07th week of 2022 patent applcation highlights part 41 |
Patent application number | Title | Published |
20220050849 | BINARY REPRESENTATIONS OF OBJECTS - The described implementations are operable to determine potential objects of interest to a user based on a blend of the user's long-term behavior and short-term interests. Long term user behavior may be determined for the user over a period of time and represented as continuous data. Short-term interest may be determined based on objects with which the user has recently interacted and attributes of those objects may be represented together as continuous data corresponding to the short-term user interest. The continuous data of the short-term interest and long-term user behavior may be blended to produce a user embedding. The user embedding may then be compared with objects to determine objects that are of potential interest to the user. | 2022-02-17 |
20220050850 | Source Code Search Engine - A syntax-based ranking technique is provided that ranks search results from multiple source code files in an order that considers the relevance of each matched term with a corresponding code type and the relevance of the type of file that contains the matched term. Boost values are provided for each code type of a matched term in order to weigh certain occurrences of the matched term with more relevance. Boost values are provided for each type of file that contains the matched term in order to weigh the occurrence of the term in a particular file with more relevance. | 2022-02-17 |
20220050851 | ENABLING DYNAMIC DATA CAPTURE WITH DATABASE OBJECTS - A method and system for capturing dynamic data from data fields of a product has been developed. The method includes first collecting a product data set with multiple data fields. Static data fields of the product data set are identified that contain pre-defined standardized data for multiple other data sets. Next, dynamic data fields of the data set are identified. A dynamic data field is created by a user and contains additional data that is unique and applicable only to the product data set. The static data fields and the dynamic data fields are stored separately in a database repository for later recovery. | 2022-02-17 |
20220050852 | DATA MIGRATION METHOD, DATA MIGRATION SYSTEM, AND NODE - A data migration system | 2022-02-17 |
20220050853 | DATA INTEGRATION EVALUATION SYSTEM AND DATA INTEGRATION EVALUATION METHOD - Upon data integration for integrating a plurality of pieces of data, each of which has one or more columns, in a column direction, a data integration evaluation system | 2022-02-17 |
20220050854 | NORMALIZATION OF UNSTRUCTURED CATALOG DATA - Provided is a method and system for normalizing catalog item data to create higher quality search results. In one example, the method may include receiving a record comprising an unstructured description of an object, identifying a type of the object from among a plurality of object types and identifying a predefined attribute of the identified type of object, extracting a value from the unstructured description corresponding to the predefined attribute and modifying the extracted value to generate a normalized attribute value, and storing a structured record of the object in a structured format comprising a plurality of values of a plurality of attributes of the object from the unstructured description including the normalized attribute value for the predefined attribute of the object. | 2022-02-17 |
20220050855 | DATA EXCHANGE AVAILABILITY, LISTING VISIBILITY, AND LISTING FULFILLMENT - Provided herein are systems and methods for providing a secure and efficient way to manage a data exchange's availability and manage the visibility of data listings of the data exchange. For example, the method may comprise specifying, by an exchange admin of the data exchange, a set of regions where the data exchange is available, each of the set of regions comprising one or more remote deployments. The method may further comprise specifying by a data provider, one or more of the set of regions where a data listing owned by the data provider is visible. Upon receiving a request to access the data listing from a remote deployment of the one or more regions, the data provider may determine whether to reject or fulfill the request. In response to determining that the request should be fulfilled, replicating data of the data listing to the remote deployment. | 2022-02-17 |
20220050856 | ATTRIBUTE SHARING PLATFORM FOR DATA PROCESSING SYSTEMS - A device may receive information for an attribute to include in a shared attribute library. The information may include an attribute identifier, data variables needed to compute a value of the attribute, and source code for computing the value of the attribute. The source code may be written in a first programming language. The device may receive a first request to compute the value of the attribute based on a first set of data variables from a first type of data application and a second request to compute the value of the attribute based on a second set of data variables from a second type of data application that is different than the first type of data application. The device may select a computing server, which may execute the first programming language, to compute the value of the attribute based on the first and second sets of data variables. | 2022-02-17 |
20220050857 | SYSTEMS AND METHODS FOR SCALING DATA WAREHOUSES - Example resource provisioning systems and methods are described. In one implementation, multiple processing resources are provided within a data warehouse. The processing resources include at least one processor and at least one storage device. At least one query to process database data is received. At least some of the processing resources may process the database data. When a processing capacity of the processing resources has reached a threshold processing capacity, the processing capacity is automatically scaled by adding at least one additional processor to the data warehouse. | 2022-02-17 |
20220050858 | Snapshot-Based Hydration Of A Cloud-Based Storage System - Systems, methods, and computer readable storage mediums for snapshot-based hydration of a cloud-based storage system, including: storing, in a cloud computing environment, a snapshot of a dataset that is stored on a separate storage system, wherein the snapshot includes a self-described copy of the dataset such that the dataset can be reconstructed without accessing the separate storage system; creating, in a cloud computing environment, at least a portion of a cloud-based storage system; and populating, from the snapshot that is stored in the cloud computing environment, at least a portion of a storage layer within the cloud-based storage system, wherein the cloud-based storage system can service I/O operations to the dataset after the storage layer has been populated. | 2022-02-17 |
20220050859 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE, AND APPARATUS TO MAP CLIENT SPECIFICATIONS WITH STANDARDIZED CHARACTERISTICS - Methods, systems, articles of manufacture, and apparatus are disclosed to map client specifications to standardized characteristics. An example apparatus includes a cluster identifier to cluster client databases into client clusters based on a threshold quantity of overlapping universal product codes (UPCs) between respective ones of the client databases, a characteristic analyzer to identify custom characteristics from the respective ones of the client clusters, ones of the custom characteristics having dissimilar nomenclature, and a graph builder to cluster the ones of the custom characteristics based on a similarity metric, and normalize the ones of the custom characteristics as a proxy characteristic, the proxy characteristic having a common nomenclature to represent the ones of the custom characteristics, the characteristic analyzer to enable improved product marketing analysis by replacing dissimilar nomenclature with the proxy characteristic. | 2022-02-17 |
20220050860 | A Topological Basemodel Supporting Improved Conflation and Stable Feature Identity - The present disclosure is directed to systems and methods for providing a stable topological representation of pathway networks as well as features associated with these networks. The disclosure is exemplified using road networks which have applications in mapping, navigation, and autonomous vehicles. Extensions may be learned through practice of the disclosure. Utilizing implementations disclosed herein may provide advantages for data conflation between different mapping systems and map data while improving overall stability by developing a common reference standard that is tied to semantic features rather than abstract geographic representations. | 2022-02-17 |
20220050861 | Realtime, Interactive and Geographically Defined Computerized Personal Identification and Matching Methods - In general, the invention relates to a method of interactive and live computerized matching in which a first user has a personal data device including a wireless communication system. A network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system that is capable of communicating with the user's personal data device. The first user is allowed to log on through the wireless communication system to the network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users on to the network near the same geographic location to facilitate a match. | 2022-02-17 |
20220050862 | METHOD FOR PROCESSING DISAPPEARING MESSAGES IN AN ELECTRONIC MESSAGING SERVICE AND CORRESPONDING PROCESSING SYSTEM - A method for processing disappearing electronic messages from among electronic messages in a user's inbox is disclosed. At least one of the following two analysis mechanisms is implemented in order to detect whether an electronic message received in the inbox is a disappearing message: a first mechanism for analyzing the content of the electronic message, a second mechanism for detecting a label or a data field associated to the electronic message indicating a disappearing nature of the message, and in a case that one of the two analysis mechanisms detects that a received electronic message is a disappearing message, archiving the electronic message is provided. | 2022-02-17 |
