11th week of 2021 patent applcation highlights part 50 |
Patent application number | Title | Published |
20210081466 | WEB ACCELERATION VIA LEARNING - A method wherein resource data for a web resource is generated can include age, confidence level, cacheability level, cache expiration, and/or priority level. Resource readiness for the web page is prepared based on the resource data. This can include preconnecting to a domain having the web resource when the resource data indicates a first level of resource readiness; preloading the web resource from the domain when the browser is open when the resource data indicates a second level of resource readiness, where the second level of resource readiness is greater than the first level of resource readiness; or prefetching the web resource from the domain prior to opening of the browser when the resource data indicates a third level of resource readiness, where the third level of resource readiness is greater than the second level of resource readiness. | 2021-03-18 |
20210081467 | Web Experience Augmentation Based On Local And Global Content Preferences - A web experience augmentation system predicts, during a web browsing session of a user, augmentation data that the user is likely to want to view during the web browsing session. This prediction is based on both local content preferences for the user and global content preferences. The local content preferences for the user refer to an indication of the webpages accessed during the current web browsing session of the user. The global content preferences refer to analytics for webpages on a website obtained over an extended period of time that extends prior to the web browsing session of the user. The web experience augmentation system also modifies a webpage to which the user navigates to include the predicted augmentation data. | 2021-03-18 |
20210081468 | SYSTEMS AND METHODS FOR MANAGING AN ONLINE USER EXPERIENCE - Systems and methods are described for monitoring and managing an online experience. An example method includes: obtaining user data describing interactions between a plurality of users and plurality of online services; determining, based on the user data, a rate of change in usage of the online services for each user in the plurality of users; assigning a portion of the users to a user segment based on the user data and the determined rate of change in usage; and based on the assignment, providing each user in the user segment with a customized experience in one or more of the online services. | 2021-03-18 |
20210081469 | SYSTEM AND METHOD FOR PROVIDING CUSTOM COMPONENT COMPILATION WITHIN A CLOUD-BASED CONTENT HUB ENVIRONMENT - Described herein are systems and methods for providing custom component compilation within a cloud-based content hub environment. In accordance with an embodiment, embodiments can allow developers to work with a variety of technologies and optimize a page or site for runtime performance, including in some instances the use of a custom (component) compiler, for use during compilation of a particular component of a website. | 2021-03-18 |
20210081470 | SYSTEM AND METHOD FOR AUTOMATIC SUGGESTION FOR DYNAMIC SITE COMPILATION WITHIN A CLOUD-BASED CONTENT HUB ENVIRONMENT - Described herein are systems and methods automatic selection for dynamic site compilation in a cloud-based content hub environment. In accordance with an embodiment, embodiments provide an artificial intelligence/machine learning (AI/ML) engine that monitors and collects both content and consumption analytics associated with content items on a webpage. Based upon an analysis of such metrics, automatic suggestions can be generated for content to be tagged such that the content item can be statically compiled with the website (optimized for viewing speed and user experience), or dynamically fetched/loaded on a load or refresh of the website. | 2021-03-18 |
20210081471 | SYSTEM AND METHOD FOR AUTOMATIC SELECTION FOR DYNAMIC SITE COMPILATION WITHIN A CLOUD-BASED CONTENT HUB ENVIRONMENT - Described herein are systems and methods automatic selection for dynamic site compilation in a cloud-based content hub environment. In accordance with an embodiment, embodiments provide an artificial intelligence/machine learning (AI/ML) engine that monitors and collects both content and consumption analytics associated with content items on a webpage. Based upon an analysis of such metrics, content can be automatically tagged such that the content item can be statically compiled with the website (optimized for viewing speed and user experience), or dynamically fetched/loaded on a load or refresh of the website. | 2021-03-18 |
20210081472 | GENERATING ONLINE SHARE SLIPS WITH CLICKABLE WEB LINKS FOR ELECTRONIC SHARE TRANSFERS FOR PREFERENTIALLY MATCHED MEMBERS WITH AFFINITY-BASED ALLOCATION - A process and system for allocating shares to needs within a peer-to-peer needs sharing organization. Shares are matched through an iterative process when an affinity-basis of the sending member matches or is compatible with the affinity-basis of a receiving member. The system preferentially assigns available shares to a selected need request if the first sending share has a first affinity basis compatible with a selected receiving affinity-basis of the selected need request. The affinity basis may include physical proximity, medical history, or payment capabilities, among others disclosed. | 2021-03-18 |
20210081473 | Analytics System Entity Resolution - Techniques and systems are described for analytics system entity resolution. Typed higher-order node combinations are determined within a dataset, and an amount of similarity between two arbitrary nodes within the dataset is determined based on the typed higher-order node combinations. The amount of similarity enables the digital analytics to accurately perform source resolution of portions of the dataset to a respective source, and may be utilized to control output of digital content to a client device. | 2021-03-18 |
20210081474 | PROPENSITY-DRIVEN SEARCH RESULTS - Provided are systems and methods for generating propensity-driven employment-based search results. In one example, a method may include retrieving consumption data of a user associated with the user device and geographic location data of at least one of the user and the user device, the consumption data comprising behavior of the user captured over time, predicting one or more value-generating opportunities for the user from among a pool of value-generating opportunities via execution of a predictive model, where the predictive model determines a propensity of the user to respond to the value-generating opportunities based on the behavioral attributes included in the retrieved consumption data of the user and the geographical location data, and transmitting the one or more predicted value-generating opportunities to the user device via a content channel between the server and the user device. | 2021-03-18 |
20210081475 | SYSTEM AND METHOD FOR INTEGRATING CONTENT INTO WEBPAGES - In certain embodiments, reference identifiers may be generated and embedded into a website's content. A request for a reference identifier to be embedded into first content on a first website may be obtained based on a user accessing the first website. Based on the request, interaction data related to the first website may be retrieved indicating that a prior user interacted with text on the first website and subsequently accessed a second website. A reference identifier related to the second website may be caused to be embedded into the text on the first website based on: (i) the second website comprising second content related to the text, (ii) the prior user interacting with the text on the first website, and (iii) the prior user accessing the second website after interacting with the first content on the first website. | 2021-03-18 |
20210081476 | VALUE GENERATING BEHAVIOR DETERMINED THROUGH COLLABORATIVE FILTERING - Provided are systems and methods for determining behaviors of a user that are associated with earning secondary income. In one example, a method may include receiving a request from a user device, identifying productivity attributes and consumption attributes of a user associated with the user device based on behavior of the user captured over time, determining a recommended value-generating behavior for the user via execution of a collaborative filtering model, where the collaborative filtering model receives the productivity and consumption attributes of the user and determines the recommended value-generating behavior based on historical value-generating behavior of other users having similar productivity attributes and consumption attributes, and transmitting the recommended value-generating behavior to the user device via a content channel between the server and the user device. | 2021-03-18 |
20210081477 | FILTERING SIGNALS DURING MAJOR EVENTS - The present invention extends to methods, systems, and computer program products for filtering signals during major events. A major event is detected in a geographic area based on one or more of: signal volume, signal diversity, severity, content, or historical events associated with ingested digital signals corresponding to the geographic area. An event-specific filter is deployed. The region associated with the major event is locked to the geographic area. Filtering out a commentary signal purportedly related to the major event is filtered out in accordance with rejection criteria. Filtering out the commentary signal can include determining the commentary signal originated outside the geographic area. It is determined that the major event has ended. The event-specific filter is disabled. | 2021-03-18 |
