD model. | 2021-01-14 |
20210012049 | SYSTEM AND METHOD FOR MULTI-MATERIAL MESH GENERATION FROM FILL-FRACTION VOXEL DATA - Systems and methods for multi-material mesh generation from fill-fraction voxel model data are discussed. Voxel representations of model data are used to generate robust and accurate multi-material meshes. More particularly, a mesh generation pipeline in a virtual fabrication environment is described that robustly generates high-quality triangle surface and tetrahedral volume meshes from multi-material fill-fraction voxel data. Multi-material topology is accurately captured while preserving characteristic feature edges of the model. | 2021-01-14 |
20210012050 | Method of detecting relations between pins of circuit and computer program product thereof - A method of detecting the relations between the pins of a circuit and a computer program product thereof are provided. The method includes: retrieving a circuit description file describing a circuit; retrieving at least one data pin and at least one clock pin of the circuit; converting the circuit to a cell level; and tracing the circuit in the cell level to identify multiple flip-flops coupled to the clock pin; tracing the circuit in the cell level to identify a target flip-flop coupled to the data pin; and determining whether the data pin is related to the clock pin according to the data signal and the clock signal of the target flip-flop. | 2021-01-14 |
20210012051 | CIRCUIT DESIGN VISIBILITY IN INTEGRATED CIRCUIT DEVICES - A system includes an integrated circuit device configured to implement a circuit design. The integrated circuit device includes a communication interface configured to receive the circuit design in a configuration bitstream and instrumentation logic in the configuration bitstream and signal collector block configured to collect signal data based on the instrumentation logic during implementation of the circuit design. | 2021-01-14 |
20210012052 | FIELD PROGRAMMABLE GATE ARRAY (FPGA) HAVING DISSIMILAR CORES - A field programmable gate array (FPGA) having at least first and second processing circuits implemented thereon. Each of the first and second processing circuits comprises a numerical core and associated peripheral components. The numerical core in the first processing circuit is dissimilar to the numerical core in the second processing circuit. The first and second processing circuits are segregated from each other in floorplan view. | 2021-01-14 |
20210012053 | SYSTEM FOR DESIGNING SEMICONDUCTOR CIRCUIT AND OPERATING METHOD OF THE SAME - Provided are a system for designing a semiconductor circuit and an operating method of the same. The system includes a working memory loading a clustering application for generating a cluster, based on instances respectively corresponding to cells of the semiconductor circuit, and loading a design tool for placing the cells. The clustering application, when an output terminal of a first instance is connected to a second instance and the number of instances connected to the output terminal of the first instance is one, classifies the first instance and the second instance into a candidate group pair. The clustering application, when all instances connected to an input terminal of the second instance are classified into the candidate group pair with the second instance, generates the cluster including the first instance and the second instance. | 2021-01-14 |
20210012054 | Methods and Systems for Printed Circuit Board Design Based on Automatic Corrections - In one embodiment, a computing system may access design data of a printed circuit board to be produced by a first manufacturing process. The system may analyze the design data of the printed circuit board using a machine-learning model, wherein the machine-learning model is trained based on X-ray inspection data associated with the first manufacturing process. The system may automatically determine one or more corrections for the design data of the printed circuit board based on the analysis result by the machine-learning model. | 2021-01-14 |
20210012055 | Secondary Device for a Sensor and/or Information System and Sensor and/or Information System - A secondary device for a sensor and/or information system, including a display and a control unit, is proposed. Predetermined interpretation instructions are stored in the control unit. The control unit is configured to wirelessly receive a display instruction containing at least one interpretation information and at least one text information. The control unit is configured to generate a graphic presentation containing the text information using the stored interpretation instructions on the basis of the interpretation information of the display instruction, and to display the graphic presentation by means of the display. Furthermore, a sensor and/or information system and a method of operating a sensor and/or information system are proposed. | 2021-01-14 |
20210012056 | INTEGRATED DOCUMENT EDITOR - A computing device includes a memory, a display for displaying data stored in the memory, a surface for detecting user input, and one or more processing units configured to identify a command, and automatically identify one or more variables, associated with at least one function, representing a plurality of at least one location in the memory, based on at least one portion of the command. The at least one function is configured to automatically determine one of the plurality of at least one location at which to apply the command to at least one portion of an image, based on the one or more variables. The display and the surface are, for example, of a touch screen. | 2021-01-14 |
20210012057 | INTEGRATED DOCUMENT EDITOR - A computing device includes a memory, a display for displaying data stored in the memory and a surface for detecting an indication of a location in the memory. In response to detecting the indication, the computing device is configured to automatically define a region on the surface, and automatically identify the location based on: a portion of at least one character, graphic object or image indicated on the surface proximate or at a selected position being within the region, and the location being capable of being one of one or more locations in the memory at which to apply an indicated command to the at least one character, graphic object or image. The region is defined to encompass allowed variation between the position and the portion, and the display and the surface are, for example, of a touch screen. | 2021-01-14 |