20220050863 | CAPTURING MESSAGES FROM A PHONE MESSAGE EXCHANGE - A method for text capture is provided. The method monitors a text session among a set of mobile text-enabled devices capable of having mixed operating system types. The method captures messages and message metadata from the text session by a machine-attended message-capture-dedicated phone configured for reception-or-pass-through-only with respect to the mobile text-enabled devices. The method receives the messages and the message metadata from the message-capture-dedicated phone by a remote message capture device that is constrained to have a compatible operating system type as the machine-attended message-capture-dedicated phone but unconstrained with respect to the operating system type of the set of mobile text-enabled devices. The method stores the metadata and the message metadata for remote access in a searchable remote message repository, unconstrained with respect to the operating system type of the set of mobile text-enabled devices, the machine-attended message-capture-dedicated phone, and the remote message capture device. | 2022-02-17 |
20220050864 | MAPPING NATURAL LANGUAGE UTTERANCES TO NODES IN A KNOWLEDGE GRAPH - Certain aspects of the present disclosure provide techniques for mapping natural language to stored information. The method generally includes receiving a long-tail query comprising a natural language utterance from a user of an application associated with a set of topics and providing the natural language utterance to a natural language model configured to identify nodes of a knowledge graph. The method further includes, based on output of the natural language model, identifying a node of a knowledge graph associated with the natural language utterance, wherein the output of the natural language model includes a node identifier for the node of the knowledge graph and providing the node identifier to the knowledge engine. The method further includes receiving a response associated with the node of the knowledge graph from the knowledge engine and transmitting the response to the user in response to the long-tail query. | 2022-02-17 |
20220050865 | SYSTEMS AND METHODS FOR LEVERAGING ACOUSTIC INFORMATION OF VOICE QUERIES - The methods and systems described herein leveraging acoustic features of a user to generate and present a personalized content to a user. In one example, the method receives a voice query and determines that the query refers to either a first content item or a second content item. The first content item is associated with a first type assigned with a first score and the second content method also determines whether the query is from the second entity type. The method ranks the first and the second content items based on this determination and generates for presentation of the first and the second content items based on the ranking. The method also changes the first or the second scores based on this determination and selects one of the first or the second content item for presentation. | 2022-02-17 |
20220050866 | SYSTEMS AND METHODS FOR LEVERAGING ACOUSTIC INFORMATION OF VOICE QUERIES - The methods and systems described herein leveraging acoustic features of a user to generate and present a personalized content to a user. In one example, the method receives a voice query and determines that the query refers to either a first content item or a second content item. The first content item is associated with a first type assigned with a first score and the second content item is associated with a second entity type assigned with a second score. The method also determines whether the query is from the second entity type. The method ranks the first and the second content items based on this determination and generates for presentation of the first and the second content items based on the ranking. The method also changes the first or the second scores based on this determination and selects one of the first or the second content item for presentation. | 2022-02-17 |
20220050867 | IMAGE MANAGEMENT WITH REGION-BASED METADATA INDEXING - An embodiment provides a method, including: receiving, from a device, a user identification; storing, in a storage device, first data produced by first free-form user input specifying one or more regions of an image and second data comprising second free-form user input describing the one or more regions of the image; each first data having corresponding second data stored in association therewith; selecting, using a processor, a data set comprising at least a portion of the first data and the second data based at least in part on the user identification; and providing the selected data set for display. Other embodiments are described and claimed. | 2022-02-17 |
20220050868 | TELESCOPE STAR SEARCHING METHOD AND DEVICE BASED ON IMAGE RECOGNITION AND TELESCOPE - Provided is a telescope star searching method and device based on image recognition and telescope. The method includes: using a telescope to photograph a starry sky image; identifying a star in the starry sky image and matching a right ascension and a declination of the identified star according to a star database; obtaining a first altitude/azimuth angle according to photographing time of the starry sky image, a location of an imaging apparatus at the photographing time, and the right ascension and the declination of the identified star; matching a right ascension and a declination of a target star in the star database; obtaining a second altitude/azimuth angle according to current time, a current location of the imaging apparatus, and the right ascension and the declination of the target star; and adjusting the telescope from the first altitude/azimuth angle to the second altitude/azimuth. | 2022-02-17 |
20220050869 | VIDEO DELIVERY DEVICE, VIDEO DELIVERY SYSTEM, VIDEO DELIVERY METHOD AND VIDEO DELIVERY PROGRAM - An image distribution apparatus includes a storage that associates and stores image data with a value, a specifying value reception unit that receives the value, and a selection unit that selects one image data based on the received value and transmits the selected image data to a display device. If the value reception unit does not receive the value, the selection unit selects the image data corresponding to the value that has already been specified. If the value is received by the value reception unit, the selection unit selects the image data corresponding to the received value, identifies the frame configuring the new image data corresponding to the same time as or the time immediately after the time data of one image data corresponding to the time when the value is received by the value reception unit as reference, and transmits the new image data after the identified frame. | 2022-02-17 |
20220050870 | INTELLIGENT ONLINE PERSONAL ASSISTANT WITH OFFLINE VISUAL SEARCH DATABASE - Systems, methods, and computer program products for identifying a candidate product in an electronic marketplace based on a visual comparison between candidate product image visual content and input query image visual content. Embodiments generate and store descriptive image signatures from candidate product images or selected portions of such images. A subsequently calculated visual similarity measure serves as a visual search result score for the candidate product in comparison to an input query image. Any number of images of any number of candidate products may be analyzed, such as for items available for sale in an online marketplace. Image analysis results are stored in a database and made available for subsequent automated on-demand visual comparisons to an input query image. The embodiments enable substantially real time visual based product searching of a potentially vast catalog of items. | 2022-02-17 |
20220050871 | MEDICAL IMAGING DISTRIBUTION SYSTEM AND DEVICE - Improved systems and devices for medical imaging distribution are provided. A medical imaging order may be received from a medical facility that includes medical imaging. A configuration may be selected and applied based on a body site and an urgency field associated with the order that defines queueing rules for the medical imaging order. Utilization factors for queues associated with radiologists may also be determined. The configuration and the utilization factors may be used to determine a subset of queues associated with a subset of radiologists. The subset of queues may be prioritized based on certain requirements, such as how many medical imaging reports a particular radiologist is required to review, how many medical imaging reports are required to be allocated to a particular radiologist, and the like. The highest prioritized queue may be selected and the medical imaging order may be transmitted to the radiologist associated with that queue. | 2022-02-17 |
20220050872 | Device, System, and Method of Generating and Playing Navigatable Podcasts - Devices, systems, and methods of generating and playing navigatable podcasts. A method includes: receiving an audio recording of a podcast; performing automatic speech recognition of the audio recording of the podcast, to generate a textual transcript of the podcast; detecting vocal cues in the textual transcript of the podcast, wherein each detected vocal cue indicates a beginning of a new in-podcast topic of the podcast; automatically generating for the podcast a table of content having a list of in-podcast topics. An end-user device then displays the table of content of the podcast during its playback, and enables to skip or navigate among the displayed in-podcast topics. | 2022-02-17 |
20220050873 | SYSTEMS AND METHODS FOR OPTIMIZED QUANTUM SEARCHING USING A BINOMIAL VERSION OF GROVER'S SEARCH ALGORITHM - A method for optimized quantum searching may include: creating a quantum circuit that implements Grover's algorithm; in a pre-transpile step, instances of Hadamard (H) gates around application of an oracle in the quantum circuit; identifying a number of 1s in a target state and a number of qubits required for the target state; calculating a value ω | 2022-02-17 |