20210081478 | INTERACTIVE MEDIA NETWORK SYSTEM - A method of providing interactive media including receiving an operator input of metadata tags and transmitting a network call to social media platform servers. The network call includes a query for user posts to the social media platform server that include the metadata tags. In response to the query for users posts, the method includes receiving user post data associated with user posts that include the metadata tags. The method includes comparing a timestamp included in the received user post data with timestamps of prior user post timestamps in a stored list of prior user post data. Upon determining that the timestamp included in the received user post data is more recent than prior user post timestamps, the method includes transmitting commands to hardware devices based on the user post data. The commands are configured to activate actions of the hardware devices. | 2021-03-18 |
20210081479 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GENERATION OF LOCAL CONTENT CORPUS - Various methods for generating a content corpus populated with content related to a particular geographic area are provided herein. One example method comprises, for each document in an initial local content corpus, applying a first set of heuristic filters to the raw content of each document, identifying at least a second term, applying a second set of heuristic filters to the raw content of each document, the second set of heuristic filters associated with the second term, iteratively performing the identification of additional terms and application of an additional set of heuristic filters associated with the additional terms until each identifiable term is extracted, determining a level on a geographic containment hierarchy indicative of a location to which each document from the set of documents is local, and for each place in a gazette, and for each document, determining a set of place in a gazette, and for each document, determining a set of points in polygons indicative of its locality. | 2021-03-18 |
20210081480 | Application Provisioning System - Systems and methods for provisioning applications include storing an application identifier in association with location information in a database that is accessible by a user device. The user device then detects that it is located at a location included in the location information. In response to detecting that it is located at the location, the user device determines an application that is included on the user device and that is identified by the application identifier that is associated with the first location. The user device then automatically provides the application for display to a user. In some embodiments, the application may be automatically provided by automatically launching the application on the user device, and that application may be automatically closed if the user device leaves the location or the application is not used for a predetermined amount of time. | 2021-03-18 |
20210081481 | SYSTEMS AND METHODS FOR PARENT-CHILD RELATIONSHIP DETERMINATION FOR POINTS OF INTEREST - The present disclosure relates to systems and methods for determining parent-child relationships. The systems may obtain a first location name of a first point of interest (POI); perform a word segmentation operation on the first location to obtain a plurality of portions of the first location name; determine a first portion from the plurality of portions by comparing to a first portion name database, the first portion indicating that the first POI is a child POI; and determine a second POI based on a second portion of the first location name and that the second POI is a parent POI of the first POI. | 2021-03-18 |
20210081482 | PROVIDING SEARCH RESULTS BASED ON A COMPOSITIONAL QUERY - A technique for providing search results may include determining a first entity type, a second entity type, and a relationship type based on a compositional query. The technique may also include identifying nodes of a knowledge graph corresponding to entity references of the first entity type and entity references of the second entity type. The technique may also include determining from the knowledge graph an attribute value corresponding to the relationship type for each entity reference of the first entity type and for each entity reference of the second entity type. The technique may also include comparing the attribute value of each entity reference of the first entity type with the attribute value of each entity reference of the second entity type. The technique may also include determining one or more resultant entity references from the entity references of the first entity type based on the comparing. | 2021-03-18 |
20210081483 | Framework For Just-In-Time Decision Support Analytics - A framework for implementing just-in-time decision support analytics within a business application deployment are provided. In one set of embodiments, the framework enables an application user to be presented with analytics that are in-context and in-place with respect to an operational workflow carried out by the user, where “in-context” means that the presented analytics are directly relevant to, and tailored for, the specific business context of the user's operational workflow, and “in-place” means that the analytics are displayed to the user within the same UI/application used to execute the operational workflow, and at the same time the workflow is actually executed. These characteristics advantageously ensure that the user is provided with the insights he/she needs to make confident business decisions and facilitates real-time decision making for time-critical operations. | 2021-03-18 |
20210081484 | INFORMATION DISPLAY METHOD AND DEVICE - First information is received corresponding to a scanned page including a first graphic code. The page is displayed with the first graphic code and an information display page, where the information display page displays the first information. Second information is received corresponding to a scanned page including a second graphic code. The second information is added to the information display page. | 2021-03-18 |
20210081485 | GRAPHICAL RESOURCE IDENTIFIER - A computer-implemented method comprises displaying a grid comprising a plurality of cells; receiving user input modifying a state of one or more of the plurality of cells to create a graphical shape in the grid, wherein each of the plurality of cells is limited to one of a plurality of predefined states; requesting an internet protocol (IP) address corresponding to the graphical shape; and in response to receiving the IP address corresponding to the graphical shape, retrieving a web resource located at the IP address. | 2021-03-18 |
20210081486 | SITE AND SERVICE SIGNALS FOR DRIVING AUTOMATED CUSTOM SYSTEM CONFIGURATION - In non-limiting examples of the present disclosure, systems, methods and devices for integrating web services in shell constructs are provided. Web browsing data, application activity data, and/or device data for a user may be received. A machine learning model may be applied to the data. One or more recommendations may be surfaced based on application of the machine learning model to the data. The recommendations may comprise one or more of: recommendations to install applications; recommendations to add service extensions; recommendations to pin and/or add a shortcut to a website; and/or recommendations to add platform integration services amongst multiple devices. | 2021-03-18 |
20210081487 | WEBSITE CREATION SYSTEM FOR CREATING WEBSITES HAVING AT LEAST ONE SERIES OF DIRECTIONAL WEBPAGES AND RELATED METHODS - The present disclosure is directed towards systems and methods for creating a website and response actions via a website creation system. The systems and methods provide a plurality of website types for selection, and in response to receiving a selection of a website type, provide a plurality website templates specific to the selected website type. Each website type may include a series of directional webpages designed and intended to entice a particular user interaction with the website. Additionally, the systems and methods receiving a selection of a type of response action, a selection of at least one rule of a triggering condition, and an operand for the at least one rule of the triggering condition. Moreover, in response to the event of the triggering condition, the systems and method perform the response action. | 2021-03-18 |
20210081488 | INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM AND INFORMATION PROCESSING METHOD - An information processing apparatus, includes a memory; and a processor coupled to the memory and configured to: when an eigen solution of an equation of a first generation is calculated in an evolutionary computation for calculating an eigen solution of an equation by using a plurality of input parameters, calculate function values of a function in the equation as first plural function values for partial input parameters of the plurality of input parameters, predict eigen solution candidates for the first plural function values based on combinations of second plural function values for the partial input parameters and eigen solutions calculated by using the plurality of input parameters in a plurality of generations before the first generation, and calculate a solution of the equation in vicinity of the input parameters corresponding to the eigen solution candidates. | 2021-03-18 |
20210081489 | ARITHMETIC METHOD - Provided is an arithmetic method of performing convolution operation in convolutional layers of a neutral network by calculating matrix products. The arithmetic method includes: determining, for each of the convolutional layers, whether an amount of input data to be inputted to the convolutional layer is smaller than or equal to a predetermined amount of data; selecting a first arithmetic mode and performing convolution operation in the first arithmetic mode, when the amount of input data is determined to be smaller than or equal to the predetermined amount of data in the determining; selecting a second arithmetic mode and performing convolution operation in the second arithmetic mode, when the amount of input data is determined to be larger than the predetermined amount of data in the determining; and outputting output data which is a result obtained by performing convolution operation. | 2021-03-18 |
