08th week of 2021 patent applcation highlights part 44 |
Patent application number | Title | Published |
20210056146 | AUTOMATICALLY BUILDING A SEARCHABLE DATABASE OF SOFTWARE FEATURES FOR SOFTWARE PROJECTS - A searchable database of software features for software projects can be automatically built in some examples. One such example can involve analyzing descriptive information about a software project to determine software features of the software project. Then a feature vector for the software project can be generated based on the software features of the software project. The feature vector can be stored in a database having multiple feature vectors for multiple software projects. The multiple feature vectors can be easily and quickly searched in response to search queries. | 2021-02-25 |
20210056147 | Apparatus, System and Method for Facilitating User-Selection of a Commercial Content Provider and Replacing Ad Content Receive with Search Results with Ads from Another Content Provider - An Internet-based Commercial Content Provider Controller (CCPC) system and method allows individual users to select and modify the commercial content provider, and control which of the commercial content providers is used for providing advertisements that are imbedded with Web pages that the user receives in response to the search requests. The system allows the user to choose the preferred Commercial Content Provider (CCP) and participate in the financial benefits from the delivery of the commercial content to the user from the CCPs. | 2021-02-25 |
20210056148 | System and Method For Asynchronous Client Server Session Communication - The invention provides a session-based bi-directional multi-tier client-server asynchronous information database search and retrieval system for sending a character-by-character string of data to an intelligent server that can be configured to immediately analyze the lengthening string character-by-character and return to the client increasingly appropriate database information as the client sends the string. | 2021-02-25 |
20210056149 | SEARCH SYSTEM, SEARCH METHOD, AND PROGRAM - Searching means of a search system searches a database, in which a plurality of data items are stored, using character information entered by a user as a query. Providing means provides the user with a data item selected by the user from a search result obtained by the searching means. Training means trains a learning machine to learn a relationship between item information of the data item selected by the user and the character information used as the query. Obtaining means enters item information of a target data item into the learning machine and obtaining feature information of the target data item from the learning machine. Registering means registers the feature information in the database in association with the target data item. | 2021-02-25 |
20210056150 | INGESTION AND RETRIEVAL OF DYNAMIC SOURCE DOCUMENTS IN AN AUTOMATED QUESTION ANSWERING SYSTEM - A method including generating an index comprising (a) question-answer pairs generated based at least in part on a set of ingested source documents and (b) respective location metadata associated with each of the question-answer pairs. The respective location metadata can include a source document identifier of a first ingested source document of the set of ingested source documents and one or more location delimiters indicating a location of target text in the first ingested source document. The target text can correspond to a stored answer of a respective one of the question-answer pairs associated with the respective location metadata. The method also can include receiving a user question from a user. The user question can correspond to a question of a first question-answer pair of the question-answer pairs of the index. The method additionally can include determining a first answer to the user question based at least in part on the respective location metadata associated with the first question-answer pair. Other embodiments are disclosed. | 2021-02-25 |
20210056151 | INTERACTIVE LIBRARY SYSTEM AND METHOD OF INTERACTIVE, REAL-TIME CREATION AND CUSTOMIZATION - An interactive library system comprised of a Processing Engine phase, a Presentation Engine phase, a Content Management phase, and a Content Editing/Reading pages phase, which work together in real time. The system, by providing a set of structures within an overarching database, provides the flexibility to build any data set (library) within an overarching data schema. The system proactively presents information to a user in real time as the system constantly scans to finds library matches to user text, saving the user from having to actively search and confirm information and greatly enhancing data handling capability. Further, each user has the flexibility to create a library most relevant to a user's particular position and needs, and select information for retrieval most useful to them. | 2021-02-25 |
20210056152 | METHODS AND SYSTEMS FOR HANDLING ONLINE REQUESTS BASED ON INFORMATION KNOWN TO A SERVICE PROVIDER - Methods and systems for handling online requests based on information known to a service provider. One method may comprise: obtaining first information, the first information relating to an online request made using a communication apparatus; using a logical identifier assigned to the communication apparatus to obtain second information, the second information pertaining to a profile associated with the logical identifier, comparing the first information to the second information; and performing an action related to handling of the online request based on a result of the comparing. | 2021-02-25 |
20210056153 | MANAGING CONTENT SHARING IN A SOCIAL NETWORK - Embodiments of the invention provide for obtaining, by a computing device, query data from a query submitted by a user on a social network; determining, by the computing device, a topic of the query by extracting information from the query data; matching, by the computing device, the topic to content stored in a content database; determining, by the computing device, that the content can be shared with the user based on relationship data dynamically derived from user activity within the social network; and initiating, by the computing device, sharing of the content with the user based on the determining that the content can be shared, wherein the user is not statically connected to the content or the author of the content in the social network. | 2021-02-25 |
20210056154 | USER INFORMATION SHARING APPARATUS, USER INFORMATION SHARING METHOD AND USER INFORMATION SHARING SYSTEM - A user information sharing apparatus includes: a CPU and a memory coupled to the CPU. The memory is configured to store time-series user information of a plurality of users including information about events from past to present occurred to each of the plurality of users. The CPU is configured to perform: receiving a reference request from a first user for the user information of other users stored in the memory; extracting the user information of a second user similar to the first user from among the user information stored in the memory, when the reference request from the first user is received; and outputting the user information of the second user extracted. | 2021-02-25 |
20210056155 | TRUNCATED SEARCH RESULTS THAT PRESERVE THE MOST RELEVANT PORTIONS - The present technology addresses the need in the art for an improved technology to display search query results in a space constrained area. The technology pertains to truncating search results in a way that a set of characters used in a search string remains displayed in the search results while other aspects of the search results are truncated. | 2021-02-25 |
20210056156 | Presentation of Information on Multiple Devices - A computer-implemented method of information presentation on multiple devices is provided. The method may include presenting a first barcode on a webpage. The first barcode may be encoded with first data based on a uniform resource locator of the webpage. The method may also include generating second data based on a user interaction with the webpage and altering a configuration of the webpage based on the user interaction without leaving the webpage. The method may also include generating a second barcode encoded with the first data and the second data. The method may further include presenting the second barcode on the webpage with the altered configuration. | 2021-02-25 |
20210056157 | DYNAMIC USER AGENT STRINGS - Optimizations are provided for distinguishing between webpages that are cached and webpages that have been or currently are displayed on a user interface. In some instances, a list of webpages is generated in response to a query entered by a user. Then, a determined number of webpages that were included in the list are cached in memory. These cached webpages each have an associated agent string, and at least some of these agent strings are updated to reflect a cached status. Subsequently, a first webpage is displayed on a user interface. This first webpage was included among those webpages that were cached. Further, the agent string for this webpage is updated to reflect an in-view status. In response to the first webpage being replaced by a second webpage, the agent string for the second webpage is then updated to reflect the in-view status. | 2021-02-25 |
20210056158 | DISTINGUISHING WEB CONTENT AND WEB CONTENT-ASSOCIATED DATA - A computer-implemented method can include obtaining content-associated data. The content-associated data can include an image that corresponds to content. The method can further include obtaining a set of descriptive terms corresponding to the image. The method can further include obtaining a set of related terms, based at least in part on the set of descriptive terms. The method can further include generating a set of user-expected terms, based at least in part on the set of related terms. The method can further include obtaining the content. The method can further include comparing the set of user-expected terms to the content. The method can further include generating a similarity value based on the comparing. The method can further include determining the similarity value does not exceed a threshold. The method can further include providing a notification in response to the determining that the similarity value does not exceed the threshold. | 2021-02-25 |