20220050874 | VISUAL DATA MODEL OBJECT DEPENDENCY TRACING - Embodiments of the present disclosure provide a method and system for visual data object dependency tracing. In an embodiment of the disclosure, a method for visual data object dependency tracing includes issuing display instructions to display a visualization of a relational database table in a display in communication with the data processing hardware, the relational database table representing a data model for data of a database, the visualization of the relational database table including a network of nodes coupled, each node coupled to at least one other node by a connector and each node representing a corresponding object of the data model, each connector representing a corresponding correlation between objects. | 2022-02-17 |
20220050875 | Time Period Data Comparison - The present disclosure relates to comparisons of data over time and generating recommendations to create such comparisons. A visualization in an analytics application may include a plurality of data points and a user may select of one or more of the data points to configure the visualization. If the context of the visualization is based on time, the software may determine whether the one or more selected data points includes the current time period. If so, comparisons of the data over time may be included in the visualization and creation of these comparisons may be recommended to the user. One or more data comparisons may be determined by comparing each of the one or more selected data points to a corresponding data point in a previous time period. An updated visualization including the selected data points and the data comparisons may be provided. | 2022-02-17 |
20220050876 | SYSTEMS AND METHODS FOR QUERY AUTOCOMPLETION - Embodiments described herein provide a query autocompletion (QAC) framework at subword level. Specifically, the QAC framework employs a subword encoder that encodes or converts the sequence of input alphabet letters into a sequence of output subwords. The generated subword candidate sequences from the subword encoder is then for the n-gram language model to perform beam search on. For example, as user queries for search engines are in general short, e.g., ranging from 10 to 30 characters. The n-gram language model at subword level may be used for modeling such short contexts and outperforms the traditional language model in both completion accuracy and runtime speed. Furthermore, key computations are performed prior to the runtime to prepare segmentation candidates in support of the subword encoder to generate subword candidate sequences, thus eliminating significant computational overhead. | 2022-02-17 |
20220050877 | SYSTEMS AND METHODS FOR QUERY AUTOCOMPLETION - Embodiments described herein provide a query autocompletion (QAC) framework at subword level. Specifically, the QAC framework employs a subword encoder that encodes or converts the sequence of input alphabet letters into a sequence of output subwords. The generated subword candidate sequences from the subword encoder is then for the n-gram language model to perform beam search on. For example, as user queries for search engines are in general short, e.g., ranging from 10 to 30 characters. The n-gram language model at subword level may be used for modeling such short contexts and outperforms the traditional language model in both completion accuracy and runtime speed. Furthermore, key computations are performed prior to the runtime to prepare segmentation candidates in support of the subword encoder to generate subword candidate sequences, thus eliminating significant computational overhead. | 2022-02-17 |
20220050878 | EXPANDING OR ABRIDGING CONTENT BASED ON USER DEVICE ACTIVITY - A method, system and computer program product are provided. For each keyword that is visible on a display device, scanning the content that is stored on a user device, or is accessed from a network connection to identify and extract keywords. Further provided is cross-referencing the extracted keywords with a corpus of scored keywords. Based on the extracted keywords being found in the corpus of scored keywords, expanding and/or abridging any of the extracted keywords based on a score in the corpus of scored keywords prior to displaying the modified content on the display device. wherein the extracted keywords match a keyword in the corpus. | 2022-02-17 |
20220050879 | HYBRID APPROACH TO APPROXIMATE STRING MATCHING USING MACHINE LEARNING - Systems, apparatuses, and methods are provided for identifying a corresponding string stored in memory based on an incomplete input string. A system can analyze and produce phonetic and distance metrics for a plurality of strings stored in memory by comparing the plurality of strings to an incomplete input string. These similarity metrics can be used as the input to a machine learning model, which can quickly and accurately provide a classification. This classification can be used to identify a string stored in memory that corresponds to the incomplete input string. | 2022-02-17 |
20220050880 | SYSTEMS AND METHODS FOR VISUALIZING POSTING DATA AND FACILITATING POSTING COMMUNICATIONS - Systems and methods are described for generating a graphical representation of a mapping of post data of a posting. In various aspects, post data may be collected which may include a first node of a plurality of nodes identifying a submitting user of the one or more document management systems. Reaction data may be collected which may include a second node of the plurality of nodes identifying a reacting user of the one or more document management systems. The mapping may then be generated from the post data and the reaction data, in which the mapping may include the first node and the second node. The graphical representation of the mapping may then be generated, wherein zooming out of the graphical representation may filter out one or more nodes of the plurality of nodes based on a number of edges corresponding to the one or more nodes. | 2022-02-17 |
20220050881 | METHODS AND APPARATUS FOR PROVIDING DIGITAL ITEM ADVERTISEMENTS - This application relates to apparatus and methods for automatically determining and providing item advertisements, such as for display on a website. In some examples, a computing device obtains a prioritized list of item advertisements for each of a plurality of item categories. The computing device also obtains an item category for each of a plurality of positions of a display interface. Each item category may correspond to one or more of the plurality of item categories. Further, the computing device determines, for each position of the plurality of positions of the display interface, an item advertisement based on the item category for the position and the prioritized list of item advertisements. The computing device generates display interface position data identifying the item advertisement determined for each position of the plurality of positions of the display interface. The computing device transmits the display interface position data to a web server. | 2022-02-17 |
20220050882 | CONTENT SEARCH AND RESULTS - A search request for content can be initiated by a user, and the content that is relevant to the search request can be identified and presented in a manner that indicates the content's trustworthiness or relevancy. The identified content can be ranked based on the number of times the content has been referenced as well as by source that referenced the content. The relevant identified content can then be displayed in an ordered list that is ordered based on the number of times the content has been referenced. In some cases, the order may be modified by the authority of the source. | 2022-02-17 |
20220050883 | DIRECTLY, AUTOMATICALLY EMBEDDING A CONTENT PORTION - A method, system, and apparatus—using conventional web browsers with no custom software installation—for enabling a user to share at least one portion of content is disclosed. The user selected portions of content, or references to them, are stored in a repository and are made available for subsequent viewing to a potentially larger universe of users. Neither group: the users selecting the portions of content, nor the users viewing the previously selected portions of content, need to install any special software to avail all these benefits. The invention discloses automatically creating and embedding a portion of content from an internet document into another document. Using the teachings from this invention publishers can share their content across the internet in a manner so as to get increased exposure, back links, branding, advertising, and virality—and a plethora of other benefits. | 2022-02-17 |
20220050884 | UTILIZING MACHINE LEARNING MODELS TO AUTOMATICALLY GENERATE A SUMMARY OR VISUALIZATION OF DATA - In some implementations, a device may access source data associated with a web platform. The device may determine that the source data is associated with a topic. The device may extract, based on the source data being associated with the topic, web data associated with the web platform. The device may select, based on a characteristic of the web data, a model to process the web data to convert the web data to a representation associated with the web data. The model may be a summarization model that is configured to generate the representation to include a summary of text of the web data and/or a visualization model that is configured to generate the representation to include a visualization associated with the text of the web data. The device may cause the model to convert the web data to the representation. | 2022-02-17 |
20220050885 | FAVORITES MANAGEMENT AND INFORMATION SEARCH SERVICE PROVIDING SYSTEM AND FAVORITES MANAGEMENT AND INFORMATION SEARCH SERVICE PROVIDING METHOD USING SAME - The present invention relates to a favorites management and information search service providing system and a favorites management and information search service providing method using same. According to the present invention, by resolving problems in favorites systems and methods of an existing technology in which a user has to individually add web pages visited by the user to favorites and thus favorites items are difficult to manage and inconvenient to use as the number of the favorites items increases, a user can add a relevant web page to favorites simply by clicking the address of a favorites management website, can easily manage the stored favorites items and can easily share with other users. Also, when the user inputs a search word, the search word is analyzed and search results from a plurality of preset search engines and websites are provided simultaneously. If a website is in a foreign language, an automatic translation into a national language is provided. Therefore, the user can more conveniently store and use favorites and also quickly and easily receive desired search results. | 2022-02-17 |