20210081490 | TECHNIQUES FOR SOLVING THE SPHERICAL POINT-IN-POLYGON PROBLEM - Techniques described herein perform spherical PIP analysis by detecting whether a test ray (defined by a test point (TP) and a point (EP) that is external to a spherical polygon) crosses edge arcs (“edges”) of the polygon based on relative orientations of vertices of the test ray and edges. A classifier vector (CV) for a test ray is calculated based on the cross-product of the TP and the EP. Using the CV, the orientation of each vertex of the polygon with respect to the test ray is determined. Candidate edges having vertices with opposite orientations with respect to the test ray are identified. Crossing edges are determine by calculating CVs for each candidate edge, and determining orientations of the TP and EP with respect to each candidate edge. A set of crossing edges is determined, where the TP and the EP have opposite orientations with respect to each crossing edge. | 2021-03-18 |
20210081491 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM - An information processing apparatus ( | 2021-03-18 |
20210081492 | Time-Series Analysis for Forecasting Computational Workloads - Techniques for time-series analysis for forecasting computational workloads are disclosed. A resource management system monitors a computing system and obtains metrics data from the computing system. The metrics data is stored as a set of historical data points of a data set. A first portion of the set of historical data points comprise an outlier that does not correspond to a seasonality pattern associated with a second portion of the set of historical data points. The resource management system tests a first time-series model that incorporates a first exogenous variable corresponding to a first exogeneous factor to determine that the first time-series model fits both the first portion of the set of historical data points and the second portion of the set of historical data points within an error threshold. Then, the resource management system selects the first time-series model to predict future data points of the data set. | 2021-03-18 |
20210081493 | AESTHETIC MARKING OF TEXT IN DIGITAL TYPOGRAPHY - A method for marking text in digital typography includes identifying one or more glyphs that intersect or overlap with a text marking bounding box, drawing a modified text marking to avoid intersecting with the one or more glyphs, and causing a display device to display the modified text marking with the text. The text marking is associated with a line of text including the glyphs or adjacent to a waxline of text including the glyphs. For each of the glyphs, the glyph corresponding to the glyph bounding box intersecting with the text marking is indicated. The modified text marking is drawn based on outlines of the glyphs, intersections between a text marking bounding box and the glyph outlines, and a user-specified glyph offset, text marking weight, and/or text marking offset to avoid intersecting with the glyphs. The shape of the modified text marking avoids intersecting with or overlapping the glyph. | 2021-03-18 |
20210081494 | RESOLVING TEMPORAL AMBIGUITIES IN NATURAL LANGUAGE INPUTS LEVERAGING SYNTAX TREE PERMUTATIONS - In non-limiting examples of the present disclosure, systems, methods and devices for resolving temporal ambiguities are presented. A natural language input may be received. A temporal component of the input may be identified. A determination may be made that the temporal component includes a conjunction that separates temporal meeting block alternatives. A temporal ambiguity may be identified in one of the meeting block alternatives. A plurality of syntax tree permutations may be generated for the meeting block alternative where the ambiguity was identified. A machine learning model that has been trained to identify a most relevant permutation for a given natural language input may be applied to each of the plurality of permutations. A temporal meeting block alternative corresponding to the most relevant permutation may be surfaced. | 2021-03-18 |
20210081495 | DOCUMENT CONTENT CLASSIFICATION AND ALTERATION - A device may receive a document including text, images, and one or more embedded documents. The device may parse the document to identify a content segment in the document. The device may determine a context for the content segment, wherein the context includes at least one of an entity identified by the content segment, a semantic meaning of the content segment, or an object identified by the content segment. The device may classify the content segment using a content classification model and based on the context for the content segment. The device may selectively alter the content segment based at least in part on a set of alteration rules, to generate a modified document. The device may provide the modified document based on selectively altering the content segment. | 2021-03-18 |
20210081496 | PROPAGATION OF ANNOTATION METADATA TO OVERLAPPING ANNOTATIONS OF SYNONYMOUS TYPE - Aspects of the invention include systems and methods for the propagation of annotation metadata to overlapping annotations of a synonymous type. A non-limiting example computer-implemented method includes performing a comparison of a set of annotations to detect a subset of annotations that are candidates of being synonymous based on a first analysis. Whether a first annotation of the subset of annotations is synonymous with a second annotation of the subset of annotations is determined based on a second analysis. Distinct annotation metadata of the first annotation are cross-propogated with annotation metadata of the second annotation based on the second analysis. | 2021-03-18 |
20210081497 | COGNITIVELY GENERATING INFORMATION FROM VIDEOS - In an approach for detecting key messages for a video, a processor builds a role model based on data from one or more data sources, with an identification feature of each role in a video. A processor samples a plurality of frames of the video. A processor identifies a key object presented in the plurality of frames. The key object is a role in the video. A processor recognizes a movement scenario associated with the role. A processor dynamically updates the role model based on the movement scenario. A processor identifies a role name based on the movement scenario. A processor generates a description script associated with the movement scenario for the role. A processor outputs the description script. | 2021-03-18 |
20210081498 | ARTIFICIAL INTELLIGENCE-BASED ROLEPLAYING EXPERIENCES BASED ON USER-SELECTED SCENARIOS - Embodiments provide interactive artificial intelligence. Input to an artificial intelligence (AI) system is received, where the AI system comprises a plurality of machine learning (ML) models. A context of the input is determined, where the context indicates a role-playing scenario. A first ML model of the plurality of ML models is then selected based on the determined context, where the first ML model was trained based at least in part on the role-playing scenario. Output is generated by processing the input using the first ML model. The output is then returned. | 2021-03-18 |
20210081499 | AUTOMATED NOVEL CONCEPT EXTRACTION IN NATURAL LANGUAGE PROCESSING - From a natural language document using a natural language concept analyzer, a set of natural language input concepts is extracted. Using a query generation model, a query corresponding to the set of natural language input concepts is generated. From a set of natural language results using the natural language concept analyzer, a set of natural language output concepts is extracted, a result in the set of natural language results comprising a portion of narrative text within a natural language corpus, the result identified by searching the natural language corpus using the query. Using the set of natural language input concepts and the set of natural language output concepts, a novelty concept is scored, the scored novelty concept comprising a degree to which a natural language input concept in the set of natural language input concepts is external to a boundary defined by the set of natural language output concepts. | 2021-03-18 |
20210081500 | HYPERNYM DETECTION USING STRICT PARTIAL ORDER NETWORKS - One embodiment of the present invention provides a method comprising receiving a text corpus, and generating a first list of triples based on the text corpus. Each triple of the first list comprises a first term representing a candidate hyponym, a second term representing a candidate hypernym, and a frequency value indicative of a number of times a hypernymy relation is observed between the candidate hyponym and the candidate hypernym in the text corpus. The method further comprises training a neural network for hypernym induction based on the first list. The trained neural network is a strict partial order network (SPON) model. | 2021-03-18 |
20210081501 | SYSTEM AND METHOD FOR AUTOMATED INSIGHT CURATION AND ALERTING - The invention relates to systems and methods for automated insight curation and alerting. The system generates insights from time-series data at scale using unsupervised machine learning algorithms. The system can further automate the suggested actions by signaling the actuators or middleware which ultimately executes the action. | 2021-03-18 |
20210081502 | NORMALIZATION OF MEDICAL TERMS WITH MULTI-LINGUAL RESOURCES - Method and apparatus are presented for receiving a medical or medical condition related input term or phrase in a source language, and translating the term or phrase from the source language into at least one target language to obtain a set of translated terms of the input term. For each translated term in the set of translations, the method and apparatus further translate the set of translations back into the source language to obtain an output list of standard versions of the input term, scoring each entry of the output list as to probability of being the most standard version of the input term, and providing the entry of the output list that has the highest score to a user. | 2021-03-18 |