20210012058 | Hybrid Comparison for Unicode Text Strings Consisting Primarily of ASCII Characters - A method compares text strings having Unicode encoding. The method receives a first string S=s | 2021-01-14 |
20210012059 | MOBILE DEVICE RESOURCE PROVISIONING SYSTEM AND METHOD - A first mobile device resource provisioning system of a first party provisions resources to a plurality of remotely-located mobile computing devices. The remotely-located mobile computing devices each use a first native operating system. The provisioning system includes a non-transitory computer readable storage medium configured to store resources for provisioning to at least one mobile device, the resources comprising at least one mobile software application, application data, computer program code, a media asset comprising at least one of an image, audio, graphic, or video file, and at least one URL. At least one mobile device registry stores mobile device information associated with at least one of a plurality of said mobile devices. The provisioning system validates a requesting mobile device by comparing the mobile device information received from the requesting mobile device to the mobile device information stored in the mobile device registry before sending a requested resource to the validated mobile device. | 2021-01-14 |
20210012060 | STRUCTURED DOCUMENT CONVERSION AND DISPLAY SYSTEM AND METHOD - A method of translating a structured document into a dynamic interactive document having fillable fields, the method including the steps of: (a) inputting the structured document into a computer resource; (b) initially utilising the parsable structure of the structured document to determine input fillable fields in the structured document; and (c) outputting a second structured document including a series of interactive fillable fields corresponding to the determined input fillable fields. | 2021-01-14 |
20210012061 | SUPERVISED CROSS-MODAL RETRIEVAL FOR TIME-SERIES AND TEXT USING MULTIMODAL TRIPLET LOSS - A system for cross-modal data retrieval is provided which includes a neural network having a time series encoder and text encoder jointly trained based on a triplet loss relating to two different modalities of (i) time series and (ii) free-form text comments. A database stores training sets with feature vectors extracted from encodings of the training sets. The encodings are obtained by encoding the time series using the time series encoder and encoding the text comments using the text encoder. A processor retrieves the feature vectors corresponding to at least one of the modalities from the database for insertion into a feature space together with a feature vector corresponding to a testing input relating to at least one of a testing time series and a testing free-form text comment, determines a set of nearest neighbors from among the feature vectors based on distance criteria, and outputs testing results. | 2021-01-14 |
20210012062 | Extracting Structured Data from Handwritten and Audio Notes - This application is directed to recognizing unstructured information based on hints provided by structured information. A computer system obtains unstructured information collected from a handwritten or audio source, and identifies one or more terms from the unstructured information. The one or more terms includes a first term that is ambiguous. The computer system performs a recognition operation on the first term to derive a first plurality of candidate terms for the first term, and obtains first contextual information from an information template associated with the unstructured information. In accordance with the first contextual information, the computer system selects a first answer term from the first plurality of candidate terms, such that the first term is recognized as the first answer term. | 2021-01-14 |
20210012063 | INFORMATION PROCESSING DEVICE, DISPLAY METHOD AND PROGRAM - An invoice management apparatus includes an invoice data storage unit that stores therein, upon receipt of business document data including a template that is addressed to a specified recipient, from a terminal device over a network, the received business document data in association with the identification information of the recipient and issuer of the business document data, a template storage unit that stores therein a first template having prescribed items set therein, a second template having items different from the prescribed items, and identification information identifying a target that needs to use the second template, and a data processing unit that accesses, in displaying the business document data, the template storage unit, determines whether either the recipient or the issuer is the target, and upon determining that the recipient or the issuer is the target, applies the second template to the template included in the business document data. | 2021-01-14 |
20210012064 | RECORDING MEDIUM RECORDING COMPLEMENTARY PROGRAM, COMPLEMENTARY METHOD, AND INFORMATION PROCESSING DEVICE - A recording medium stores a program causing a computer to execute processing including: specifying demonstrative words from character information; extracting a first feature of a first referent corresponding to a first demonstrative word, and a second feature of a second referent corresponding to a second demonstrative word; calculating a similarity between the first feature and the second feature corresponding to a same one of the genres; calculating a degree of attention based on information out of the voice information, the character information, and the image information; selecting at least genres based on the similarity and the degree of attention; creating a first complementary word obtained by modifying a name of the first referent with the first feature corresponding to each of the selected genres; and creating a second complementary word obtained by modifying a name of the second referent with the second feature corresponding to each of the selected genres. | 2021-01-14 |