20210056159 | CALCULATION OF INTERMOLECULAR FORCES FOR THE DESIGN OF PHYSICAL AND MECHANICAL PARAMETERS - A system for calculating intermolecular forces over a communications network includes a computing device including a processor, a memory, an attached database, a user interface, a display and a programming module configured for reading initial data input by a user reading physical constants corresponding to a specific molecule, calculating a non-linear relationship between stresses and deformation of a comprehensive tension-compression of the specific molecule, an energy of sublimation of the specific molecule, parameters of the specific molecule, an interaction force between the specific molecule and an external surface of its body, a force acting on the specific molecule, wherein its displacement is relative to other molecules, and transmitting said resulting data. The system also includes a physical vapor deposition vacuum process system used to deposit a very thin film onto a substrate, which system adjusts a voltage according to data from the computing device. | 2021-02-25 |
20210056160 | CALCULATING DEVICE, CALCULATION PROGRAM, RECORDING MEDIUM, AND CALCULATION METHOD - According to one embodiment, a calculating device includes a processor repeating a processing procedure. The processing procedure includes a first variable update and a second variable update. The first variable update includes updating an ith entry of a first variable x | 2021-02-25 |
20210056161 | METHODS FOR UTILIZING SOLVER HARDWARE FOR SOLVING PARTIAL DIFFERENTIAL EQUATIONS - Embodiments relate to a computing system for solving differential equations. The system is configured to receive problem packages corresponding to problems to be solved, each comprising at least a differential equation and a domain, and to select a solver of a plurality of solvers, based upon availability of each of the plurality of solvers. A dispatch computer selects a solver by monitoring the plurality of solvers, and responsive to a solver becoming available, determines if a received problem package having at least a threshold priority level can be solved by the solver. Otherwise, the dispatch computer generates a plurality of solver scenarios each reflecting a permutation of received problem packages assigned to solvers estimated to become available within a threshold period of time, and assigns the problem packages in accordance with a solver scenario having a highest utilization score. | 2021-02-25 |
20210056162 | UNIVERSAL TRANSFORMERS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a sequence to sequence model that is recurrent in depth while employing self-attention to combine information from different parts of sequences. | 2021-02-25 |
20210056163 | SUPPLEMENTING MEASUREMENT RESULTS OF AUTOMATED ANALYZERS - A computer-implemented method for supplementing measurement results of automated analyzers is presented. The method includes obtaining, at a computer device, a result of a measurement performed by an automated analyzer, the computer device and the automated analyzer being located within a privileged computer network, obtaining a context related algorithm associated with the result of the measurement defining one or more triggering conditions and context related information from a computer device residing outside of the privileged computer network at the computer device and processing the result of the measurement by using the context related algorithm to generate a context specific supplement to the result of the measurement at the computer device. | 2021-02-25 |
20210056164 | Processing Referral Objects to Add to Annotated Corpora of a Machine Learning Engine - A system is provided for referral object processing for textual annotations. The system comprises a memory storing machine executable code and one or more processors coupled to the memory and configurable to execute the machine executable code to cause the one or more processors to parse a document to identify a reference identifier to an external object, the external object associated with information not contained in the document, retrieve the external object using the reference identifier, extract the information associated with the external object based on at least one data pattern detected in the external object, convert the extracted information into textual annotations associated with the reference identifier in the document, and enter the textual annotations to a corpus of content for the document so that the extracted information is associated with the reference in the document for the system. | 2021-02-25 |
20210056165 | System and Method of Contextually Converting a Media File into an Electronic Document - A system and method of contextually converting a media file into an electronic document allows the user to generate an interactive transcription from the audio portion of a provided media file, which subsequently connects to the media file such that the user can play the media file from a selected transcribed word. Screenshots from video files may also be appended to the electronic document at transitions in video content and subsequently matched to appropriate transcribed words within the generated document. The system implementing the method includes a user account managed by at least one remote server, wherein the user account is associated with a corresponding personal computing (PC) device. This arrangement enables each user to interact with the at least one remote server using the corresponding PC device. The method follows an overall process in order to generate an electronic document with timestamped transcriptions. | 2021-02-25 |
20210056166 | COMPOSITION REVIEWING SYSTEM - A Chinese composition reviewing system is provided. An identifying module identifies an abnormal phrase and an inappropriate punctuation mark. An analyzing module analyzes a sentence state. A comprehending module parses a target content by a predefined article mode. The Chinese composition reviewing system can evaluate the target content automatically. | 2021-02-25 |
20210056167 | CHATBOT WITH USER ASSOCIATED LANGUAGE IMPERFECTIONS - Aspects of this disclosure relate to humanizing a chatbot. A message that includes a prompt is received from a user. Data of the user is gathered. Using the data, a language imperfection associated with the user is identified. A reply to the prompt that includes the language imperfection is generated. | 2021-02-25 |
20210056168 | NATURAL LANGUAGE PROCESSING USING AN ONTOLOGY-BASED CONCEPT EMBEDDING MODEL - A computer system generates a vector space model based on an ontology of concepts. One or more training examples are extracted for one or more concepts of a hierarchical ontology, wherein the one or more training examples for the one or more concepts are based on neighboring concepts in the hierarchical ontology. A plurality of vectors, each including one or more features, are initialized, wherein each vector corresponds to a concept of the one or more concepts. A vector space model is generated by iteratively modifying one or more vectors of the plurality of vectors to optimize a loss function. Natural language processing is performed using the vector space model. Embodiments of the present invention further include a method and program product for generating a vector space model in substantially the same manner described above. | 2021-02-25 |
20210056169 | EXAMPLE BASED ENTITY EXTRACTION, SLOT FILLING AND VALUE RECOMMENDATION - Methods, systems, apparatuses, and computer program products are provided for extracting an entity value from a sentence. An embedding set that may include one or more sentence embeddings is generated for at least part of a first sentence that is tagged to associate a first named entity in the sentence with an entity type. A plurality of candidate embeddings is also generated for at least part of a second sentence. The one or more sentence embeddings in the embedding set may be compared with each of the plurality of candidate embeddings, and a match score may be assigned to each comparison to generate a match score set. A particular match score of the match score set may be identified that exceeds a similarity threshold, and an entity value of the entity type may be extracted from the second sentence associated with the identified match score. | 2021-02-25 |
20210056170 | LIMITING A DICTIONARY USED BY A NATURAL LANGUAGE MODEL TO SUMMARIZE A DOCUMENT - The technology disclosed herein summarizes a document using a dictionary derived from tokens within the document itself. In a particular implementation, a method provides identifying a first document for summarization and inputting the first document into a natural language model. The natural language model is configured to summarize the first document using words from a first dictionary compiled based on tokens from the first document. The method further provides receiving a first summary output by the natural language model after the natural language model summarizes the first document. | 2021-02-25 |
20210056171 | EXPANDED CONCEPT MATCHING - Methods, systems, and computer program products for expanded concept matching are provided. Aspects include receiving an ontology, determining a set of target concepts, building a cache from the ontology, the cache comprising a set of expressions extracted from the ontology for each target concept in the set of target concepts, receiving a document, determining a first segment of text in the document based on the set of target concepts, and annotating the first segment of text by comparing the set of target concepts to the set of expressions in the cache. | 2021-02-25 |