20210081503 | UTILIZING A GATED SELF-ATTENTION MEMORY NETWORK MODEL FOR PREDICTING A CANDIDATE ANSWER MATCH TO A QUERY - The present disclosure relates to systems, methods, and non-transitory computer-readable media that can determine an answer to a query based on matching probabilities for combinations of respective candidate answers. For example, the disclosed systems can utilize a gated-self attention mechanism (GSAM) to interpret inputs that include contextual information, a query, and candidate answers. The disclosed systems can also utilize a memory network in tandem with the GSAM to form a gated self-attention memory network (GSAMN) to refine outputs or predictions over multiple reasoning hops. Further, the disclosed systems can utilize transfer learning of the GSAM/GSAMN from an initial training dataset to a target training dataset. | 2021-03-18 |
20210081504 | SYSTEM AND METHOD FOR CONSTRUCTION COST ESTIMATION FOR NON-COMPUTER AIDED DESIGN (CAD) FILES - A computing device has a processor. A display is coupled to the processor. A user interface is coupled to the processor for entering data into the computing device. A memory is coupled to the processor, the memory storing program instructions that when executed by the processor, causes the processor to: display a floorplan of a blueprint file, wherein the blueprint file is a non-CAD file; select a scale factor for the floorplan; mark and label at least one electrical panel; generate wire routes from selected points on the floorplan to a desired electrical panel of the at least one electrical panel, wherein generating wire routes comprises generating a straight line path from one of the selected points to the desired electrical panel when a direct route is selected; and generate a cost for each of the wire routes generated | 2021-03-18 |
20210081505 | GRAPH TRANSFORMER NEURAL NETWORK FORCE FIELD FOR PREDICTION OF ATOMIC FORCES AND ENERGIES IN MOLECULAR DYNAMIC SIMULATIONS - A simulation includes converting a molecular dynamics snapshot of elements within a multi-element system into a graph with atoms as nodes of the graph; defining a matrix such that each column of the matrix represents a node in the graph; defining a distance matrix according to a set of relative positions of each of the atoms; iterating through the GTFF using an attention mechanism, operating on the matrix and augmented by incorporating the distance matrix, to pass hidden state from a current layer of the GTFF to a next layer of the GTFF; performing a combination over the columns of the matrix to produce a scalar molecular energy; making a backward pass through the GTFF, iteratively calculating derivatives at each of the layers of the GTFF to compute a prediction of force acting on each atom; and returning the prediction of the force acting on each atom. | 2021-03-18 |
20210081506 | FAST ALGORITHM TO SIMULATE THE RESPONSE OF PDC BITS - Systems, methods, and computer-readable media are provided for simulating the coupled axial/torsional dynamics of drilling systems. An example method can include calculating a profile of a bit including cutters, the profile including a cutter layout representing cutter faces of the cutters; based on the profile of the bit, determining cutter interactions between cutters, a cutter interaction being determined when at least two cutters interact with a same surface portion; approximating a cutter geometry of each cutter using polygon approximation; based on the cutter interactions and approximated cutter geometry of each cutter, calculating an engagement surface for each cutter using polygon approximation; and based on geometric parameters associated with the engagement surface for each cutter, simulating reaction forces on the bit at a plurality of time steps corresponding to constant increments of an angular position of the bit during each revolution of the bit, the reaction forces including weight-on-bit and torque-on-bit. | 2021-03-18 |
20210081507 | Leveraging 3D Model Data For Inspection Operations - Some embodiments provide a non-transitory machine-readable medium that stores a program. The program retrieves an assembly and inspection plan for a product. The assembly and inspection plan includes a three-dimensional (3D) model of the product to be assembled. The program further creates an inspection task for an inspection operation in the assembly and inspection plan for the product. The program also associates the 3D model with the inspection task for the inspection operation. | 2021-03-18 |
20210081508 | DIELET DESIGN TECHNIQUES - Various implementations described herein are directed to an integrated circuit (IC) having a design that is severable into multiple sub-circuits having input-output (IO) ports. The integrated circuit (IC) may include multiple physical electrical connections that are adapted to electrically interconnect the IO ports of the multiple sub-circuits to operate as the IC, and the IO ports have three-dimensional (3D) geometric position information associated therewith. | 2021-03-18 |
20210081509 | INTEGRATED CIRCUIT LAYOUT VALIDATION USING MACHINE LEARNING - Systems, methods, and devices are described herein for integrated circuit (IC) layout validation. A plurality of IC patterns are collected which include a first set of patterns capable of being manufactured and a second set of patterns incapable of being manufactured. A machine learning model is trained using the plurality of IC patterns. The machine learning model generates a prediction model for validating IC layouts. The prediction model receives data including a set of test patterns comprising scanning electron microscope (SEM) images of IC patterns. Design violations associated with an IC layout are determined based on the SEM images and the plurality of IC patterns. A summary of the design violations is provided for further characterization of the IC layout. | 2021-03-18 |
20210081510 | Pre-Characterization Mixed-Signal Design, Placement, and Routing Using Machine Learning - Systems, methods, and devices are disclosed herein for developing a cell design. Operations of a plurality of electrical cells are simulated to collect a plurality of electrical parameters. A machine learning model is trained using the plurality of electrical parameters. The trained machine learning model receives data having cell layout design constraints. The trained machine learning model determines a cell layout for the received data based on the plurality of electrical parameters. The cell layout is provided for further characterization of electrical performance within the cell layout design constraints. | 2021-03-18 |
20210081511 | MACHINE LEARNING BASED SYSTEMS AND METHODS FOR REAL TIME, MODEL BASED DIAGNOSIS - The disclosure following relates generally to complex simulations, and fault diagnosis. In some embodiments, a component that is causing a delayed simulation time of a system is determined. A component of reduced complexity is designed, and the component of reduced complexity is used to replace the original component in the system. Fault diagnosis may then be conducted using the updated system with the reduced complexity component, thus decreasing the time taken to diagnose the fault. | 2021-03-18 |
20210081512 | SYSTEM AND METHOD FOR CRASHWORTHINESS ANALYTICS IN DESIGN - A computer-aided design system includes a display device, a memory storing a plurality of response surface models, and a processor configured to: (a) display a graphical user interface that includes a model of a vehicle frame; (b) display a section configuration panel that includes one or more section dimension values for one or more section dimensions of a first section member of the plurality of section members; (c) retrieve a first response surface model based on values of the one or more section dimensions for the first section member; (d) determine one or more predicted values associated with the first section member based on the values of the section dimensions, the predicted values include one or more predicted crash resistances for the section member; and (e) display the predicted values, thereby allowing the user to evaluate the predicted values for suitability in vehicle design. | 2021-03-18 |
20210081513 | Method for Operating an Electrical Control Device and Electrical Control Device - A method operates an electrical control device on the basis of license information, which is stored in a removable storage medium. The method includes the following steps, which are carried out by the control device: reading out a removable storage medium identification of the removable storage medium, reading a license file, which is stored in the removable storage medium, extracting a license file identification from the read license file, comparing the license file identification with the removable storage medium identification, and when the license file identification matches the removable storage medium identification, extracting license information from the license file and operating the control device in accordance with the license information and storing the license file identification and the license information in the control device. | 2021-03-18 |
20210081514 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, ELECTRONIC DEVICE, AND INFORMATION PROCESSING SYSTEM - The present technology relates to an information processing apparatus, an information processing method, a program, an electronic device, and an information processing system capable of appropriately performing period management of a license provided by an information processing apparatus in a case where the license is used in an electronic device that does not directly communicate with the information processing apparatus. The information processing apparatus includes a data generation unit that generates first license communication information using first device information, the first device information being information including a first reference date and time and a device unique key, the first reference date and time being a date and time set using a hardware clock of an electronic device and being a date and time used for period management of a license, the device unique key being a key unique to the electronic device, and the first license communication information being information including at least one of an effective term or an expiration time of the license and the first reference date and time and used for installing the license in the electronic device. The present technology can be applied to, for example, a server providing a license of a function to an electronic device. | 2021-03-18 |