20220050886 | SPARSE MATRIX STANDARDIZATION DEVICE, SPARSE MATRIX STANDARDIZATION METHOD, SPARSE MATRIX STANDARDIZATION PROGRAM, AND DATA STRUCTURE - A computation unit | 2022-02-17 |
20220050887 | BLOCKCHAIN-BASED INFRINGEMENT DETECTION METHOD, APPARATUS, AND ELECTRONIC DEVICE - A blockchain-based infringement detection method includes: receiving a registration transaction initiated by a user, wherein the registration transaction includes key data of a work to be deposited and a contract address of a smart contract; invoking, in response to the registration transaction, a first detection logic declared in the smart contract corresponding to the contract address, extracting a feature value from work content of the work to be deposited, and matching the extracted feature value with a feature value of a deposited work in the blockchain; if the matching succeeds, further invoking a second detection logic declared in the smart contract corresponding to the contract address, matching the key data of the work to be deposited with key data of the deposited work in the blockchain, and when the matching succeeds, determining that the work to be deposited has an infringement risk. | 2022-02-17 |
20220050888 | DIGITAL WATERMARKING OF MACHINE-LEARNING MODELS - In one embodiment, a method includes by a computing device, detecting a sensory input, identifying, using a machine-learning model, one or more attributes associated with the machine-learning model, wherein the attributes are identified based on the sensory input in accordance with the model's training, and presenting the attributes as output. The identifying may be performed at least in part by an inference engine that interacts with the model. The sensory input may include an input image received from a camera, and the model may identify the attributes based on an input object in the input image in accordance with the model's training. The model may include a convolutional neural network trained using training data that associates training sensory input with the attributes. The training sensory input may include a training image of a training object, and the input object may be classified in the same class as the training object. | 2022-02-17 |
20220050889 | METHODS AND APPARATUS FOR AUTHORIZING USE OF A MAT PROCESSING DEVICE - Methods and apparatus for authorizing use of a mat processing device are disclosed. The disclosed process requests and receives a public customer identifier. If the public identifier is not on a “required” list, the process authorizes a mat processing despite payment not yet being confirmed and no private information being. If the public customer identifier is recognized by the system, the process requests and receives a private customer identifier, even though the mat processing has already been authorized. If the private identifier is associated with the public identifier, the customer's account is debited for the mat processing. If the private identifier does not correspond to the public identifier, and optionally an additional user confirmation attempt fails, the public identifier is placed on the “required” list, so subsequent attempts will not receive a “free” mat processing. | 2022-02-17 |
20220050890 | REMOTELY VERIFYING AN IDENTITY OF A PERSON - A computer-implemented method for remotely verifying an identity of a user is presented. The method comprises a first data processing device ( | 2022-02-17 |
20220050891 | DATA PROCESSING METHOD, USER TERMINAL AND SERVERS - A data processing method, a detection device administration server, a user terminal, a network server, and a data processing system are provided. The data processing method is applicable to a detection device administration server and includes: communicating with a first detection device; sending, in response to a user terminal of a user binding the first detection device through first identification information of the first detection device, a first detection request to the first detection device; and receiving, after the user completes the first detection, first detection data sent by the first detection device. | 2022-02-17 |
20220050892 | MULT-FACTOR AUTHENTICATION UTILIZING NON-CENTRALIZED KEY CREATION WITH PHYSICAL RANDOMNESS - Methods and systems are provided for a multi-factor authentication technique that includes inputs of a physical key possessed by the user as a factor. Such a key may be a physical object that the user possesses and that includes truly random features not easily reproducible. The key may be custom to the user and may include inclusions or anomalies that affect a signal transmitted through the key. Such effects may impart a unique effect on signals transmitted through the key, producing a unique fingerprint to identify whether the key is authentication. An input from the user may be an additional factor within the authentication process. | 2022-02-17 |
20220050893 | SENTENCE BASED AUTOMATED TURING TEST FOR DETECTING SCRIPTED COMPUTING ATTACKS - There are provided systems and methods for a sentence based automated Turing test for detecting scripted computing attacks. A computing may request access to a service or data from a service provider, where the service provider may be required to determine that the device is used by a user and not a bot executing a scripted or automated process/attack against the service provider. To authenticate that the device is used by a user, the service provider may determine and output a challenge that queries the user to fill in one or more missing words from a sentence. Acceptable answers may be based on past messages and internal data that is specific to the service provider, as well as an external corpus of documents. The service provider may also further authenticate the user based on the user's response and a likely user response for that user. | 2022-02-17 |
20220050894 | Automated Password Generation - Disclosed herein are system, method, and device embodiments for implementing password suggestion. An embodiment operates by selecting one or more random terms from dictionary information, generating an alphanumeric string based on a password requirement, combining the one or more random terms and the alphanumeric string to form a generated password, determining a password strength of the generated password based on compromised password information, and presenting the generated password for selection by a user device when the password strength meets or exceeds a threshold value. | 2022-02-17 |
20220050895 | MINING AND INTEGRATING PROGRAM-LEVEL CONTEXT INFORMATION INTO LOW-LEVEL SYSTEM PROVENANCE GRAPHS - A computer-implemented method is provided for computer intrusion detection. The method includes establishing a mapping from low-level system calls to user functions in computer programs. The user functions run in a user space of an operating system. The method further includes identifying, using a search algorithm inputting the mapping and a system-call trace captured at runtime, any of the user functions that trigger the low-level system calls in the system-call trace. The method further includes performing, by a processor device, intrusion detection responsive to a provenance graph with program contexts. The provenance graph has nodes formed from the user functions that trigger the low-level system calls in the system-call trace. Edges in the provenance graph have edge labels describing high-level system operations for low-level system call to high-level system operation correlation-based intrusion detection. | 2022-02-17 |
20220050896 | SYSTEM AND METHOD FOR PROTECTING AGAINST RANSOMWARE WITHOUT THE USE OF SIGNATURES OR UPDATES - A cybersecurity solution for preventing malware from infecting a computing device or a computer resource on the computing device. The solution can include detecting a computer resource process running or attempting to run on an operating system and comparing details of the computer resource process against an authorized processes database containing details of previously run computer resources processes to determine if the computer resource process is running or attempting to run for a first time on the operating system. The solution can include adding, during a learning mode, the details of the computer resource process to the authorized processes database when it is determined that the computer resource process is running or attempting to run for the first time on the operating system, and suspending, during a protect mode, the computer resource process from running on the operating system when it is determined that the computer resource process is running or attempting to run for the first time on the operating system. The details of the computer resource process can include at least one of semaphore data, mutex data or atom data for the computer resource process. | 2022-02-17 |
20220050897 | MICROSERVICE ADAPTIVE SECURITY HARDENING - Methods and systems for evaluating microservice system level activities including system calls and commands, and generating security policies for microservices are disclosed. A microservice agent, operating on a microservice host, can collect system level activity data corresponding to a plurality of microservices operating on the microservice host. The microservice agent can transmit the system level activity data to a microservice evaluator that can use the system level activity data to train machine learning models to identify normal and abnormal microservice system level activities. The normal and abnormal system level activities can be used to generate security policies that can be applied to the microservices. Microservices that perform abnormal system level activities or system level activities that violate security policies can be paused or terminated. | 2022-02-17 |
20220050898 | Selective Control of a Data Synchronization Setting of a Storage System Based on a Possible Ransomware Attack Against the Storage System - An illustrative method includes determining, by a data protection system, that a dataset stored by a first storage system is possibly being targeted by a security threat while a data synchronization setting for the first storage system is enabled such that the dataset stored by the first storage system is synchronously replicated to a second storage system; and disabling, by the data protection system based on the determining that the dataset stored by the first storage system is possibly being targeted by the security threat, the data synchronization setting to prevent the dataset stored by the first storage system from being synchronously replicated to the second storage system. | 2022-02-17 |