20210012065 | Methods Circuits Devices Systems and Functionally Associated Machine Executable Code for Generating a Scene Guidance Instruction - Disclosed are methods, circuits, devices, systems and functionally associated machine executable code for generating a scene interaction guidance instruction. One or more sensors directed towards an area of the interaction capture information about messages generated by an agent and a subject participants, wherein the captured messages can be verbal or visual in format. A computing platform receives and processes the captured information using a computerized message interpreter to extract meaning from the captured messages information; and a message impact assessment module to characterize, based on the extracted meaning, an impact of each agent generated message on the subject, wherein each impact characterization indicates whether a respective message brought the interaction closer to, or further away from, the specific objective. | 2021-01-14 |
20210012066 | DETERMINING ERRONEOUS CODES IN MEDICAL REPORTS - Systems for determining an erroneous code in a medical report comprising a plurality of codes, each code representing a comment in the medical report the system, comprise a memory comprising instruction data representing a set of instructions and a processor configured to communicate with the memory and to execute the set of instructions. The set of instructions, when executed by the processor, cause the processor to determine a respective vector representation for each of the plurality of codes in the medical report, wherein relative values of any selected pair of vector representations are correlated with a co-occurrence of the corresponding codes in a set of reference medical reports. The set of instructions when exectured by the processor further cause the processor to determine an erroneous code in the medical report, based on the vector representations. | 2021-01-14 |
20210012067 | SENTENCE MATCHING SYSTEM - A sentence matching system includes an input unit configured to input a sentence, a matching determination unit configured to determine matching between the sentence input by the input unit and a preset matching sentence, wherein precision used to determine the matching in accordance with the matching sentence is set in the matching sentence, and the matching determination unit determines the matching at the precision and priority corresponding to the precision for each matching sentence. | 2021-01-14 |
20210012068 | COMPUTERIZED ANALYSIS OF TEAM BEHAVIOR AND COMMUNICATION TO QUANTIFY AND OPTIMIZE TEAM FUNCTION - A computer evaluates free-form text messages among members of a team, using natural language processing techniques to process the text messages and to assess psychological state of the team members as reflected it the text messages. The computer assembles the psychological state as reflected in the messages to evaluate team collective psychological state. The computer reports a trend of team collective psychological state in natural language text form. | 2021-01-14 |
20210012069 | SYMBOL SEQUENCE GENERATION APPARATUS, TEXT COMPRESSION APPARATUS, SYMBOL SEQUENCE GENERATION METHOD AND PROGRAM - A symbol sequence generation device which, when a first symbol sequence x representing a sentence is input, generates a second symbol sequence y corresponding to the sentence and in accordance with a predetermined purpose by a pre-trained neural network, wherein the neural network includes an encoding unit that converts each element x | 2021-01-14 |
20210012070 | Object Recognition System with Invisible or Nearly Invisible Lighting - A barcode reader is provided. The barcode reader includes a first image acquisition assembly having a first imager assembly configured to capture infrared (IR) light and an IR illumination assembly configured to emit IR light over at least a portion of a first field of view (FOV) of the first imager assembly so as to illuminate targets within the first FOV. The barcode reader further includes a second image acquisition assembly having a second imager assembly configured to capture visible light and a visible-light illumination assembly configured to emit visible light over at least a portion of a second FOV of the second imager assembly so as to illuminate targets within the second FOV. | 2021-01-14 |
20210012071 | A NETWORK CONTROL ENTITY, AN ACCESS POINT AND METHODS THEREIN FOR ENABLING ACCESS TO WIRELESS TAGS IN A WIRELESS COMMUNICATIONS NETWORK - A method performed in a network control entity for enabling access to a wireless tag in a wireless communications network is provided. The wireless communications network includes two or more access points, APs. The network control entity configures a first AP to transmit a radio frequency signal in a first time period, and configures a second AP to receive, in the first time period, a radio signal reflected from the wireless tag using the transmitted radio frequency signal. A network control entity for enabling access to at least one wireless tag in a wireless communications network is also provided. | 2021-01-14 |
20210012072 | System and Method for Accurately Reading Radio-Frequency Identification Tags at a Bioptic Barcode Reader - A bioptic barcode reader configured to be supported by a workstation and having a lower housing comprising a platter having a generally horizontal window and a tower portion extending generally perpendicular to the lower housing and having a generally vertical window. A multi-axis radio-frequency identification antenna assembly is positioned within the tower portion of the bioptic barcode reader and includes first, second, and third antennas. The first antenna is configured to emit a radiation pattern oriented in a first direction, the second antenna is configured to emit a radiation pattern oriented in a second direction, substantially orthogonal to the first direction, and the third antenna is configured to emit a radiation pattern oriented in a third direction, substantially orthogonal to the first direction and the second direction. | 2021-01-14 |