20210056172 | INTERLEAVED CONVERSATION CONCEPT FLOW ENHANCEMENT - Interleaved conversation concept flow enhancement can include detecting a topic of an on-going conversation over an electronic communication system. In response to detecting a topic newly introduced into the on-going conversation, a topic-divergence metric (TDM) with respect to the original topic and the newly introduced topic can be determined. A topic-divergence response action can be initiated in response to the newly introduced topic diverging from the original topic by more than a predetermined threshold based on the TDM. | 2021-02-25 |
20210056173 | EXTRACTING MEANING REPRESENTATION FROM TEXT - Methods, systems, and computer program products for extracting meaning representation from text are provided herein. A computer-implemented method includes performing a syntactic analysis on a fragment of text to derive a syntactic structure; selecting one or more predefined syntactic structure templates corresponding to the derived syntactic structure that define different combinations of semantic primes and semantic features corresponding to the semantic primes; detecting semantic information in the fragment of text, wherein the semantic information comprises at least one of the semantic primes and one or more of the corresponding semantic features; identifying one of the selected predefined syntactic structure templates that matches the derived syntactic structure and the detected semantic information in the fragment of text; generating a computable meaning representation of the fragment of text based at least in part on the identifying; and outputting the computable meaning representation to a natural language understanding application. | 2021-02-25 |
20210056174 | NON-CONFORMAL DOMAIN DECOMPOSITION WITH IMPRINTS AT INTERFACES WITH BOUNDARIES FOR FINITE ELEMENT ANALYSIS - A computer aided design can be decomposed into multiple domains or regions in a domain decomposition method, and then one or more finite element method boundary conditions at an interface between the domains can be imprinted on the faces of the domains at the interface, and then mesh generation can be performed independently on the domains. Thus, nonconformal domain decomposition can use the imprinting of the boundary conditions to improve the results of the independent mesh generation. | 2021-02-25 |
20210056175 | SYNERGISTIC DESIGN METHOD FOR FABRICATING INTEGRATED CIRCUIT - A synergistic design method for an integrated circuit (IC) is provided. The synergistic design method includes forming a standard cell library and a non-standard cell library, implementing an IC design process from a high-level behavior specification through a gate-level netlist to a physical layout, and verifying the physical layout to fabricate the IC. Each standard cell of the standard cell library performs a Boolean logic operation. Each non-standard cell of the non-standard cell library performs a complex function beyond the Boolean logic operation. A conversion process is executed for translating a circuit function into a Boolean network to generate the gate-level netlist based on the standard cells of the standard cell library corresponding to the circuit function. A direct mapping is executed on the non-standard cell by skipping the conversion process during the IC design process to generate the gate-level netlist. | 2021-02-25 |
20210056176 | Healthcare Information Technology System for Predicting or Preventing Readmissions - Hospital readmissions may be prevented. Readmission is prevented by predicting the probability of a given patient to be readmitted. The probability alone may prevent readmission by educating the patient or medical professional. The probability may be predicted during a patient stay and used to generate a workflow action item to reduce the probability, to warn, to output appropriate instructions, and/or assist in avoiding readmission. The probability may be specific to a hospital, physician group, or other entity, allowing prevention to focus on past readmission causes for the given entity. | 2021-02-25 |
20210056177 | SYSTEMS AND METHODS FOR SOFTWARE LICENSE MANAGEMENT USING A DISTRIBUTED LEDGER - Systems and methods for software license management using a distributed ledger are disclosed. A method for software license management may include: receiving, from an agent executed by an electronic device in a computer network, a request for a new software license for the electronic device or for a user; determining that there are no available tokens for associated with the software license in a license inventory; obtaining a license for the software; generating a token for the license, wherein the token comprises an identification of a license type and a software identifier; writing the token to a license distributed ledger with an indication that the token is available; reserving the token for the electronic device or the user and writing the reservation to the license distributed ledger; and adding a second token for the license to an electronic wallet associated with the electronic device or the user. | 2021-02-25 |
20210056178 | METHOD AND APPARATUS FOR LIMITING A NUMBER OF SIMULTANEOUS USERS OF SOFTWARE - A user's device will periodically send short PTT bursts to an application talkgroup and wait for an acknowledgement (ACK). The acknowledgement will allow the software application to execute the application as part of the site license. If the site license is used up (i.e., a maximum number of simultaneous users has been reached), then a negative acknowledgment (NACK) will be sent to the device, and the software will deny the user access to the software. | 2021-02-25 |
20210056179 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND ELECTRONIC DEVICE - The present technology relates to an information processing apparatus, an information processing method, a program, and an electronic device capable of appropriately perform update of a license provided by an information processing apparatus and used in an electronic device. The electronic device includes: a key generation unit that generates a device unique key that is a key unique to every device; and a license management unit that updates a license in a case where an extension code generated by a predetermined method on the basis of the device unique key, first data different for every installation of the license provided by an information processing apparatus, and second data different depending on the number of times of update of the license coincides with an input extension code. The present technology can be applied to, for example, a camera using a subscription license. | 2021-02-25 |
20210056180 | SYSTEMS AND METHODS FOR MAPPING LICENSES DATA FROM DISPARATE DATABASES - A system and method for mapping licenses from disparate data sources and databases from third parties triggered by a system registration request, analyzing data structures for license information records and third-party information records, cross-referencing a license record with a third-party information record, flagging database records that reflect a license field record change, updating mapping-related procedures and queries, and providing a presentation of license information records and related status. | 2021-02-25 |
20210056181 | INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, AND MEDIUM - An information processing method executed by an information processing apparatus, includes recording a first user in association with a first information processing terminal used by the first user; and restricting use of a service using the first information processing terminal by the first user and a second user, in response to detecting an illegal operation performed by the first user. | 2021-02-25 |
20210056182 | DEVICE AND METHOD FOR BYPASSING ANALYSIS EVASION TECHNIQUE, AND RECORDING MEDIUM FOR A PROGRAM FOR PERFORMING THE SAME - Provided is a method for bypassing an analysis evasion technique, which includes: loading a dummy DEX file; parsing a dummy method containing a dummy code from the dummy DEX file; a bypass point identifying step of determining whether a function to be currently called is a bypass target function to which the analysis evasion technique is applied; a branch target point changing step of changing information according to the determination result so that the dummy code is executed instead of the call target function; and a dummy code executing step of transmitting the dummy code to a framework of the application, so that a modulated framework is executed with a bypass code. | 2021-02-25 |
20210056183 | MASKED WATERMARKS AND RELATED SYSTEMS AND TECHNIQUES - Techniques are disclosed for rendering a watermark on content in a manner as to not obfuscate or otherwise cause visual defects to data elements in the content. An example methodology implementing the techniques includes segmenting a watermark to be rendered on the content into multiple watermark pieces. Then, prior to rendering a particular watermark piece, a check is made to determine whether there is a data element at the location in the content at which the particular watermark piece is to be rendered. If a data element is detected at that location, the particular watermark piece is rendered such that the data element overlays the particular watermark piece to render the watermark as a masked watermark. Otherwise, if no data element is detected at that location, the watermark piece is rendered on the content to be visible. The process is repeated to render the remaining watermark pieces. | 2021-02-25 |
20210056184 | Smart Device Management Resource Picker - A method for a smart device management resource picker includes receiving an authorization request from a third party. The authorization request requests access to a user resource managed by the device manager. The device manager manages access controls associated with a plurality of user devises, the access controls are configured by a user. The method also includes determining whether the third party is authorized to access the user resource managed by the device manager. When the third party is authorized to access the user resource managed by the device manager, the method includes determining whether the user has configured access controls at the device manager that governs the user resource subject to the authorization request. When the user has configured a respective access control that governs the user resource subject to the authorization request, the method includes communicating a response to the authorization request based on the respective access control. | 2021-02-25 |