20210081515 | METHOD FOR CONTROLLING EXECUTION OF AN APPLICATION - The invention is a method for controlling execution of an application. The method comprising:
| 2021-03-18 |
20210081516 | AUTOMATED AUTHENTICATION SYSTEMS AND METHODS INCLUDING AUTOMATED WASTE MANAGEMENT SYSTEM WITH AUTOMATED WEIGHT TICKET AND AUTHENTICATION - Disclosed and described herein are systems and methods that bring together edge technologies into a single, streamlined process that automates the tracking and usage of assets (containers, equipment, mobile storage, etc.). These systems and methods include the use of smart beacons, low power cellular, sensors (strain gauges, level, contact, ohm/voltage, etc.), voice, video, microcontroller advancements, and the like. Conventional systems that have electronic service order and/or tickets are still limited in their functionality because of data, communication and processing hurdles. Disclosed are modern electronic data capture systems (IoT sensors) along with algorithms to assist on the tracking of assets and workers, more quickly capture authorized transactions for billing and remove the manual processes. | 2021-03-18 |
20210081517 | AUTHENTICATING AND AUTHORIZING USERS REGARDING PHYSICAL GOODS - Briefly, a portable intelligent device is provided that has an audio input for receiving a voice input from a user and an event manager for detecting that an event has occurred. The intelligent device also stores a passcode and a voice-code indicative of the passcode that is unique to a particular user. The intelligent device presents the passcode to a user, for example, from a display on the device, or from smart phone or tablet wirelessly connected to the intelligent device. The user speaks the passcode into an input transducer (microphone) on the intelligent device, and a processor generates a voiceprint that reflects the spoken passcode. The processor then can use the stored voice-code and the generated voiceprint to determine if a specific user was speaking, and if the user spoke the correct passcode. In this way the intelligent device is able to authenticate or authorize a remote user simply by having the user anonymously speak a passcode into the intelligent device. | 2021-03-18 |
20210081518 | STORAGE DEVICE WITH CONCURRENT INITIALIZATION AND FINGERPRINT RECOGNITION - A method is provided for operating a storage device having biometric security protection, including: simultaneously starting both a device initialization operation and a biometric recognition operation; and if the device initialization operation has completed and the biometric recognition operation has successfully completed, setting the storage device to a normal access mode permitting external access to the storage device in accordance with the biometric security protection, wherein the device initialization operation and the biometric recognition operation are performed concurrently. | 2021-03-18 |
20210081519 | MULTIDEVICE USER AUTHENTICATION IN GROUP-BASED COMMUNICATION SYSTEMS - Method, apparatus and computer program product for multi-device user authentication are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, identify, on a first computing device, a first active interface session associated with one or more active authentication conditions each configured to enable access to a group-based communication interface of a group-based communication system; cause a first computing device to present an authentication command interface for the first active interface session; receive an interface session request from a second computing device indicating electronic communication by the second computing device with the authentication command interface; and cause the second computing device to execute limited user authentication routines each configured to enable a respective active authentication condition on the second computing device. | 2021-03-18 |
20210081520 | SYSTEMS AND METHODS FOR USER AUTHENTICATION IN NON-NETWORK-CONNECTED DEVICES - The present disclosure provides systems and methods for authenticating a user to reset account login credentials associated with a non-network-connected generator computing device. The generator computing device is programmed to receive a first user input requesting to initiate a reset of account login credentials, generate a challenge code, set a timer, display the generated challenge code, and receive a second user input. The second user input is a response code generated at a services computing device associated with a services provider. The generator computing device is also programmed to verify that an amount of time elapsed between generation of the challenge code and receipt of the second user input is within a predefined time limit. The generator computing device is programmed to generate an expected response code, authenticate the user by comparing the received response code to the expected response code, and reset the account login credentials. | 2021-03-18 |
20210081521 | METHOD FOR EXCHANGING DATA BETWEEN A WEB BROWSER AND AN APPLICATION - A method of exchanging information with network devices using web browsers includes executing an application on a client device to implement a local web server on the client device, loading in a web browser on the client device a webpage independent of the web browser and including a script for generating a first request to the local web server, accepting the first request from the web browser by the local web server, and sending requested information to the web browser by the local web server. In some embodiments, the method also includes generating a second request to a remote server by the web browser and using the script, where the second request includes the requested information sent to the web browser. | 2021-03-18 |
20210081522 | MANAGING PERMISSIONS FOR DIFFERENT WIRELESS DEVICES TO CONTROL A COMMON HOST DEVICE - Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions. | 2021-03-18 |
20210081523 | SECURELY MANAGING AUTHENTICATION INFORMATION FOR AUTOMATED INCIDENT RESPONSES - Described herein are improvements for responding to incidents in an information technology (IT) environment. In one example, a method includes, in an incident response system, receiving authentication information for use by a first component for responding to an incident in an information technology (IT) environment. The method further includes encrypting the authentication information and storing the authentication information in the incident response system along with encrypted parameters for operating the first component. In the incident response system, upon determining that the first component requires the authentication information for an interaction, the method provides retrieving the authentication information and providing the authentication information to the first component. | 2021-03-18 |
20210081524 | SYSTEMS AND METHODS OF ESTABLISHING SECURE PASSWORDS USING REAL-TIME DYNAMIC FEEDBACK. - The present invention is systems and methods of establishing secure passwords using real-time dynamic feedback, comprising: selecting manual creation or automated suggestions at the time of creation of password for a system; creating a password manually or selecting one of the suggested passwords from an automated list; sending the selected password in clear text for evaluation; receiving an evaluation report on the strength of the password; analyzing whether the evaluation report meets the security threshold; confirming the password if the evaluation report meets or exceeds the security threshold; rejecting the password if the evaluation report is below the security threshold; after rejection going back to the step of creating the password manually or selecting another of the suggested passwords from the automated list. | 2021-03-18 |
20210081525 | SYSTEM AND METHOD FOR IMPLEMENTING RE-RUN DROPPED DETECTION TOOL - An embodiment of the present invention is directed to a Re-Run Dropped Detection Tool that provides various features and tools to prepare, execute and monitor status of a Re-Run process. An embodiment of the present invention is directed to an automated dispatch/monitoring of alert jobs as well as monitoring of Re-Run as a Service (RRAAS) solution. | 2021-03-18 |
20210081526 | THREAT DETECTION METHOD AND APPARATUS, AND NETWORK SYSTEM - Example threat detection methods and apparatus are disclosed. One example method includes obtaining page code of a first display page group identified by a uniform resource locator (URL) and an overall size occupied by the first display page group in a display area of a browser of a Web sandbox when loading the URL in the browser. After preset dynamic code is injected into the page code of the first display page group, the page code is parsed and executed. A request message is sent when a value of a display variable is greater than or equal to a preset value, to request to obtain page code of a second display page group. A response message that carries the page code of the second display page group is received. It is further detected, in the Web sandbox, whether the page code of the second display page group carries attack code. | 2021-03-18 |
20210081527 | Service API Invoking Method and Related Apparatus - A service application programming interface (API) invoking method where a security method applied to an API exposing function entity is updated from an original security method to a new security method, and where the security method of the API exposing function entity is used for communication between the API exposing function entity and an invoker. The method includes: obtaining, by the invoker, a new security method of the API exposing function entity; and sending, by the invoker, a first invoking request to the API exposing function entity using the new security method, where the first invoking request includes a name of a service API, and where the first invoking request is used to invoke the service API. | 2021-03-18 |
