12th week of 2020 patent applcation highlights part 49 |
Patent application number | Title | Published |
20200089767 | MULTI-CHANNEL CUSTOMER SENTIMENT DETERMINATION SYSTEM AND GRAPHICAL USER INTERFACE - Techniques described herein are directed to a sentiment analysis engine for classifying and quantifying customer sentiments between a customer and an agent. The sentiment analysis engine includes a data acquisition engine configured to receive data from a plurality of different communication channels. A preprocessing engine of the sentiment analysis engine is configured to apply rule(s) that are configured to perform formatting and/or filtering operations on the received data and/or isolate customer-provided messages from agent-provided messages. A customization engine of the sentiment analysis engine is configured to perform channel-specific customizations on the received data, such as, but not limited to interpreting the data in a channel-specific manner A batch scoring engine of the sentiment analysis engine is configured to quantify customer sentiments in real-time (e.g., during a communication session between the customer and agent), and such sentiments may be displayed via a GUI utilized by an authorized individual. | 2020-03-19 |
20200089768 | METHOD, SYSTEM, AND COMPUTER PROGRAM FOR ARTIFICIAL INTELLIGENCE ANSWER - Provided is an artificial intelligence (AI) answering system including a user question receiver configured to receive a user question from a user terminal; a first question extender configured to generate a question template by analyzing the user question and determine whether the user question and the generated question template match; a second question extender configured to generate a similar question template by using a natural language processing and a deep learning model when the user question and the generated question template do not match; a training data builder configured to generate training data for training the second question extender by using an neural machine translation (NMT) engine; and a question answering unit configured to transmit a user question result derived through the first question extender or the second question extender to the user terminal. | 2020-03-19 |
20200089769 | Consumer Insights Analysis Using Word Embeddings - In one embodiment, a method includes receiving a request to identify k steps for a particular entity to acquire a target attribute in public sentiments, accessing a table of word vector relationships, looking up an entity word vector corresponding to the entity name and a target attribute word vector corresponding to the n-gram representing the target attribute using the table, determining a directional vector in the d-dimensional embedding space that connects from the entity word vector to the target attribute word vector, identifying k points on the directional vector that evenly split the directional vector into k+1 segments, selecting, for each of the k points, a word vector that is closest to the point, identifying, for each of the k selected word vectors, a corresponding n-gram by looking up the word vector in the table, and sending a response message comprising the k identified n-grams. | 2020-03-19 |
20200089770 | DETERMINING AND DISCERNING ITEMS WITH MULTIPLE MEANINGS - A method, system, and non-transitory compute readable medium determining and discerning items with multiple meanings in a sequence of items including producing a distributed representation for each item of the sequence of items including a word vector and a context vector, partitioning the sequence of items into classes, for an item using a representative word vector of each class, calculating a cosine distance between the word vector of said item and the class representative vector, and producing a new sequence of items by modifying the distributed representation in the producing by replacing each occurrence of an item depending on the cosine distance calculated by the calculating. | 2020-03-19 |
20200089771 | COMPUTER SYSTEMS FOR CLASSIFYING MULTILINGUAL TEXT - Various examples are directed to systems and methods for identifying textual information regarding a first topic. A computer system may access a plurality of text units and detect that a first text unit of the plurality of text units is in a first language. The computer system may access a first language keyword set for the first topic, where the first language keyword set comprises a first plurality of keywords associated with the first language. The computer system may determine a first relevance score for the first text unit based at least in part on the first language keyword set. If the first relevance score is greater than a relevance score threshold, the computer system translates the first text unit to a base language and determines a text unit classification for the first text unit using a classification model trained with training data in the base language. | 2020-03-19 |
20200089772 | DEPTHWISE SEPARABLE CONVOLUTIONS FOR NEURAL MACHINE TRANSLATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media for performing machine translation tasks. One method includes receiving an input text segment in an input language; processing the input text segment using an encoder neural network to generate an encoder neural network output, the encoder neural network comprising multiple depth wise separable convolutional neural network layers; processing the encoder neural network output using an autoregressive decoder neural network to generate a decoder neural network output; and processing the decoder neural network output to generate a predicted output text segment in a target natural language. | 2020-03-19 |