20210056185 | CONTROLLING ACCESS TO COMPUTER RESOURCES - A system is described for controlling access to resources using an object model. Users can specify use cases for accessing resources. The user may be granted access if the user satisfies qualifications required for accessing the resource, selected a use case permissible for accessing the resource, and satisfies qualifications required for the use case. Use cases, qualifications, resources, and/or links between them can be implemented using an object model. The system can be used in addition to authentication and authorization. | 2021-02-25 |
20210056186 | SYSTEMS AND METHODS FOR IMPROVING KBA IDENTITY AUTHENTICATION QUESTIONS - Certain implementations include systems and methods for improving knowledge-based-authentication (KBA) identity authentication questions. A method is provided that includes receiving a set of identity information associated with a subject; querying one or more databases; receiving personally identifiable information; determining, from the personally identifiable information, at least one subject characteristic; producing, with a predictive model and based on the personally identifiable information and on the at least one subject characteristic, at least one knowledge-based authentication (KBA) identity proofing question having a personally identifiable correct answer; sending, for display on a first computing device associated with the subject, the at least one KBA identity proofing question; receiving, responsive to the sending, a response answer; and responsive to a match between the response answer and the personally identifiable correct answer, sending, for display on the first computing device associated with the subject, a first indication of authentication. | 2021-02-25 |
20210056187 | SYSTEM AND METHOD FOR AUGMENTED REALITY AUTHENTICATION OF A USER - Systems and methods for augmented reality authentication of a user are described, including authenticating a user by presenting the user with augmented reality authentication challenges, evaluating the user's response, and using the response to authenticate the user. | 2021-02-25 |
20210056188 | DIRECT ACCESS AUTHENTICATION USING GESTURES - A mobile computing device can include a processing unit, wireless communication interfaces, and a computer-readable memory including instructions executable by the processing unit to cause the device to perform various operations. The device may receive a request to access an application includes application pages that may be configured to provide functional features of the application, and in response to receiving the request, may present an authentication user interface (UI) and may detect a gesture from a user by the UI. The device may transmit the gesture to an authentication server and may receive a confirmation from the server that the user has been successfully authenticated. The device may determine a specific application page to present to the user based on the gesture by accessing mappings between the application pages and corresponding gestures. The specific application page, providing functional features, can be presented to the user by the device. | 2021-02-25 |
20210056189 | AUGMENTED REALITY GENERATED HUMAN CHALLENGE - A human challenge can be presented in an augmented reality user interface. A user can use a camera of a smart device to capture a video stream of the user's surroundings, and the smart device can superimpose a representation of an object on the image or video stream being captured by the smart device. The smart device can display in the user interface the image or video stream and the object superimposed thereon. The user will be prompted to perform a task with respect to one or more of these augmented reality objects displayed in the user interface. If the user properly performs the task, e.g., selects the correct augmented reality objects, the application will validate the user as a person. | 2021-02-25 |
20210056190 | SYSTEMS AND METHODS FOR GENERATING AND MANAGING USER AUTHENTICATION RULES OF A COMPUTING DEVICE - Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received. | 2021-02-25 |
20210056191 | WATERMARK FOR MANUFACTURING AUTHENTICITY - A method for assembling a computing device including initiating a board management controller of the computing device, the board management controller having at least one fuse, forming data to control a video display operatively connected to the computing device to show an image of a watermark, and modifying the computing device. The method also includes blowing the at least one fuse in response to modifying the computing device and adjusting the watermark in response to blowing the at least one fuse. | 2021-02-25 |
20210056192 | COMPUTER-BASED PLATFORMS OR SYSTEMS, COMPUTING DEVICES OR COMPONENTS AND/OR COMPUTING METHODS FOR TECHNOLOGICAL APPLICATIONS INVOLVING PROVISION OF A PORTAL FOR MANAGING USER ACCOUNTS HAVING A LOGIN PORTAL CONFIGURED TO DEFEND AGAINST CREDENTIAL REPLAY ATTACKS - Systems and methods associated with computer-implemented online portals having secure login processing features are disclosed. In one embodiment, an exemplary method may comprise receiving a login request including processing user credentials and capturing browser print information associated with the login request, validating the login request via analyzing current login attributes and/or an attributes checksum derived from the browser print information captured during the login request and assessing the browser print information for spoofed browser attributes, redirecting an access attempt that is flagged as the potential replay attack to an enhanced security process, and allowing or denying login to customer accounts or information associated with the user credentials based on the enhanced security process. | 2021-02-25 |
20210056193 | PERMITTED AUTHENTICATION TYPES FOR ACCOUNT ACCESS - According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to receive a first authentication type and a second authentication type for access to an account, in which a permitted set of authentication types is to secure access to the account and the first and the second authentication types being respectively assigned a first and a second strength. The processor may determine whether the first and second authentication types meet a predefined grouping of permitted authentication types based on the first and second strengths and based on the first and second authentication types failing to meet the predefined grouping of permitted authentication types, may prevent the first and second authentication types from being set as the permitted set of authentication types for the account. | 2021-02-25 |
20210056194 | AUTOMATIC SECURE STORAGE OF CREDENTIALS WITHIN A MANAGED CONFIGURATION MODEL - A method includes with a computing system, receiving an attribute within a managed configuration model, the attribute referencing a credential store and associated with a resource, with the computing system, in response to determining that the attribute includes both an alias and a clear-text password, determining whether there is a matching entry within the credential store, and in response to determining that the credential store does not contain a matching entry: creating a new entry for the credential store, wherein the new entry includes the clear-text password and is uniquely identifiable using the alias, and removing the clear-text password from the managed configuration model. | 2021-02-25 |
20210056195 | Method and System for Securing User Access, Data at Rest, and Sensitive Transactions Using Biometrics for Mobile Devices with Protected Local Templates - Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device. | 2021-02-25 |
20210056196 | SYSTEMS AND MECHANISM TO CONTROL THE LIFETIME OF AN ACCESS TOKEN DYNAMICALLY BASED ON ACCESS TOKEN USE - A data management system manages secured data for a plurality of users. The data management system utilizes an access authorization system to authenticate users seeking access to the data management system. The access authorization system provides access tokens to authenticated users. The access tokens enable the authenticated users to access the data management system without again providing authentication data. The access authorization system includes, for each user, an access policy that governs whether the users can use the access tokens to access the data management system. The access tokens have a finite lifetime. If the users use the access tokens within the finite lifetime and if the users satisfy all of the access rules of the access policies, then the lifetime of the access tokens can be extended a finite number of times. | 2021-02-25 |
20210056197 | REMOTE PROCESSING OF CREDENTIAL REQUESTS - A method, system and apparatus for requesting a plurality of credentials from a trusted entity. A local validation device (LVD) receives a credential request or an identifier from each of a plurality of user devices. The LVD generates or compiles a bundle of credential requests corresponding to the plurality of user devices. The LVD transmits the bundle of credentials requests to the MVD. The MVD receives the bundle of request and performs a validation for each request in the bundle and then communicates the credentials and/or the results of the validations to the LVD. The LVD communicates credentials to each of the plurality of user devices. In some cases, the LVD performs the validation for each credential request. For instance, the LVD can receive a local enforcement policy from the MVD, which can provide instructions or guidance to the LVD as to how to perform the validations. | 2021-02-25 |