20210081528 | Data-Sampling Integrity Check by Sampling using Flip-Flops with Relative Delay - An electronic device includes a combinational logic circuit, one or more functional state-sampling components, one or more protection state-sampling components, and protection logic. The combinational logic circuit has one or more outputs. The functional state-sampling components are configured to sample the respective outputs of the combinational logic circuit. The protection state-sampling components are associated respectively with the functional state-sampling components, each protection state-sampling component configured to sample a same output of the combinational logic circuit as the corresponding functional state-sampling component, but with a predefined time offset relative to the functional state-sampling component. The protection logic is configured to detect a discrepancy between the outputs sampled by the functional state-sampling components and the respective outputs sampled by the protection state-sampling components, and to initiate a responsive action in response to the discrepancy. | 2021-03-18 |
20210081529 | Data-Sampling Integrity Check using Gated Clock - An electronic device includes clock generation circuitry, a combinational logic circuit, one or more functional state-sampling components, and protection logic. The clock generation circuitry is configured to generate a clock signal having a periodic clock cycle. The combinational logic circuit includes multiple internal nets and one or more outputs. The functional state-sampling components are configured to sample the respective outputs of the combinational logic circuit periodically in accordance with the clock signal. The protection logic is configured to receive one or more signals from the internal nets or outputs of the combinational logic circuit, to detect, in one or more of the received signals, a signal instability that occurs during a predefined portion of the periodic clock cycle in which, in accordance with a design of the combinational logic circuit, the signals are expected to be stable, and to initiate a responsive action in response to the detected signal instability. | 2021-03-18 |
20210081530 | PREVENTING SELECTIVE EVENTS OF A COMPUTING ENVIRONMENT - Detecting and preventing selected events within a computing environment. A determination is made as to whether a selected event of the computing environment is consistent with a historical pattern of selected events of the computing environment. Based on determining the selected event is inconsistent with the historical pattern of selected events, processing associated with the selected event is delayed. Based on delaying processing associated with the selected event, a determination is made as to whether the selected event is valid. Based on determining that the selected event is valid, processing associated with the selected event is resumed. | 2021-03-18 |
20210081531 | ELECTRONIC DEVICE FOR CLASSIFYING MALICIOUS CODE AND OPERATION METHOD THEREOF - An electronic device is disclosed. An electronic device according to various embodiments comprises: a processor; and a memory electrically connected to the processor, wherein the processor may be configured to: obtain a plurality of first parameters associated with attributes of at least one malicious code and a plurality of second parameters associated with a system in which the at least one malicious code is executed; obtain a similarity on the basis of a first comparison result according to a first comparison method between the plurality of first parameters and a second comparison result according to a second comparison method between the plurality of second parameters; and classify the at least one malicious code into at least one cluster on the basis of the similarity between the at least one malicious code. Other various embodiments may be provided. | 2021-03-18 |
20210081532 | FILENAME-BASED MALWARE PRE-SCANNING - Filename-based malware pre-scanning is described herein. A method as described herein can include establishing sequential malware scanning for respective files in a first directory of a file system according to filenames of the respective files; comparing an elapsed time since a previous malware scan for a first file of the respective files in the first directory having a first filename in a filename sequence to a scan age threshold associated with a scheduled malware scan task for the first directory; and, in response to the elapsed time since the previous malware scan for the first file being determined to be less than the scan age threshold, removing the scheduled malware scan task with respect to the first file and at least one second file of the respective files in the first directory having respective second filenames in the filename sequence. | 2021-03-18 |
20210081533 | DETECTION SYSTEM, DETECTION METHOD, AND AN UPDATE VERIFICATION METHOD PERFORMED BY USING THE DETECTION METHOD - A detection system for determining whether an update of at least one application installed on at least one whitelisted host is legitimate is provided. The system includes an update management server and update detectors installed with the application(s). During a process that software automatic update occurs in each update detector and a corresponding update installation package is executed, the executed update installation package generates at least one updater corresponding to each application. Each update detector transmits report information which includes the information of the at least one updater and sampled executable files to the update management server. The update management server obtains a number of update detectors, having performed the update operation of each application, according to the report information of each update detector. If the number is greater than or equal to a threshold value, it is determined that the update is legitimate. | 2021-03-18 |
20210081534 | SYSTEM AND METHOD TO SECURELY MAP UEFI RAMDISK USING DMAR TABLE FOR SECURELY LAUNCHING SOS CONTENTS - An information handling system may include a processor, a network interface, and a basic input/output system (BIOS) configured to execute a pre-boot environment. The information handling system may be configured to: during execution of the pre-boot environment, establish a pre-boot network connection to a remote information handling system via the network interface; receive operating system data from the remote information handling system; create a pseudo-device at a specified address of the information handling system; perform direct memory access (DMA) remapping between the pseudo-device and an address range of memory of the information handling system to create a ram disk; and based on the operating system data received from the remote information handling system, initialize an operating system on the ram disk via the specified address of the pseudo-device. | 2021-03-18 |
20210081535 | IMPROVED COMPUTING APPARATUS - A capability-based data processing architecture ( | 2021-03-18 |
20210081536 | SECURE BOOT SYSTEMS AND METHODS FOR PROGRAMMABLE LOGIC DEVICES - Systems and methods for secure booting of secure programmable logic devices (PLDs) are disclosed. An example system includes a secure PLD including programmable logic blocks (PLBs) arranged in a PLD fabric of the secure PLD, and a configuration engine configured to program the PLD fabric according to a configuration image stored in a non-volatile memory (NVM) of the secure PLD and/or coupled through a configuration input/output (I/O) of the secure PLD to the configuration engine. The secure PLD is configured to retrieve a pre-authentication status associated with the configuration image from the NVM, determine or verify the retrieved pre-authentication status associated with the configuration image includes a valid status, and boot the PLD fabric of the secure PLD using the configuration image. | 2021-03-18 |
20210081537 | SECURE BOOT VIA SYSTEM AND POWER MANAGEMENT MICROCONTROLLER - A variety of applications can include apparatus and/or methods of controlling a secure boot mode for a memory system. In an embodiment, a system includes a memory component and a processing device, where the processing device is configured to control a boot process for the system to operate the memory component and perform a cryptographic verification with a host to conduct an authentication of the host. The processing device can interact with the host, in response to the authentication, to receive a setting to control the boot process in a secure boot mode. The processing can interact with another processing device of the system to store the setting and to receive a secure boot signal from the other processing device, where the secure boot signal is a signal to assert or de-assert the secure boot mode depending on a value of the setting. Additional apparatus, systems, and methods are disclosed. | 2021-03-18 |
20210081538 | EARLY PLATFORM HARDENING TECHNOLOGY FOR SLIMMER AND FASTER BOOT - Systems, apparatuses and methods may provide for technology that initializes static random access memory (SRAM) of a processor in response to a reset of the processor, allocates the SRAM to one or more security enforcement operations, and triggers a multi-threaded execution of the one or more security enforcement operations before completion of a basic input output system (BIOS) phase. In one example, the multi-threaded execution is triggered independently of a dynamic RAM (DRAM) initialization. | 2021-03-18 |