20220050899 | SYSTEMS AND METHODS FOR SYNTHETIC FILE SCANNING - Disclosed herein are systems and method for synthetic file scanning. In one exemplary aspect, a method may comprise, for each respective file in a plurality of files on a storage device, determining a respective likelihood of the respective file being targeted by the malicious activity, and including, in a subset of files, each respective file in the plurality of files with a respective likelihood that is greater than a threshold likelihood. The method may comprise for each respective file in the subset of files, identifying at least one fragment of the respective file that is susceptible to the malicious activity. The method may comprise extracting and storing at least one fragment from each respective file in a synthetic file, and scanning the synthetic file periodically instead of the plurality of files. | 2022-02-17 |
20220050900 | CLOUD-BASED SYSTEMS AND METHODS FOR DETECTING AND REMOVING ROOTKIT - An exemplary method includes: obtaining, at one or more cloud servers, endpoint data of an endpoint computing device; based on the endpoint data, determining, by the one or more cloud servers, a plurality of script-language rules, wherein: each of the plurality of script-language rules corresponds to an atomic operation of detecting and/or removing at least one rootkit, the at least one rootkit comprises a target rootkit, and the plurality of script-language rules comprise a set of one or more rootkit rules corresponding to the target rootkit; and transmitting, by the one or more cloud servers to the endpoint computing device, the plurality of script-language rules, wherein the set of rootkit rules is executable at the endpoint computing device to detect and/or remove the target rootkit by, for each of the set of rootkit rules, executing a corresponding atomic operation. | 2022-02-17 |
20220050901 | Security Assessment Scheduling Tool - A security assessment scheduling tool uses a configuration file that is configurable via a user interface, to specify one or more elements of an application to be analyzed during the scoping process. Further, the security assessment scheduling tool may automatically schedule assessments for large numbers of applications using one or more constraining optimization techniques and/or via modeling the scheduling problem as an RCPSP problem. The security assessment scheduling tool processes the RCPSP problem for a defined period of time and then schedules remaining unscheduled applications within a specified time period thereby allowing the security assessment scheduling tool to schedule assessments of tens of thousands of applications. | 2022-02-17 |
20220050902 | OPENTELEMETRY SECURITY EXTENSIONS - In one embodiment, a device instruments an application to generate OpenTelemetry trace data during execution of the application. The device detects an occurrence of a security event during execution of the application. The device identifies a correlation between the security event and the OpenTelemetry trace data. The device provides an indication of the security event in conjunction with the OpenTelemetry trace data, based on the security event being correlated with the OpenTelemetry trace data. | 2022-02-17 |
20220050903 | SECURE DATA STORAGE - Methods of securely storing and providing data in a data storage system, and a corresponding system are described. A method comprises the steps of: connecting the security module to a remote host only within a predetermined remote access time window, wherein said remote access time window is stored on the security module; receiving a file transfer request from the remote host to the security module; authenticating the file transfer request; receiving the file and caching the file within the security module; isolating the remote host from the security module; connecting the security module and the data storage device; transferring the cached file from the security module to be stored in the data storage device; and isolating the security module and the data storage device once file transfer is complete. This provides a secure system where a data storage device is controllably connected to a remote host. | 2022-02-17 |
20220050904 | SYSTEMS AND METHODS FOR DATA LIFECYCLE PROTECTION - Systems and methods for metadata processing. The method comprises acts of associating, in a first system, metadata with application data processed by a host processor, wherein the application data is protected within the first system by one or more first policies using the metadata, and transferring the application data and its associated metadata to a second system in which the application data is unprotected using metadata processing or is protected by one or more second policies different from the one or more first policies. | 2022-02-17 |
20220050905 | SECURE COMPUTING SYSTEM - A computer system with multiple security levels, the system comprising a high-power processing device ( | 2022-02-17 |
20220050906 | METHODS AND APPARATUS FOR DOCUMENT SHARING - Aspects of the present disclosure relate to an apparatus comprising secure enclave circuitry and document owner circuitry. The document owner circuitry is configured to determine a document to be shared, generate a plurality of share data units, transmit each share data unit of the plurality of share data units to a corresponding shareholder device, and provision the secure enclave circuitry with data indicative of the document to be shared. The secure enclave circuitry is configured to receive putative share data units from at least one of the corresponding shareholder devices, determine whether the received putative share data units satisfy a sharing policy, and responsive to the received putative share data units satisfying the sharing policy and based on the data indicative of the document to be shared, provide the document to be shared to said at least one of the corresponding shareholder devices. | 2022-02-17 |
20220050907 | DYNAMIC BATCH LIMIT VALIDATION - The present disclosure relates generally to systems and methods for validating data, such as data related to testing or sampling a batch of a product, with a data compliance tracking system. An exemplary method includes receiving at least one data point from a computing element, wherein the data point corresponds to data collected from a sampling of at least one parameter during a batch run of a product and includes time stamp data; determining limit information corresponding to the at least one parameter, wherein the limit information includes at least one limit associated with at the least one parameter and has an associated valid value range; storing the at least one data point and the limit information; receiving an analytics request from a user device; analyzing the stored limit information to apply a limit to a select data point; and displaying an analytics output. | 2022-02-17 |
20220050908 | Domain Crossing in Executing Instructions in Computer Processors - Systems, apparatuses, and methods related to securing domain crossing using domain access tables are described. For example, a computer processor can have registers configured to store locations of domain access tables respectively for predefined, non-hierarchical domains. Each respective domain access table can be pre-associated with a respective domain and can have entries configured to identify entry points of the respective domain. The processor is configured to enforce domain crossing in instruction execution using the domain access tables and to prevent arbitrary and/or unauthorized domain crossing. | 2022-02-17 |
20220050909 | CONTROLLING USE OF DATA DETERMINED BY A RESOLVE-PENDING SPECULATIVE OPERATION - A data processing apparatus is provided which controls the use of data in respect of a further operation. The data processing apparatus identifies whether data is trusted or untrusted by identifying whether or not the data was determined by a speculatively executed resolve-pending operation. A permission control unit is also provided to control how the data can be used in respect of a further operation according to a security policy while the speculatively executed operation is still resolve-pending. | 2022-02-17 |
20220050910 | TRANSMISSION DEVICE AND COMMUNICATION SYSTEM - A transmission device of the disclosure includes a first selector configured to select one of a first signal and a second signal, and output the selected signal; a second selector configured to select one of an inversion signal of the first signal, the second signal, and an inversion signal of the second signal, and output the selected signal; a first control signal generator configured to generate a first control signal, a second control signal, and a third control signal, based on the first signal, the second signal, and a third signal; a first driver configured to set a voltage of a first output terminal, based on an output signal of the first selector and the first control signal; and a second driver configured to set a voltage of a second output terminal, based on an output signal of the second selector and the second control signal. | 2022-02-17 |
20220050911 | EMERGENCY NOTIFICATION SYSTEM AND METHODS - The present invention is related to systems and methods for identifying and reporting a crisis status. In at least one embodiment, the system comprises a central server; an administrative work station communicably coupled to the central server, wherein the administrative work station is accessible only by an authorized administrator; a database communicably coupled to the central server, the database including a floor plan of the area, wherein the database is accessible and modifiable by the authorized administrator at the administrative work station; and a remote device at a particular location in the area, the remote device communicably coupled to the central server, the remote device capable of communicating securely to the database the particular location of the remote device and the crisis status of the particular location. | 2022-02-17 |