20210056198 | REMOTE PROCESSING OF CREDENTIAL REQUESTS - A method, system and apparatus for requesting a plurality of credentials from a trusted entity. A local validation device (LVD) receives a credential request or an identifier from each of a plurality of user devices. The LVD generates or compiles a bundle of credential requests corresponding to the plurality of user devices. The LVD transmits the bundle of credentials requests to the MVD. The MVD receives the bundle of request and performs a validation for each request in the bundle and then communicates the credentials and/or the results of the validations to the LVD. The LVD communicates credentials to each of the plurality of user devices. In some cases, the LVD performs the validation for each credential request. For instance, the LVD can receive a local enforcement policy from the MVD, which can provide instructions or guidance to the LVD as to how to perform the validations. | 2021-02-25 |
20210056199 | PASSWORD SECURITY WARNING SYSTEM - Various embodiments are directed to a password security warning system. An artificial neural network or other types of models may be used to determine whether a password that is created, input, or proposed by a user via an interface includes one or more predictable or typical transformations or combinations of characters derived from user-specific information. Based on the determination, a warning may be provided to the user. | 2021-02-25 |
20210056200 | AGENTLESS SECURITY - There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a closed operating system including instructions within the memory to sandbox userspace applications; and a sandboxed userspace application, including: instructions to provide a user interface and user application code; and an agentless security library within the sandboxed userspace application, the agentless security library including instructions to provide security or privacy services to the sandboxed userspace application with minimal direct interaction from the user interface and user application code. | 2021-02-25 |
20210056201 | SECURING SOFTWARE ROUTINES - A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block. | 2021-02-25 |
20210056202 | Dynamically Monitoring System Controls to Identify and Mitigate Issues - Arrangements for dynamic system control evaluation and issue identification and mitigation are provided. In some examples, data may be received from a plurality of sources. The data may be received in batches at predetermined intervals or time periods, and/or as streaming data. In some examples, a first system control may be identified and a first system control value may be determined for the first system control. A plurality of threshold ranges associated with the first system control may be identified and the first system control value may be compared to the plurality of threshold ranges. Based on the comparing, the first system control value may be mapped to an objective score on a cyber health scale. The objective score may then be evaluated to determine whether an issue is occurring or is likely to occur. If so, one or more mitigation actions may be identified and implemented. | 2021-02-25 |
20210056203 | DATA BREACH DETECTION - Systems and methods are described for a data breach detection based on snapshot analytics. The described systems and methods identify a plurality of snapshots of a data structure, identify a plurality of leaf nodes of the data structure for each of the snapshots, generate a vector of data attributes for each of the leaf nodes, assign a weight to each of the vectors to produce a set of weighted vectors for each of the snapshots, compute a distance metric between each pair of the snapshots based on the corresponding sets of weighted vectors, and detect an abnormal snapshot among the plurality of snapshots based on the distance metrics. | 2021-02-25 |
20210056204 | EFFICIENT SCANNING FOR THREAT DETECTION USING IN-DOC MARKERS - The disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity measures to compare the metadata values, the entropy measures, and the hashes on the property groups, for the edited version and the previously processed file. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Property groups include core properties, application properties, document content and programming scripts for the edited version of the file and the previously processed file. | 2021-02-25 |
20210056205 | SYSTEM AND METHOD FOR PREVENTING UNWANTED BUNDLED SOFTWARE INSTALLATION - Embodiments described herein are capable of preventing the installation of unwanted software bundled with a desired application at runtime, while allowing the installation of the desired application to continue as expected. For example, the embodiments described herein create a decoy in memory that preempts unwanted code. The decoy attracts any illegitimate code and diverts it into a dead end (e.g., the code is isolated, thereby preventing it from properly executing), while installation of the legitimate code (i.e., the desired application) flows as expected. The foregoing detects that a reflective loading process of DLL associated with the unwanted application has occurred, identifies the entity that attempted to perform the reflective loading process, and prevents the entity from completing the reflective loading process without terminating the main installer. That is, the main installer will continue as usual (and install the desired application) while the installation of the unwanted application is blocked. | 2021-02-25 |
20210056206 | INTRUSION POINT IDENTIFICATION DEVICE AND INTRUSION POINT IDENTIFICATION METHOD - An intrusion point identification device includes: a threat information collector that collects and stores threat information including identification information identifying a moving body, route information indicating a route through which the threat has intruded into the moving body, and discovery information indicating a discovery date of an attack; a vehicle log collector that collects logs, extracts, from the logs, histories of points that indicate locations of one or more moving bodies within a predetermined period, and stores the histories of the points as history information, the logs indicating points that indicate locations of the one or more moving bodies, the predetermined period being set based on the discovery information; an intrusion point identification unit that identifies an intrusion point of the threat from a first attack source through a first route among the points indicated in the history information; and an intrusion point notifier that outputs the intrusion point. | 2021-02-25 |
20210056207 | Securing Devices From Unauthorized Software Upgrade - A mobile device may be configured to monitor its systems and subsystems to detect a flashing command from a flashing tool or source, generate and store a flashing request value in a secure area of the mobile device in response to detecting the flashing command, send the flashing request value to the flashing tool or source, and send a notification message to a server computing device of a trusted entity. In response, the mobile device may receive a notification-response message that includes a secured flashing request value from the server computing device, and determine whether the secured flashing request value matches the flashing request value stored in the secure area of the mobile device. The mobile device may ignore or discard the detected flashing command in response to determining that the secured flashing request value does not match the flashing request value stored in the secure area. | 2021-02-25 |
20210056208 | SECURE FIRMWARE UPDATE FOR DEVICE WITH LOW COMPUTING POWER - An information handling system may include a host system comprising a host system processor, a management controller coupled to the host system processor, and an information handling resource coupled to the host system processor and the management controller, the information handling resource including a firmware. The information handling system may be configured to transfer a firmware update package from the host system to the management controller, wherein the firmware update package includes a cryptographic signature; verify, at the management controller, the cryptographic signature; transfer data indicative of the verification from the management controller to the information handling resource; and in response to receiving the data indicative of the verification from the management controller, install, by the information handling resource, the firmware update package. | 2021-02-25 |
20210056209 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR SECURITY OF SOFTWARE COMPONENTS - A computer system for security of components includes at least one processor. For a new version of a component, the processor determines, based on a dataset of release events over time, a historical behavioral analysis of (i) a project that is released with prior versions of the component, and/or (ii) historical committer behavior of a committer that committed the new version of the component, and/or (iii) historical behavior of a publisher of the project. The dataset of release events includes event data collected over time regarding open source project, committers, and repository. The processor determines whether the new version of the component presents an unusual risk profile, based on the historical behavioral analysis. The processor facilitates delayed consumption of the new version of the component in response to determining that the new version of the component presents the unusual risk profile. | 2021-02-25 |
20210056210 | BINARY PATCH RECONCILIATION AND INSTRUMENTATION SYSTEM - A binary patch system for a vehicle may include a memory and a controller in communication with the memory and programmed to receive original source code, identify vulnerabilities in original source code, generate binary patch based on the identified vulnerabilities, insert binary patch into original source code, receive feedback of the inserted binary patch, and update the binary patch based on the feedback. | 2021-02-25 |