20210012073 | COMBINED RADIO FREQUENCY IDENTIFICATION (RFID)-BASED ASSET MANAGEMENT AND COMPONENT AUTHENTICATION - An apparatus and method for combined radio frequency identification (RFID)-based asset management and component authentication are provided. The apparatus comprises a plurality of components to be authenticated, a memory configured to store inventory data, a plurality of root-of-trust (RoT) integrated circuits (ICs), a wired communication bus, and a radio frequency identification (RFID) relay tag. Each RoT IC is mechanically coupled to a corresponding one of the plurality of components and configured to generate authentication data based on a unique key generated for authenticating the corresponding component. The RFID relay tag is connected to each of the RoT ICs via the wired communication bus and is configured to communicate with each of the RoT ICs via the wired communication bus and pass the authentication data and the inventory data to an RFID reader via a radio frequency signal to facilitate authentication of components and inventory management. | 2021-01-14 |
20210012074 | METHOD OF EXAMINING THE PRODUCT INSPECTION - A method of examining the product inspection is provided, which includes the following steps. Perform an inspection step multiple times to obtain the inspection data of the products, and record the inspection data in the product items in the database. The first party selects a plurality of product items from the product items in the database through the first electronic device. The data management system generates a check code corresponding to the check items, and generates a notification message. After the second party responds to the notification message through the second electronic device, the data management system determines whether the inspection data of each of the check items satisfies the corresponding check condition, and transfers the check items satisfying the check condition to the second electronic device. Thereby, it would be more convenient to examine the product inspection. | 2021-01-14 |
20210012075 | METHOD FOR INTELLIGENT INSPECTIONS, ELECTRONIC DEVICE USING METHOD, AND NON-TRANSITORY STORAGE MEDIUM - A method for intelligent inspections applicable in an electronic device scans a two-dimensional code, a scanned result including a first location information associated with the two-dimensional code. Next, the method for intelligent inspections transmits the scanned result to an inspection server to trigger the inspection server to return a command for a second location information of the electronic device. The second location information of the electronic device is given according to the command for the second location information of the electronic device. The second location information of the electronic device is transmitted to the inspection server. A related method for intelligent inspections applicable in an inspection server, and an electronic device using the method are also disclosed. | 2021-01-14 |
20210012076 | Systems and Method for Enabling Selective Use of Illumination Color to Capture Appropriate Data - A bioptic barcode reader is disclosed for selective use of illumination color to capture appropriate data. The bioptic barcode reader includes a housing and a primary imager positioned within the housing, configured to scan a target object during a first time period. The bioptic barcode reader further includes a primary illumination source positioned within the housing configured to emit primary illumination in a primary wavelength range during the first time period. The bioptic barcode reader further includes a secondary imager configured to capture one or more images of a target object during a second time period. The bioptic barcode reader further includes a secondary illumination source configured to emit secondary illumination in a secondary wavelength range during the second time period, wherein the second time period and first time period are interleaved and the secondary wavelength range is different from the primary wavelength range. | 2021-01-14 |
20210012077 | AUTOMATED SCREW IDENTIFICATION SYSTEM AND METHOD WITH LABELED PEGS - A peg, suitable for insertion into a hole in a surgical tray, includes a cap piece, a directional member, and a columnar protrusion. The cap piece includes a machine-readable object that contains data representing information about one or more surgical assets. The directional member has a directional feature which points in a particular direction and which may be oriented to point to one or more surgical assets having the properties represented by the data on the machine-readable object. The columnar protrusion is suitable for being securely inserted into a hole in the surgical tray, such as by being pushed into a hole in a rubber footer. Removal of a surgical asset from the tray is performed by reading data from the machine-readable object that points to the surgical asset and using that data to modify a count of the type of object contained in the tray. | 2021-01-14 |
20210012078 | ELECTRONIC DEVICE - An electronic device has a touch sensing mode and a fingerprint sensing mode, and the electronic device includes a substrate, a driving circuit, a fingerprint sensor and a touch signal line. The driving circuit is disposed on the substrate. The fingerprint sensor is disposed on the substrate, and the fingerprint sensor includes a first electrode and a second electrode, wherein the first electrode is electrically connected to the driving circuit. The touch signal line is disposed on the substrate and electrically connected to the second electrode. | 2021-01-14 |
20210012079 | FINGERPRINT SENSOR, FINGERPRINT RECOGNITION MODULE AND FINGERPRINT RECOGNITION SYSTEM - A fingerprint sensor, a fingerprint recognition module and a fingerprint recognition system. The fingerprint sensor includes: a sensor die configured to collect fingerprint information; a package structure configured to package the sensor die, where the sensor die or the package structure includes a first metal electrode, which is connected with a touch detection module, and the touch detection module is connected with a control module and is configured to feed back a touch signal to the control module, so as to enable the control module to supply power to the fingerprint sensor according to the touch signal, and then enable the sensor die to collect fingerprint information. Under the premise of ensuring low standby power consumption of the fingerprint recognition system, the anti-interference ability and the ESD performance of the fingerprint recognition module are improved, and the flexibility of the touch detection scheme is improved. | 2021-01-14 |