20220050912 | SECURITY SEMANTICS FOR DATABASE QUERIES - A computer-implemented method to inject security semantics into database queries. The method includes receiving, by a database system, a query, wherein the query is received from a host and the query is generated by a first user account. The method also includes, generating an access plan for the query. The method further includes, determining a first portion of the access plan matches a first security syntax. The method includes, injecting, in response to determining the first portion of the access plan matches the first security syntax, the first security syntax into the access plan. The method further includes, executing the query. The method includes, returning a set of results of the query to the host. | 2022-02-17 |
20220050913 | RESTRICTIONS ON VIRTUALIZED SESSIONS USING RISK FACTOR ASSESSMENT - One example disclosed method involves a computing system providing a client device a virtualized computing environment. Upon receiving a request to access a file or folder in the virtualized computing environment from the client device, a file system filter driver of the computing system may intercept the request, and determine authorization to access the file or folder based at least in part on a security policy associated with the user account. If the client device is authorized to access the file or folder, the computing system may cause the client device to output a representation of contents of the first file or folder using the virtualized computing environment. | 2022-02-17 |
20220050914 | SYSTEMS AND METHODS FOR SECURING AND DISSEMINATING TIME SENSITIVE INFORMATION USING A BLOCKCHAIN - An information computer system is provided for securely releasing time-sensitive information to recipients via a blockchain. A submitter submits a document to the system and a blockchain transaction is generated and submitted to the blockchain based on the document (e.g., the document is included as part of the blockchain transaction). An editor may edit the document and an approver may approve the document for release to the recipients. Each modification and/or approval of the document is recorded as a separate transaction on the blockchain where each of the submitter, editor, approver, and recipients interact with the blockchain with corresponding unique digital identifiers—such as private keys. | 2022-02-17 |
20220050915 | Consent Provenance and Compliance Tracking over a Complex Consumer Data Supply Chain Using Blockchain Distributed Ledger - The invention is a system based on decentralized ledgers to enable compliance with privacy regulations. A consumer identifier (consumer ID) allows consent provenance to be saved in a shared decentralized ledger. The consent ID also empowers consumers to query as to how their data has been moved through the data supply chain. The consumer data itself is not stored in the blockchain, only consents and data transfer events. A consent API allows companies to enter the original consumer consent in a consent ledger; a data transfer API allows companies to record transfers from one to another; and a subscription API allows companies to be notified of changes to a given consent. | 2022-02-17 |
20220050916 | DEVICE AND METHOD FOR MANAGING PERSONAL DATA - A data management device manages personal data to which consent information indicating a data user authorized as a receiver has been added. The data management device includes: a cache memory and a processor. When personal data requested by a data user is stored in the cache memory, the processor acquires the requested personal data from the cache memory. When personal data requested by the data user is not stored in the cache memory, the processor acquires the requested personal data from a data holder. The processor decides based on consent information added to the personal data acquired whether to provide the personal data to the data user. When the data management device acquires new personal data from a data holder, the processor decides whether to store the new personal data in the cache memory based on consent information added to the new personal data. | 2022-02-17 |
20220050917 | RE-IDENTIFICATION RISK ASSESSMENT USING A SYNTHETIC ESTIMATOR - A risk of re-identifying a particular individual associated with a record in a dataset can be assessed by synthesizing a dataset from a dataset to be shared and then sampling a synthetic microdata dataset from the synthetic dataset. The synthetic dataset and the synthetic microdata dataset can then be used to estimate the risk of re-identifying an individual from the dataset to be shared. | 2022-02-17 |
20220050918 | UPDATES OF MACHINE LEARNING MODELS BASED ON CONFIDENTIAL DATA - An example of a computer-readable medium to store machine-readable instructions. The instructions may cause a processor to update a machine learning model based on first confidential data set. The machine learning model may have been previously trained based on a training data set distinct from the confidential data set. The instructions may cause the processor to apply the machine learning model after the update to a second confidential data set. | 2022-02-17 |
20220050919 | MANAGING OBFUSCATION OF REGULATED SENSITIVE DATA - In an approach to managing obfuscation of regulated sensitive data, one or more computer processors detect content for display on a computing device. One or more computer processors analyze the content for sensitive data. One or more computer processors retrieve one or more applicable regulations, where the regulations are associated with displaying sensitive data. One or more computer processors determine a location on the display for obfuscating the sensitive data in the content, based on the retrieved one or more applicable regulations. One or more computer processors identify one or more context rules applicable to the sensitive data in the content. One or more computer processors determine the one or more context rules override the one or more applicable regulations. One or more computer processors display the sensitive data in the content. | 2022-02-17 |
20220050920 | DECENTRALIZED STORAGE OF PERSONAL DATA - Systems and processes for managing personal data are provided herein. Personal data associated with a data subject may be received or derived in association with a virtual identity of the data subject. The personal data may be stored, and identifying information that is linked to the personal data may be stored, where the identifying information is included in shadow data associated with the personal data. The identifying information may include a virtual identity identifier of the virtual identity, and, in some examples, a creation timestamp of the personal data. When a request to retrieve personal data for a data subject, shadow data storage may be searched to locate identifying information provided in the request, and personal data items linked to the located identifying information may be returned as a result of the request. | 2022-02-17 |
20220050921 | SYSTEMS AND METHODS FOR FUNCTIONALLY SEPARATING HETEROGENEOUS DATA FOR ANALYTICS, ARTIFICIAL INTELLIGENCE, AND MACHINE LEARNING IN GLOBAL DATA ECOSYSTEMS - Systems, program storage devices, and methods for improving data privacy/trust/anonymity/pseudonymity and data value, wherein data related to a Data Subject can be used and stored, while minimizing re-identification risk by unauthorized parties and enabling data related to the Data Subject to be disclosed to an authorized party by granting access only to the data relevant to that authorized party's purpose, time, place, and/or other criterion via the obfuscation of specific data values. The techniques described herein maintain this level of privacy/trust/anonymity/pseudonymity, while empowering Data Subjects, e.g., consumers or customers of such authorized parties, by enabling protection of data at the desired level of engagement with various business entities. The techniques described herein also allow Data Controllers to perform General Data Protection Regulation (GDPR) and Schrems II-compliant (and surveillance-proof) data processing, via the functional separation of heterogeneous data (e.g., via the use of “Variant Twins”) from embedded trust and privacy controls. | 2022-02-17 |
20220050922 | SYSTEM AND METHOD FOR SPEAKER ROLE DETERMINATION AND SCRUBBING IDENTIFYING INFORMATION - Methods for speaker role determination and scrubbing identifying information are performed by systems and devices. In speaker role determination, data from an audio or text file is divided into respective portions related to speaking parties. Characteristics classifying the portions of the data for speaking party roles are identified in the portions to generate data sets from the portions corresponding to the speaking party roles and to assign speaking party roles for the data sets. For scrubbing identifying information in data, audio data for speaking parties is processed using speech recognition to generate a text-based representation. Text associated with identifying information is determined based on a set of key words/phrases, and a portion of the text-based representation that includes a part of the text is identified. A segment of audio data that corresponds to the identified portion is replaced with different audio data, and the portion is replaced with different text. | 2022-02-17 |
20220050923 | DYNAMIC PIXEL DISPLAY IN ELECTRONIC COMMUNICATIONS TO ENHANCE DATA SECURITY - There are provided systems and methods for a dynamic pixel display in electronic communications to enhance data security. Electronic network communications by a service provider, such as an electronic transaction processor for digital transactions, may be compromised by malicious computing attacks or other actions that compromise the security of the communications and corresponding data within the communications. To increase security of the data within a communication, such as text or images in an email, the service provider may utilize a pixel arrangement within a field of the communication that has corresponding identifiers and weblinks to backend pixel data that have randomized so that each pixel's location is variable between different communications. When the email is opened, code for the email may request the backend pixel data using the weblinks. A malicious party listening to the communication does not receive the data without having to reconstruct the randomized layout. | 2022-02-17 |