20210056211 | SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING A SECURITY VULNERABILITY IN A SOURCE CODE USING A MACHINE LEARNING MODEL - A method for (of) automatically detecting a security vulnerability in a source code using a machine learning model, characterized in that the method includes: obtaining the source code from a client codebase, wherein the client codebase is a complete or an incomplete body of the source code for a given software program or an application; and using a machine learning (ML) model to perform a ML based analysis on an abstract syntax tree (AST) for detecting a first security vulnerability over a static source code, the machine learning based analysis comprise (i) flattening the abstract syntax tree (AST) into a sequence of structured tokens, wherein the sequence of structured tokens includes a semantic structure and a syntactic structure of the source code, (ii) implementing a natural language processing technique on the sequence of structured tokens for mapping the sequence of structured tokens to one or more integers, (iii) pre-training the machine learning model using an unlabeled source code as an input to predict a subsequent sub-token in the sequence of structured tokens and (iv) training the machine learning model on a labeled source code to predict a presence or an absence of the first security vulnerability. | 2021-02-25 |
20210056212 | CONTEXTUAL RISK MONITORING - Systems, methods, and related technologies for device monitoring and device risk monitoring are described. In certain aspects, an indicator associated with a security risk is set based on communication between a first device having an associated elevated security risk and a second device. The indicator can be stored and may be used as a basis for performing a security action. | 2021-02-25 |
20210056213 | QUANTIFIYING PRIVACY IMPACT - This document relates to evaluating privacy impact for organization risk management. For example, quantifiable methods are provided by way of a privacy impact model to calculate a relative value for privacy impact can be used to calculate risk and prioritize risk mitigations and take corrective actions. | 2021-02-25 |
20210056214 | PROOF-OF-WORK KEY WRAPPING FOR RESTRICTING DATA EXECUTION BASED ON DEVICE CAPABILITIES - The technology disclosed herein provides a proof-of-work key wrapping system for restricting data execution based on device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time. | 2021-02-25 |
20210056215 | Data Security Using Semantic Services - Disclosed herein is a process that involves receiving an indication of an instance of a semantic network, the semantic network comprising conceptual data components and associative data components, receiving a selection of one or more of the conceptual data components and associative data components of the instance of the semantic network, the selection comprising an indication to block the selected one or more conceptual data components and associative data components or selectively filter the selected one or more conceptual data components and associative data components, and presenting a visualization of the semantic network, the visualization being configured to exclude data related to the selected one or more conceptual data components and associative data components or include data related to the selected one or more conceptual data components and associative data components and exclude data not related to the selected one or more conceptual data components and associative data components. | 2021-02-25 |
20210056216 | DATA ACCESS CONTROL USING DATA BLOCK LEVEL ENCRYPTION - An information security system that includes a data control engine configured to receive a data file and to segment the data file into a set of data blocks that each contain a portion of data from the data file. The data control engine is further configured to associate the set of data blocks with a reference tag and to store an association between the set of data blocks and the reference tag. The data control engine is further configured to identify an access key for encrypting each data block, to encrypt each data block with a corresponding access key, and to store an association between each data block and each corresponding access key. The data control engine is further configured to store each data block in a memory and to store location information identifying the location of each data block in the memory. | 2021-02-25 |
20210056217 | METHODS AND APPARATUS TO PROVIDE GROUP-BASED ROW-LEVEL SECURITY FOR BIG DATA PLATFORMS - Methods, apparatus, systems and articles of manufacture are disclosed to facilitate electronic data security. An example apparatus includes a data storage including a memory adjusted to store data organized according to a data table including columns identifying a first data record and a first security tag associated with the first data record. In the example apparatus, retrieval of data from the data storage involves a bit operation comparing the first security tag with a first privilege tag. In the example apparatus, the data storage provides the first data record when the bit operation comparing the first security tag with the first privilege tag has a non-zero result, and the data storage does not provide the first data record when the bit operation comparing the first security tag with the first privilege tag has a zero result. | 2021-02-25 |
20210056218 | DATA ACCESS CONTROL USING DATA BLOCK LEVEL DECRYPTION - An information security system that includes a data control engine configured to receive a data request identifying a first reference tag that is associated with a data file. The data control engine is further configured to identify a first set of encrypted data blocks that are linked with the reference tag and location information for the first set of encrypted data blocks from a data information table. The data control engine is further configured to extract the first set of data blocks from a memory based on the location information. The data control engine is further configured to identify access keys associated with the first set of encrypted data blocks from the data information table and to decrypt the first set of encrypted data blocks using the identified access keys. The data control engine is further configured to reconstruct the data file using the decrypted first set of data blocks. | 2021-02-25 |
20210056219 | AUTOMATED SENSITIVE DATA CLASSIFICATION IN COMPUTERIZED DATABASES - Automated classification of sensitive data in a database, which includes: Retrieving a catalog of a database. Sampling record values from at least some of the columns. Generating a map of probable associations between different columns of tables of the database. Applying a machine learning classifier to the sampled record values, to classify the columns of the sampled records into multiple data classes, some being sensitive data classes. Classifying columns of non-sampled record values according to the classification of the sampled record values, based on the map. Searching all objects of the database for existence of record values of the classified columns, to output value and field name pairs. Scoring the pairs according to a measure of their repetitiveness in the output. Increasing the score of the pairs whose field names are similar. Based on the scores, indicating which fields of the database are likely to include sensitive data. | 2021-02-25 |
20210056220 | METHOD FOR IMPROVING CONFIDENTIALITY PROTECTION OF NEURAL NETWORK MODEL - A method applied to an equipment for improving confidentiality protection of neural network model is provided. An operating system of the equipment may comprise a framework and a hardware abstraction layer (HAL), and the method may comprise: before a source model in an application (app) is executed, by a processor of the equipment, modifying the source model to form a modified model by running a modification subroutine associated with the app, and causing the framework to accept the modified model, instead of the source model, as the model to be executed, so the framework instructs the HAL to prepare execution of the modified model. | 2021-02-25 |
20210056221 | Progressive Key Rotation for Format Preserving Encryption (FPE) - Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia, embedding specific key identifiers for rotating keys directly into ciphertext. Aspects of the disclosure relate to methods, computer-readable media, and apparatuses for improving data security in a format-preserving encryption (FPE) context by using specific methods of rotating and identifying the appropriate encryption key from among numerous rotating keys stored in a key data store. Specific to FPE, a plaintext of the data and its corresponding ciphertext of the data remain the same in length/size; yet the methods, computer-readable media, and/or apparatuses disclosed herein permit embedding of an identification of a specific key among the plurality of rotating keys for the particular ciphertext without compromising the technical requirements of FPE. | 2021-02-25 |
20210056222 | DATABASE SYSTEM CONSENSUS-BASED ACCESS CONTROL - A processing system may obtain an operations set associated with database sources of a database system from a client entity, the operations set including a statement, the statement including a query, identify data sets from the operations set, transmit, a request to a first owner to permit access to a first data set, and a request to a second owner to permit access to a second data set, and receive approvals from the first and second owners. The processing system may retrieve a first portion of data stored in the first data set and a second portion of data stored in the second data set in accordance with the approvals, execute the operations set in accordance with the first portion of data and the second portion of data to generate a result set, and provide the client entity access to the result set. | 2021-02-25 |