20210081539 | INFERRING SECURITY INCIDENTS FROM OBSERVATIONAL DATA - Methods, systems, and apparatuses are provided for inferring security incidents from observational data. For example, alerts generated with respect to a set of entities by a first alert generator are received, association scores are calculated for pairs of alerts, the alerts are formed into clusters based on the association scores, and a security incident model is formed based on the clusters. The security incident model may define sequences of alerts corresponding to security incidents. Furthermore, the security incident model may be used to determine a match between additional alerts and a sequence of alerts in the security incident model and identify the additional alerts as a security incident corresponding to the sequence of alerts in the security incident model. | 2021-03-18 |
20210081540 | SECURITY TOOL - An apparatus includes a memory and a hardware processor. The memory stores a plurality of conversion rules. The processor receives a first log from a server. The first log indicates that the server attempted to install a software patch. The processor converts, based on the plurality of conversion rules, the first log into a different format to produce a second log and extracts a plurality of words from the second log. The processor also determines, based on the extracted words, that the software patch install failed and determines, based on the extracted words, a cause for the software patch install failure. The processor further determines a series of steps to remedy the cause and perform the series of steps to remedy the cause. | 2021-03-18 |
20210081541 | VULNERABILITY STATE REPORT - Example implementations relate to creating a vulnerability state report. An example non-transitory machine-readable medium can include instructions executable to determine information associated with a device. The information can include firmware information, device model information, and security bulletin information. The example non-transitory machine-readable medium can include instructions executable to combine the information to determine a vulnerability state of the device and create a report of the vulnerability state of the device. The report can include comprising information associated with the vulnerability state and associated security bulletin information. | 2021-03-18 |
20210081542 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK - Data processing systems and methods, according to various embodiments, are adapted for efficiently processing data to allow for the streamlined assessment of risk ratings for one or more vendors. In various embodiments, the systems/methods may use one or more particular vendor attributes (e.g., as determined from scanning one or more webpages associated with the particular vendor) and the contents of one or more completed privacy templates for the vendor to determine a vendor risk rating for the particular vendor. As a particular example, the system may scan a website associated with the vendor to automatically determine one or more security certifications associated with the vendor and use that information, along with information from a completed privacy template for the vendor, to calculate a vendor risk rating that indicates the risk of doing business with the vendor. | 2021-03-18 |
20210081543 | STORAGE MONITORING - Examples associated with storage monitoring are described. One example system includes generating an encryption key and transmitting the encryption key to a basic input/output system (BIOS) security module. The BIOS security module uses the encryption key as a basis for a heartbeat. A provisioning module receives a signal identifying a monitored storage and generates an enforced storage associated with the monitored storage. The provisioning module also creates a manifest describing the relationship between the enforced storage and the monitored storage. The provisioning module transmits the manifest to the BIOS security module. A versioning module assigns a first access policy for the monitored storage and a second access policy to the enforced storage based on the manifest. The versioning module performs versioning for the monitored storage using the enforced storage, and periodically verifies operation to the BIOS security module using the heartbeat. | 2021-03-18 |
20210081544 | DYNAMIC COMPRESSION WITH DYNAMIC MULTI-STAGE ENCRYPTION FOR A DATA STORAGE SYSTEM - Dynamic compression with dynamic multi-stage encryption for a data storage system in accordance with the present description includes, in one aspect of the present description, preserves end-to-end encryption between a host and a storage controller while compressing data which was received from the host in encrypted but uncompressed form, using MIPs and other processing resources of the storage controller instead of the host. In one embodiment, the storage controller decrypts encrypted but uncompressed data received from the host to unencrypted data and compresses the unencrypted data to compressed data. The storage controller then encrypts the compressed data to encrypted, compressed data and stores the encrypted, compressed data in a storage device controlled by the storage controller. Other aspects and advantages may be realized, depending upon the particular application. | 2021-03-18 |
20210081545 | SYSTEM, DEVICES AND/OR PROCESSES FOR SECURE COMPUTATION - Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more processing devices to facilitate and/or support participation in computing activities by multiple parties having limited mutual trust. In one embodiment, computation may occur in a secure processing environment (SPE) while one or more untrusted parties reside outside of the SPE. | 2021-03-18 |
20210081546 | SYSTEM AND METHOD FOR THE CRYPTOGRAPHICALLY PROTECTED MONITORING OF AT LEAST ONE COMPONENT OF A DEVICE OR AN APPARATUS - Provided is a system for the cryptographically protected monitoring of at least one component of a device or a system, including a component for providing at least one second element of a blockchain, having at least one transaction dataset including a monitored operating state of at least one component of the device or the system; a device for linking the at least one second element to a first element of the same or of a further blockchain; a device for providing a checking function which checks a transaction which is defined by the at least one transaction dataset and which is to be carried out for integrity; and a device for forming a transaction dataset having an action associated with the operating state, depending on the checking result delivered by the checking function, wherein the transaction defined by the transaction dataset can be carried out by a system component. | 2021-03-18 |
20210081547 | PROTECTING CRYPTOGRAPHIC KEYS STORED IN NON-VOLATILE MEMORY - Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory. | 2021-03-18 |
20210081548 | Fractal File Encryption Engine and Method Thereof - A fractal file encryption engine and a method thereof are provides. The fractal file encryption engine includes a file fractal module, an encryption server, a security chain module and a distributed queue database. The file fractal module divides a confidential file to generate a plurality of file fragments and a file index thereof. The encryption server encrypts each of the file fragment and the file index to generate a plurality of encrypted file fragments and an encrypted file index. The security chain module encrypts each of the encrypted file fragment and the encrypted file index to generate a plurality of encrypted file fragment chains and an encrypted file index chain. The distributed queue database stores the plurality of encrypted file fragment chains and the encrypted file index chain. | 2021-03-18 |
20210081549 | SYSTEMS AND METHODS FOR SHARING DATA ASSETS VIA A COMPUTER-IMPLEMENTED DATA TRUST - Systems and methods for sharing data assets via a computer-implemented data trust are provided herein. The method includes creating, in response to a user input, a data trust domain. Creating the domain includes instantiating a private network. The network includes a plurality of domain nodes. The domain nodes include a data producer node and a data consumer node. The data asset is provided by the data producer node. The method also includes defining access rights for the data asset as between the data consumer node and the data producer node. The method also includes creating a data pathway object. The data pathway object specifies the access rights for the data asset. The flow of data within the data trust domain is controlled according to the data pathway object. | 2021-03-18 |
20210081550 | Serving Data Assets Based on Security Policies by Applying Space-Time Optimized Inline Data Transformations - Serving data assets based on security policies is provided. A request to access an asset received from a user having a particular context is evaluated based on a set of asset access enforcement policies. An asset access policy enforcement decision is generated based on evaluating the request. It is determined whether the asset access policy enforcement decision is to transform particular data of the asset prior to allowing access. In response to determining that the asset access policy enforcement decision is to transform the particular data of the asset prior to allowing access, a transformation specification that includes an ordered subset of unit transformations for transforming the particular data of the asset is generated based on the particular context of the user and the set of asset access enforcement policies. A transformed asset is generated by applying the transformation specification to the asset transforming the particular data of the asset. | 2021-03-18 |
20210081551 | METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPING - Provided is a method for blockchain-based recordkeeping and implementable by a terminal device. The method comprises: obtaining target data; computing a data digest of the target data, and extracting a key segment from the target data; signing, in a secure operation environment included in the terminal device, the data digest and/or the key segment based on a private key associated with the terminal device to generate a signature; and submitting to a blockchain the data digest, the key segment, and the signature, for one or more nodes in the blockchain to verify the signature based on a public key corresponding to the private key, and to record the data digest and the key segment in the blockchain in response to the signature being verified to be valid. | 2021-03-18 |