20220050924 | SYSTEMS AND METHODS FOR ISOLATING PRIVATE INFORMATION IN STREAMED DATA - Disclosed herein are systems and method for isolating private information in streamed data. In an exemplary aspect, a method may comprise receiving a stream of data, for storage in a first storage device, and an indication of how the stream will be utilized by an end user. The method may comprise comparing the indication against a plurality of rules, wherein each rule indicates a type of private information that should be isolated from a given input stream based on a respective indication of usage for the given input stream. The method may comprise identifying and extracting a first type of private information that should be isolated from the stream, modifying the stream by removing the first type of private information from the stream, storing the modified stream in the first storage device, and storing the extracted first type of private information in a different location from the modified stream. | 2022-02-17 |
20220050925 | AUTOMOTIVE DATA SHARING AND CONSENT MANAGEMENT PLATFORM - An automotive (or other vehicle) data sharing platform, utilizing and including: a data aggregation cloud system configured to receive input data from a plurality of vehicles running data collection software operating on a common operating system, aggregate the input data, and provide output data associated with the input data to one or more entities utilizing a common application programming interface. The automotive data sharing platform enables the distribution of consent queries from the one or more entities, through the data aggregation cloud system, to selected of the plurality of vehicles that, when accepted enable distribution of the output data to the one or more entities. | 2022-02-17 |
20220050926 | PROTECTION AGAINST UNINTENDED CONTENT CHANGE IN DRAM DURING STANDBY MODE - Systems, methods, and apparatus related to protecting data stored in volatile memory of a computing system during a standby mode. In one approach, a first signature is generated for data stored in volatile memory. In some cases, the stored data may include sensor data obtained from one or more sensors of a vehicle, mobile device or other electronic device. The first signature is stored in a non-volatile memory device, and then the computing system enters the standby mode. Subsequently, after exiting the standby mode, a second signature is generated for the data stored in the volatile memory. The first signature is read from the non-volatile memory device and compared to the second signature. A signature mismatch indicates that an unintended change has occurred in the stored data during the standby mode. One or more remedial actions are performed by the computing system in response to this signature mismatch. | 2022-02-17 |
20220050927 | Checking a GDFT Operation - A method is described for checking a Generalized Discrete Fourier Transform (GDFT) operation on a secured domain, the method comprising (i) calculating a first checksum based on an input, (ii) determining a result of an GDFT-based operation based on the input, (iii) calculating a second checksum based on the result, (iv) comparing the first checksum and the second checksum and (v) proceeding if the first checksum correspond to the second checksum and otherwise triggering a predefined action if the first checksum does not correspond to the second checksum. Also, an according security device is provided. | 2022-02-17 |
20220050928 | METHOD AND SYSTEM FOR SECURE ONLINE-LEARNING AGAINST DATA POISONING ATTACK - This disclosure relates generally to online learning against data poisoning attack. Conventional methods used data sanitization techniques for online learning against data poisoning attack. However, these methods do not remove poisoned data points from training dataset completely. Embodiments of the present disclosure method provide an influence based defense method for secure online learning against data poisoning attack. The method initially filters a subset of poisoned data points in the training dataset for training a machine learning model using data sanitization technique. Further the method computes an influence of the data points and performs an influence minimization based on a predefined threshold. Updated data points for the learning model are generated and used for training the machine learning model. The disclosed method can be used against data poisoning attacks in applications such as spam filtering, malware detection, recommender system and so on. | 2022-02-17 |
20220050929 | SECURE FORECAST SYSTEM TO GENERATE FORECASTS THAT PREVENT UNAUTHORIZED DATA MODIFICATION AND INCLUDES REPORTS ON A TARGET LEVEL OF INTEGRITY TRACEABLE TO HIGH INTEGRITY DATA SOURCES - A driver-based high-integrity forecast source attributing system with blockchain technology that through its methods and user interface screens, categorizes scenarios into high-integrity and custom-source sections and provides a set desired-level of high-integrity accreditation in the forecast definition. The method incorporates the use of a weighting system for scenarios and the driver-item pairs within a scenario that can be applied within the forecast algorithm and generates a high integrity forecast with a certificate of accreditation which together with a link to access is encrypted. The system provides method for making available scenarios and drivers that are both high-integrity and custom-source and can store endorsements data source type. The system also provides a method and user interfaces for a recipient of a forecast to perform what-if modeling of the forecast and stress test the values and the weights in the drivers and view their effect on the outcome of the forecast. | 2022-02-17 |
20220050930 | MULTI-FACTOR DEVICE HOLDER - Examples provide a multi-factor device holder (MDH) for storing multi-factor authentication devices. A housing encases a set of ports configured to connect to the set of connectors on two or more multi-factor authentication devices placed within the MDH. An external port can connect the MDH to a port on a user device. A selection device, such as a user interface, enables user selection of an authentication device from the set of authentication devices. A locking mechanism secures the housing in a closed configuration to prevent unauthorized access to the authentication devices stored within the MDH. The MDH can include a user authentication device, such as a biometric reader, to authenticate a user attempting to utilize the MDH. If authorized, the selected authentication device is unlocked and provided with power. The selected authentication device transmits a code to the user device via the external port connector. | 2022-02-17 |
20220050931 | SECURITY MANAGERS AND METHODS FOR IMPLEMENTING SECURITY PROTOCOLS IN A RECONFIGURABLE FABRIC - An apparatus, and a method therefore, are described, the apparatus according to one embodiment including a security manager and a plurality of clusters of processing elements. Each cluster of the plurality of clusters includes a respective plurality of processing elements. A controller of the apparatus, which may include a security manager, may be configured to control the plurality of clusters to receive a first data stream and a second data stream, control a first plurality of processing elements in a first cluster to process the first data stream using a first security protocol, and control a second plurality of processing elements in a second cluster to process the second data stream using a second security protocol. | 2022-02-17 |
20220050932 | Authentication Using Pairwise Secrets Constructed from Partial Secrets - Techniques are provided for authentication using pairwise secrets constructed from partial secrets. One method comprises obtaining, by a first entity of a communication between the first entity and a second entity, partial secrets associated with the first and second entities; generating a constructed secret for the communication by applying a cryptographic function to the partial secrets associated with the first and second entities; and authenticating the communication using the constructed secret. A control entity may assign a substantially unique partial secret to each of multiple first and second entities and distribute at least a subset of the assigned partial secrets to at least some of the first and second entities. A communication between given first and second entities can be authenticated using a pairwise constructed secret for the given communication generated by applying the cryptographic function to the partial secrets associated with the first and second entities. | 2022-02-17 |
20220050933 | NVME OVER FABRICS AUTHENTICATION SYSTEM - An NVMe-oF authentication system includes an authentication verification entity coupled to an NVMe subsystem that is coupled to an NVMe host device. The NVMe subsystem transmits a first challenge to the NVMe host device and, in response, receives a first challenge reply from the NVME host device. The NVMe subsystem then generates a first authentication verification request communication that includes a first response that was provided in the first challenge reply by the NVMe host device using a first instance of a first secret that is stored in the NVMe host device, and transmits the first authentication verification request communication to the authentication verification entity. The authentication verification entity receives the first authentication verification request communication, verifies the first response using a second instance of the first secret that is stored in the authentication verification entity and, in response, transmits a first authentication verification response communication to the NVMe subsystem. | 2022-02-17 |
20220050934 | SENSOR CALIBRATION VIA EXTRINSIC SCANNING - The subject technology provides solutions for performing extrinsic sensor calibration for vehicle sensors, such as environmental sensors deployed in an autonomous vehicle (AV) context. In some aspects, the disclosed technology relates to a sensor localization system that is configured to: perform a scan, using a 3D scanner, to collect surface data associated with an autonomous vehicle (AV), analyze the surface data to identify a coordinate origin of the AV, and calculate a position of at least one or more AV sensors based on the surface data. Methods and computer-readable media are also provided. | 2022-02-17 |