20210056223 | OPAQUE ENCRYPTION FOR DATA DEDUPLICATION - A computer-implemented method includes receiving deduplication information at a storage system. The deduplication information is accessible to the storage system for performing operations thereon. The deduplication information includes signatures associated with portions of client data. The method also includes receiving the client data encrypted with a client secret key. The client secret key is unavailable to the storage system. The method includes deduplicating data chunks stored in the storage system against chunks of the client data, wherein the client data chunks are selected from the client data for deduplication using the deduplication information. | 2021-02-25 |
20210056224 | DATA ACCESS CONTROL IN HIERARCHICAL MULTI-DIMENSIONAL DATASETS - In one embodiment, a computer implemented method comprises receiving, at a computing device, a request for a particular user identification (ID) to perform a particular operation on a particular data object. An object mapping is used to determine a first tuple based on the particular data object. An entitlement mapping is used to determine a second tuple based on the particular operation. For each hierarchical dimension of a plurality of hierarchical dimensions: a first hierarchical set of one or more dimension values is generated based on a dimension value of the first tuple that corresponds to the respective hierarchical dimension, a second hierarchical set of one or more dimension values is generated based on a dimension value of the second tuple that corresponds to the respective hierarchical dimension, and a match is identified between the one or more dimension values of the first hierarchical set and the one or more dimension values of the second hierarchical set. In response to identifying a match for each hierarchical dimension of the plurality of hierarchical dimensions, the computing device grants the particular user ID access to the particular data object. | 2021-02-25 |
20210056225 | FACILITATING PROCESSING OF A QUERY ON SHAREABLE DATA IN A TEMPORARY VAULT - A method includes obtaining, by a consumer computing device of a data communication network, a temporary credential in accordance with a temporary credential protocol. The method continues with accessing, by the consumer computing device, a temporary vault in accordance with the temporary credential, where the temporary vault stores or is to store a set of shareable data records. The method continues with facilitating, by the consumer computing device, execution of a data analysis function on the set of shareable data records to produce an analytical result. The method continues with receiving, by the consumer computing device from the temporary vault, the analytical result. The method continues with storing, by the consumer computing device, the analytical result in memory associated with the user computing device. | 2021-02-25 |
20210056226 | SECURE AND PRIVATE HYPER-PERSONALIZATION SYSTEM AND METHOD - A secured virtual container is enabled to securely store personal data corresponding to a user, where such data is inaccessible to processes running outside the secured virtual container. The secured virtual container may also include an execution environment for a machine learning model where the model is securely stored and inaccessible. Personal data may be feature engineered and provided to the machine learning model for training purposes and/or to generate inference values corresponding to the user data. Inference values may thereafter be relayed by a broker application from the secured virtual container to applications external to the container. Applications may perform hyper-personalization operations based at least in part on received inference values. The broker application may enable external applications to subscribe to notifications regarding availability of inference values. The broker may also provide inference values in response to a query. | 2021-02-25 |
20210056227 | PRIVACY FRIENDLY DECENTRALIZED LEDGER BASED IDENTITY MANAGEMENT SYSTEM AND METHODS - Systems and methods providing user privacy in association with decentralized ledger technology are disclosed. Improved methods and systems for access control are disclosed wherein an access request can be received at the distributed ledger to fetch a data file without disclosing requester identity, that can verify the access request at the decentralized ledger as a legitimate request or as a malicious/faulty request, and can assist a user of a legitimate request to access the data and deny access to malicious/faulty requests that are compatible with a decentralized ledger environment. | 2021-02-25 |
20210056228 | NETWORK-COMPATIBLE DEVICE - A network-compatible device with a security function for destroying user data includes the a signal input configured to receive a control signal and a configuration signal; a memory configured to store first user data; and a controller configured, upon receipt of the control signal, to carry out a safety function which destroys the first user data in the memory. The network-capable device is inoperable when the first user data is destroyed, and the controller is further configured, upon receipt of the configuration signal, which includes second user data, to store the second user data in the memory to enable the network-compatible device to operate based on the second user data. | 2021-02-25 |
20210056229 | DATA PROCESSING SYSTEMS FOR PROCESSING AND MANAGING DATA SUBJECT ACCESS IN A DISTRIBUTED ENVIRONMENT - In particular embodiments, a data subject request processing system may be configured to utilize one or more local storage nodes in order to process a data subject access request on behalf of a data subject. In particular embodiments, the one or more local storage nodes may be local to the data subject making the request (e.g., in the same country as the data subject, in the same jurisdiction, in the same geographic area, etc.). The system may, for example, be configured to: (1) receive a data subject access request from a data subject (e.g., via a web form); (2) identify a suitable local storage node based at least in part on the request and/or the data subject; (3) route the data subject access request to the identified local storage node; and (4) process the data subject access request at the identified local storage node. | 2021-02-25 |
20210056230 | ENCRYPTION SCHEME FOR MAKING SECURE PATIENT DATA AVAILABLE TO AUTHORIZED PARTIES - A sharing package data structure for the secure maintenance and sharing of information relating to a person with one or more parties is described. The data structure comprises: (1) a version of the data that has been encrypted in such a way that a data decryption key is needed to decrypt it; (2) a hash on the data decryption key; and (3) access control list entries each containing a version of the data decryption key that has been encrypted with a public key associated with a different party authorized to access the data. The contents of the data structure are usable to provide access to a decrypted version of the data to a party that is able to decrypt the encrypted data decryption key stored in one of the access control entries. | 2021-02-25 |
20210056231 | CONTEXTUAL PRIVACY POLICY IMPLEMENTATION VIA DIGITAL BURNING SYSTEM - An approach is provided for obscuring an individual likeness in a digital image based on a privacy policy. The approach identifies an individual whose likeness appears in a digital image taken by a digital camera with the digital image being stored. A determination is made, based on a privacy policy pertaining to the identified individual, whether to obscure the first individual's likeness in the digital image. Responsive to the determination being positive, the approach obscures the individual's likeness as it appears in the digital image. | 2021-02-25 |
20210056232 | SERVER AND PROVIDING METHOD - In order to prevent leakage of information, a server supplies a program to be executed by an external client having a Web browser that displays a screen based on Web data to the external client. Based on no operation for a predetermined time in regard to the screen displayed on the Web browser, the program causes the Web browser of the external client to perform a process of deleting an element related to specific content from the Web data corresponding to the screen displayed on the Web browser via a DOM (document object model), and updating the screen displayed on the Web browser with a screen not including the specific content. | 2021-02-25 |
20210056233 | SECURE ONLINE COLLABORATION - A method for secure online collaboration is provided. The method includes receiving, at a server of a cloud-based storage system, first encrypted data from a first client device. The cloud-based storage system stores a plurality of documents in an encrypted form. The method also includes determining a document of the plurality of documents that is associated with the first encrypted data. The document is not accessible to the server in a decrypted form. The first encrypted data represents an edit to a portion of the document. The method further includes determining a plurality of user accounts of collaborators of the document. The plurality of user accounts includes a first user account associated with the first client device. Moreover, the method includes providing the first encrypted data to one or more other client devices that are each associated with one of the plurality of user accounts, excluding the first user account. | 2021-02-25 |
20210056234 | DATA MANAGEMENT APPARATUS FOR SECURELY UPDATING DYNAMIC DATA AND OPERATING METHOD THEREOF - Disclosed herein is a method of operating a data management apparatus. The method may include segmenting, by a client device, data into multiple data blocks, generating, by the client device, tags corresponding to the multiple data blocks, generating, by the client device, a representative value by accumulating the tags, generating, by the client device, a client signature value by signing the representative value and a counter value corresponding to the last updated data block, among the multiple data blocks, and transmitting, by the client device, the data and the client signature value to a server. | 2021-02-25 |