20210081552 | INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing device is shared by multiple organizations having different information protection policies, the information processing device including: a specifying unit that specifies an organization to which a user using the information processing device belongs, before identifying the user; and an application unit that applies an information protection policy corresponding to the organization specified by the specifying unit, to the information processing device. | 2021-03-18 |
20210081553 | MANAGEMENT OF DRONE OPERATIONS AND SECURITY IN A PERVASIVE COMPUTING ENVIRONMENT - A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use by a third party transaction. The method also provides negotiation for the control and operation of autonomous vehicles such as drones operating in non-public space. | 2021-03-18 |
20210081554 | ERROR DETECTION OF DATA LEAKAGE IN A DATA PROCESSING SYSTEM - A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table. | 2021-03-18 |
20210081555 | FILENAME-BASED MALWARE PRE-SCANNING - Filename-based malware pre-scanning is described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, a malware scan request for a first file in a directory of a file system, the first file having a first filename belonging to a filename sequence; appending, by the device, the first file to a first malware scan queue; and appending, by the device, respective second files in the directory to a second malware scan queue that is distinct from the first malware scan queue, wherein the respective second files are distinct from the first file and have respective second filenames belonging to the filename sequence. | 2021-03-18 |
20210081556 | DETECTING EVENTS FROM FEATURES DERIVED FROM INGESTED SIGNALS - The present invention extends to methods, systems, and computer program products for detecting events from features derived from ingested signals. A first signal (e.g., a private signal private to an organization or non-private signal controlled by an organization) is accessed based on organizational data privacy access settings associated with the first signal. First one or more features of the first normalized signal are derived. It is determined that the first one or more features do not satisfy conditions to be identified as an event. The first one or more features are aggregated with second one or more features of a second signal into aggregated features. Access to the aggregated features is configured based on data privacy aggregation settings associated with the first signal and data privacy aggregation settings associated with the second signal. An event is detected from the aggregated features. | 2021-03-18 |
20210081557 | METHOD OF MANAGING ACCESS IN A COLLABORATIVE DATA SHARING PLATFORM - There is provided a computer implemented method of managing access in a collaborative data sharing platform, the platform comprising blockchain nodes. The method comprises receiving a read transaction request and processing the transaction request with a consensus algorithm. The transaction is then recorded onto the blockchain. | 2021-03-18 |
20210081558 | SYSTEMS AND METHODS FOR DETECTING EXPOSED DATA - In some embodiments, apparatuses and methods are provided herein useful to determining if sensitive data has been exposed externally. In some embodiments, a system for determining if sensitive data has been exposed externally comprises an external database including a plurality of external repositories, an internal database including a plurality of internal repositories, an internal catalog including search candidates, and a control circuit configured to transmit a content search query, receive content search results, transmit a hash search query, receive hash search results, discard, from the hash search results, ones of the external repositories that have not been modified, wherein the content search results and the remaining external repositories comprise a subject group of repositories, determine which repositories in the subject group of repositories includes an expression, calculate, for the repositories, a confidence score, generate, for the repositories, a notification based on the confidence score, and transmit the notification. | 2021-03-18 |
20210081559 | MANAGING ROADWAY INCIDENTS - Examples extend to methods, systems, and computer program products for managing roadway incidents. A probable origination location of a roadway incident is identified from features of a normalized signal. One or more additional normalized signals within a specified distance of the probable origination location are accessed. The probable origination location is validated, from features of the one or more additional signals, to establish a validated origination location. An event associated with the roadway incident is detected from the features of the normalized signal based on the validated origination location. The detected event includes the validated origination location and a probability that the event is true. Dispatch of resources responding to the roadway incident event is tailored based on the validated origination location and the calculated probability. | 2021-03-18 |
20210081560 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR ACCESSING AN APPLICATION IN A LOCKED DEVICE - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to ently of a correct passcode in the passcode entry interface, the device enters an unlocked state. | 2021-03-18 |
20210081561 | Regulatory Compliance for Applications Applicable to Providing a Service for Regulatory Compliance on a Cloud - A computer system accesses and processes regulatory requirements for data item(s) in a private manner. Both the data item(s) and the regulatory requirements are accessed and processed privately. The computer system creates an orchestration strategy satisfying the regulatory requirements. The orchestration strategy includes recommendation(s) associating the data item(s) with process(es). The computer system outputs indications of the orchestration strategy to be used to implement regulatory compliance for processing of the data item(s) by associated ones of the process(es). The computer system may be implemented as a portion of a cloud environment, and compliance may be offered as a service for cases where data usage by an application (implementing the process(es)) does not address compliance with the regulatory requirements, but following the orchestration strategy ensures use of the application on the data item(s) will comply with the regulatory requirements. | 2021-03-18 |
20210081562 | DATA PROCESSING APPARATUS, DATA PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An encrypted index bit sequence generation unit generates a bit sequence to be used as an index in searching for encrypted data to be stored in a data center apparatus as an index bit sequence, associating the index bit sequence with the encrypted data. The encrypted index bit sequence generation unit encrypts a plurality of bit values in the index bit sequence, using an index key of a common key scheme. A terminal-side data transmission/reception unit transmits to the data center apparatus, an encrypted index bit sequence and the encrypted data, the encrypted index bit sequence being the index bit sequence after the plurality of bit values is encrypted by the encrypted index bit sequence generation unit. | 2021-03-18 |
20210081563 | MULTIUSER INFORMATION EXCHANGE MANAGEMENT - For multiuser information exchange management, a processor receives information permissions for a plurality of participants in an electronic forum. The information permissions include an audio permission, a video permission, a file share permission, a drawing permission, and/or a presentation permission for each participant. The processor provides forum information to each participant based on the information permissions. The audio permission is required to receive audio from the electronic forum. The video permission is required to receive video from the electronic forum. The file share permission is required to receive a file from the electronic forum. The drawing permission is required to receive a drawing from the electronic forum. The presentation permission is required to receive a presentation from the electronic forum. | 2021-03-18 |
20210081564 | HYBRID COGNITIVE SYSTEM FOR AI/ML DATA PRIVACY - Systems, methods, and devices are disclosed for cognitive collaboration systems on a hybrid node. A query is received by a virtual assistant running on a public cloud, and it is determined whether the query pertains to data available on a public cloud resource, or the query pertains to data available on a private cloud resource. When it is determined that the query pertains to the data available on the public cloud resource, the query is interpreted by using a first model trained on at least one machine learning technique on data from the public cloud. When it is determined that the query pertains to the data available on the private cloud resource, the query is interpreted by using a second model trained on at least one machine learning technique on the data from the private cloud. | 2021-03-18 |
20210081565 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM RECORDING CONTROL PROGRAM, AND CONTROL METHOD - An information processing apparatus includes: a memory; and a processor coupled to the memory and configured to: receive personal data related to a personal data originator; receive agreement information on a processing method for the personal data agreed between the personal data originator and a personal data user who uses the personal data; process the personal data by the processing method defined in the agreement information; and attach a digital signature to processed data and output the processed data. | 2021-03-18 |