20220050935 | TILE PLANNING AND DESIGN - A computer implemented method for drainage tile planning includes steps of presenting a first user interface to a user associated with a field in which drainage tile is to be installed and defining a set of drainage tile plan requirements by receiving through the first user interface and from the user associated with the field by: defining a boundary around the field by displaying a map including the field and receiving through the first user interface and from the user associated with the field a plurality of selections by the user associated with the field of edges of the field displayed on the map, and defining at least one desired drainage outlet position within the field by receiving through the user interface and from the user associated with the field a selection of the at least one desired drainage outlet position on the map. | 2022-02-17 |
20220050936 | METHODS AND APPARATUS FOR SECURE PERSISTENT LOCATION BASED DIGITAL CONTENT - Augmented reality apparatus and methods of use are provided with secure persistent digital content linked to a location coordinates. More specifically, the present invention links a physical location with digital content to enable a user interface with augmented reality that combines aspects of the physical area with location specific digital content. According to the present invention, digital content remains persistent with a location even if visual aspects of the location change. | 2022-02-17 |
20220050937 | Industrial Automation Project Component Replacement Recommendation - A (GUI) for designing an industrial automation system includes a design window and a first accessory window. The GUI presents a library visualization representative of a plurality of objects within the first accessory window, each object is represented by an icon and corresponds to a respective industrial automation device. The GUI receives inputs indicative of a selection of one or more objects of the plurality of objects from the library, presents the one or more objects in the design window, determines that the one or more inputs do not comply with a set of industrial automation system rules comprising one or more relationships between a plurality of industrial automation devices, and displays a warning message that the one or more inputs do not comply with the set of industrial automation system rules. | 2022-02-17 |
20220050938 | PREDICTIVE MODELING FOR CLOUD CAPACITY MANAGEMENT - In non-limiting examples of the present disclosure, systems, methods and devices for forecasting cloud service capacity and demand are presented. A cloud capacity forecast comprising a plurality of projections for a future timeframe may be generated via application of a predictive simulation model to one or more cloud service supply variables. A cloud demand forecast comprising a plurality of projections for the future timeframe may be generated via application of a predictive simulation model to a plurality of cloud service demand variables. A determination may be made as to a number and/or percentage of the projections for which the cloud capacity exceeds the cloud demand A confidence score that cloud service demand can be met may be calculated. In some examples, one or more prophylactic actions may be automatically performed if the confidence score is below a threshold value. | 2022-02-17 |
20220050939 | GUIDED DESIGN GENERATION - A method for guided design generation includes receiving a plurality of image samples for an intended design and generating a first plurality of images by providing a positive latent vector to a first layer out of a plurality of layers and a negative latent vector to remaining layers out of the plurality of layers. Responsive to receiving a first image selection, identifying the first layer out of the plurality of layers generated the first image includes a feature of interest. Determining a feature expression variation for the feature of interest in latent space based on the ranking of a first plurality of generated sample images, wherein the first plurality of generated sample images includes the feature of interest. Responsive to receiving a second plurality of images for a plurality of base features, generating an initial design based on the feature of interest and the plurality of base features. | 2022-02-17 |
20220050940 | METHOD AND SYSTEM FOR OPTIMIZING METAL STAMPING PROCESS PARAMETERS - Embodiments of the present disclosure provide a method and a system for optimizing metal stamping process parameters, thereby performing die parameters optimization and stamping forming curve optimization to achieve various design goals. Embodiments of the present disclosure automatically model the die parameters and stamping forming curves, and import them into an optimization process. Embodiments of the present disclosure use a response surface method to fit a linear polynomial function, and then perform optimization on a response surface to obtain a best die parameters values combination and a best stamping forming curve. | 2022-02-17 |
20220050941 | METHOD FOR SOLVING COMPLETE FLUTTER TERMINATION PARAMETER BASED ON DOUBLE MASS BODIES OF NON-FIXED CONSTRAINT - The present invention proposes a method for solving a complete flutter termination parameter based on double mass bodies of non-fixed constraint, including the following steps: obtain model input parameters at a flutter termination moment t0, wherein the model input parameters includes the mass ratio of the double mass bodies as well as position coordinates, a speed, an acceleration speed and a restoration coefficient of each mass body, the mass ratio and the restoration coefficient are both constants; establish a first solution model to obtain a parameter at a flutter termination moment t | 2022-02-17 |
20220050942 | Digital Signal Processing Using Recursive Hierarchical Particle Swarm Optimization - A novel implementation of particle swarm optimization termed Recursive Hierarchical Particle Swarm Optimization (RHPSO) is presented. An improved method for optimizing a complex solution space for any given mathematical function, where the mathematical function may be 1) finding optimal parameters such as topology, security, and routing in distributed/networked systems; 2) finding optimal frequency and channel assignments for telecommunication networks; and 3) code-breaking, searching a large solution space of ciphers for the one correct decryption. | 2022-02-17 |
20220050943 | LEARNING DEVICE, INFERENCE DEVICE, AND LEARNED MODEL - A learning device for performing a machine learning based on a learning model using data input to an input layer, includes: a calculation part configured to calculate a predetermined number of features, in which simulation data as a result of simulating semiconductor manufacturing processes by setting environmental information inside a process vessel in which the semiconductor manufacturing processes are performed and using a predetermined component provided in the process vessel as a variable, and XY coordinates parallel to a plane of a wafer are associated with each other; and an input part configured to input the calculated predetermined number of features to the input layer. | 2022-02-17 |
20220050944 | VEHICLE RESPONSE PREDICTING DEVICE, TRAINING DEVICE, METHOD AND RECORDING MEDIUM ON WHICH A PROGRAM IS RECORDED - A vehicle response predicting device comprising: a memory; and a processor coupled to the memory, wherein the processor is structured so as to, by using a convolutional neural network model that has been trained in advance, and that is for predicting response of a vehicle, and whose input is input data expressing a time series of an input to the vehicle and a characteristic of the vehicle, predict response of a vehicle that is an object of prediction, from input data expressing a time series of an input to the vehicle that is the object of prediction and a characteristic of the vehicle that is the object of prediction. | 2022-02-17 |
20220050945 | COMPUTER-IMPLEMENTED METHOD AND ELECTRONIC DEVICE FOR DETECTING INFLUENTIAL COMPONENTS IN A NETLIST REPRESENTING AN ELECTRICAL CIRCUIT - A computer-implemented method and an electronic device for detecting, in an electrical circuit with electrical components (M | 2022-02-17 |
20220050946 | Automated Microprocessor Design - Systems and methods are disclosed for automated generation of integrated circuit designs and associated data. These allow the design of processors and SoCs by a single, non-expert who understands high-level requirements; allow the en masse exploration of the design-space through the generation processors across the design-space via simulation, or emulation; allow the easy integration of IP cores from multiple third parties into an SoC; allow for delivery of a multi-tenant service for producing processors and SoCs that are customized while also being pre-verified and delivered with a complete set of developer tools, documentation and related outputs. Some embodiments, provide direct delivery, or delivery into a cloud hosting environment, of finished integrated circuits embodying the processors and SoCs. | 2022-02-17 |
20220050947 | GLOBAL MISTRACKING ANALYSIS IN INTEGRATED CIRCUIT DESIGN - For each circuit element in a pair of launch and capture paths, a parameter value of the circuit element may be modified by a variation amount that is assigned to a class of circuit elements to which the circuit element belongs. Next, a timing slack may be computed for the pair of launch and capture paths. | 2022-02-17 |
20220050948 | STANDARD CELL ESTABLISHMENT METHOD - A standard cell establishment method is disclosed. The standard cell establishment method includes the following operations: setting a first implant split case; obtaining a plurality of characteristic parameters according to the first implant split case; applying the plurality of characteristic parameters to a device delay metric so as to obtain a speed parameter; optimizing a channel parameter if the speed parameter is better than a previous speed parameter; and establishing a standard cell if the channel parameter is optimized successfully. | 2022-02-17 |