20210056235 | METHOD FOR IDENTITY VERIFICATION, CONSUMABLE BOX AND STORAGE MEDIUM - A method for identity verification, a consumable box and a storage medium are provided. The method includes a first key verification and a second key verification. The second key verification includes: receiving, by a consumable chip, a reading instruction for serial number reading; sending, by the consumable chip, a first serial number based on the reading instruction; sending, by the consumable chip, a first status code in response to a first verification code, wherein the first verification code is obtained based on the first serial number; receiving again, by the consumable chip, the reading instruction for serial number reading; and sending, by the consumable chip, a second serial number based on the reading instruction, and completing, the identity verification based on the second serial number. | 2021-02-25 |
20210056236 | PROCESSOR WITH NETWORK STACK DOMAIN AND SYSTEM DOMAIN USING SEPARATE MEMORY REGIONS - The disclosed technology is generally directed to network security for processors. In one example of the technology, a device includes: hardware, including a network interface; a memory; and a processor. The memory is adapted to store run-time data for the device. The memory includes at least a first memory region and a second memory region. The processor that is adapted to execute processor-executable code including a first binary in the first memory region and a second binary in the second memory region. The first binary includes at least one application and a kernel. The kernel is configured to control the hardware. The second binary is configured to operate, upon execution, as a network stack. The device is configured such that the first memory region is protected such that the first memory region is inaccessible to the second binary. | 2021-02-25 |
20210056237 | Multi-Function, Modular System for Network Security, Secure Communication, and Malware Protection - Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to a data network; a network interface circuit having a communication port; a nonvolatile memory storing a configuration bit image; and a field programmable gate array (“FPGA”) coupled to the network interface circuit through the communication port, the FPGA configurable to appear solely as a communication device to the first network interface circuit, and to bidirectionally monitor all data packets transferred between the input-output connector and the first network interface circuit and any coupled host computing system. In another embodiment, the FPGA is further configurable for only a partial implementation of a communication protocol, such as a PCIe data link and/or physical layers. The FPGA may also monitor host memory and provide encryption and decryption functionality. The FPGA is not addressable within the computing system and therefore is largely undetectable by malware. | 2021-02-25 |
20210056238 | INPUT DEVICE - An input device includes a keyboard substrate and a protective detection net. The keyboard substrate includes an input button portion through which input is possible via a key operation, a sensitive-function-processing section that computes an output signal in accordance with an input signal from the input button portion, and a wiring line that connects the input button portion and the sensitive-function-processing section. The protective detection net covers an area surrounding the keyboard substrate, and is provided with tamper detection grid lines. | 2021-02-25 |
20210056239 | INFORMATION PROCESSING METHOD, TERMINAL, DEVICE AND STORAGE MEDIUM - The present disclosure provides a terminal, an information processing method and device, a storage medium, and a processor. The terminal includes: a setting module and a privacy protection module. The setting module is provided with a first-level switch and a second-level switch, under a condition that the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode, the second-level switch is configured to enable or disable a privacy protection function under the condition that the first-level switch is turned on. The privacy protection module is connected to the second-level switch and configured to protect privacy information in the terminal based on the privacy protection function under a condition that the second-level switch is turned on. | 2021-02-25 |
20210056240 | COGNITIVE SECURITY SYSTEM - A computing device controlls a physical locking device. The computing device determines that an authorized user has requested an unlocking of a physical security device included in a first computing device. The computing device sends a signal to a mobile computing device of the user that is in communication with the first computing device. The computing device unlocks the physical security device included in the first computing device via the mobile computing device based on the signal. | 2021-02-25 |
20210056241 | DESIGN SUPPORT DEVICE AND COMPUTER READABLE MEDIUM - An acceptance unit accepts architecture information, a processing program, and a constraint condition. An objective function generation unit generates an objective function about an evaluation item of each constituent element indicated by the architecture information. An optimization unit solves an optimization problem of the objective function once or more to obtain one partitioning solution or more about the one constituent element or more and the one subroutine or more. A margin degree calculation unit calculates, concerning an evaluation item of each constituent element, a margin degree of each constituent element based on the one partitioning solution or more and the constraint condition. A change determination unit determines whether or not each constituent element needs to be changed, based on the margin degree of the constituent element. A change unit changes the architecture information about each constituent element that needs to be changed. | 2021-02-25 |
20210056242 | COMPUTER-IMPLEMENTED GENERATION OF AN ANALYTICAL MODEL OF A STRUCTURE - A CAD model represents a structure and comprises a plurality of physical elements. For each of multiple physical elements, an analytical element is generated. One or more connection nodes each associated with two or more analytical elements and comprising an initial spatial configuration are generated. At least one analytical element associated with a connection node is not tangent to the connection node. New spatial configurations for all analytical elements and all connection nodes are computed simultaneously to make analytical elements associated with a connection node tangent to said connection node. In an embodiment, the new spatial configurations may be computed simultaneously via optimization of a cost function based on the spatial configurations of the analytical elements and connection nodes. In an embodiment, a representation of the analytical model may be automatically displayed to a user via a GUI. | 2021-02-25 |
20210056243 | METHOD FOR ESTABLISHING THE GEOMETRICAL IMPERFECTION DATABASE FOR THE AEROSPACE THIN-WALLED STRUCTURE - A method for establishing a geometrical imperfection database of aerospace thin-walled structures is disclosed. The method comprises the following steps: 1) design the shell quality inspection card that is suitable and convenient to measure the geometrical imperfections for field workers. Obtain the parameters and geometrical imperfections of shells by filling data of measurement points in the shell quality inspection card; 2) perform characteristics combing, mathematical description and component analysis for the geometrical imperfections obtained in the first step; 3) collect and analyze the geometrical imperfection information of multiple aerospace thin-walled shells and establish the geometrical imperfection database based on the first step and second step. The method will effectively serve the development of aerospace equipment, shorten the design cycle and provide guidance and specifications for the design of the thin-walled components carrying main load. | 2021-02-25 |
20210056244 | METHOD OF MODELING, SIMULATION AND FAULT INJECTION FOR COMBINED HIGH PRESSURE GEAR PUMP FOR AEROENGINE - The present invention belongs to the technical field of modeling and simulation of an aeroengine, and provides a method of modeling, simulation and fault injection for a combined high pressure gear pump for an aeroengine, which comprises: extracting the flow regions of a centrifugal pump and a gear pump in the aeroengine and merging into a combined flow region; dividing the combined flow region into different units according to a working principle; meshing each unit by a finite element analysis method, and setting boundary conditions and media parameters; simulating in Pumplinx to obtain the operation performance of the pumps, and adjusting the lateral clearance of the gear to debug the simulation model till a simulation error is within 5%; and then setting faults based on the debugged model to obtain the change of the operation performance of the pumps under the faults. | 2021-02-25 |
20210056245 | METHOD AND SYSTEM FOR PERFORMING A SIMULATION OF A RETRACTION CABLE MOTION - Systems and a method for simulating a flexible retraction cable during motion of an object to which the cable is attached. The method includes receiving information inputs, including a numerical model of the object, receiving cable information inputs and retraction system information inputs. A numerical model of the flexible cable is modeled by modelling only a part of the flexible cable located outside a retraction system as a sequence of control points distributed along a length of the part, wherein each of the control points is submitted to a force representing the interaction of the control point with its environment and wherein the number of control points is fixed. The method further includes storing the numerical model of the flexible cable in a memory and simulating a motion of the flexible cable that would occur during a movement of the object. | 2021-02-25 |