20200089773 | IMPLEMENTING DYNAMIC CONFIDENCE RESCALING WITH MODULARITY IN AUTOMATIC USER INTENT DETECTION SYSTEMS - A method, system and computer program product are provided for implementing dynamic confidence rescaling for modularity in automatic user intent detection systems. User intents are identified using separately trained models with corresponding training data. Natural language processing (NLP) and statistical analysis are applied on the training data to classify the training data into groups and modules. A confidence rescaling algorithm is used for combining the modules. The dynamic confidence rescaling uses statistical information computed about each module being combined to identify user intents with enhanced accuracies in comparison to baseline models without confidence rescaling. | 2020-03-19 |
20200089774 | Machine Translation Method and Apparatus, and Storage Medium - The method includes: obtaining a to-be-translated source document, where the source document includes at least one character of a source language; converting the source document into a plurality of target documents respectively by using a plurality of machine translation apparatuses, where one machine translation apparatus is configured to translate the source document into one target document, the target document includes at least one character of a target language, and the source language is different from the target language; determining a feature value of each preset feature of each target document; determining a recommendation rating of each target document based on the feature value of each preset feature of each target document; and outputting a target document with a highest recommendation rating based on the recommendation rating of each target document. | 2020-03-19 |
20200089775 | CHINESE ENTITY IDENTIFICATION - Methods, systems, and computer program products are provided for language entity identification. In one embodiment, a computer-implemented method is disclosed. In the method, respective pinyin codes may be determined for respective Chinese characters comprised in a string that is to be processed. Then, respective pinyin features may be generated from the respective pinyin codes. Next, a candidate language entity may be identified from the string based on the respective pinyin features and a mapping describing an association between pinyin features and language entity. In other embodiments, a computer-implemented system and a computer program product for security management are disclosed. | 2020-03-19 |
20200089776 | METHOD FOR MIGRATING DATA RECORDS FROM A SOURCE DATABASE TO A TARGET DATABASE - The present disclosure relates to a method using a database engine for migrating data records from a source database to a target database, where said data records are arranged in a sorted source table of the source database in accordance with a clustered-base-table order following the Hilbert-Filling-Curve algorithm. The method comprises configuring the database engine for storing the CBT order of each data record of the source table in a reference table to said source table or a in a column of said source table. A reading step may be performed to read said data records from said source table, wherein in said reading step said stored CBT order is used. The read data and the stored CBT order may be transferred to the target database in accordance with the stored CBT order. The transferred data may be written at the target database in accordance with the CBT order. | 2020-03-19 |
20200089777 | Method for Cueing the Display of Active Content to an Audience - A content presentation system is disclosed for composing a visual scene for an audience using content contained in a storage device, and storing the visual appearance of the scene for later retrieval and recreation by the presentation system. Scenes are recalled in a manner that permits further manipulation of the scene during the live presentation. Scenes can furthermore be recalled in random order, or cued to time-based media such as video, modifying existing elements in the staging area to the extent necessary to recreate the stored scene. | 2020-03-19 |
20200089778 | ONLINE SITE PREDICTION AND MITIGATION - Using natural language analysis of content at URLs accessed by a user, content metadata is generated. From the content metadata and from activity information associated with a set of URLs accessed by the user, a class model is generated that represents a probability that content referenced by a URL will distract the user. Using the class model to analyze content referenced by a received URL, a probability is forecasted that the content referenced by the received URL will distract the user. | 2020-03-19 |
20200089779 | Progressive API Responses - Methods, systems, and computer programs encoded on computer storage media, for incrementally receiving and rendering content items. One example system includes a server, a user device, and a client running on the user device. The client sends a content request to the server. The client receives a response to the content request incrementally in multiple fragments. The multiple fragments constitute the entire response. The fragments include content items and metadata describing the content items, and each content item is renderable and defined by one or more data objects. The client incrementally renders the content items in the fragments in a display buffer as the fragments are received. The content items are rendered in an order determined by the metadata. The client displays all or a part of the display buffer on a display of the user device. | 2020-03-19 |
20200089780 | QUERY-ANSWERING SOURCE FOR A USER QUERY - One embodiment provides a method, including: receiving, at an information handling device, a user query; identifying, using a processor, that a stored answer does not correspond to the user query; determining, using a processor, a query-answering source for the user query; transmitting the user query to the query-answering source; and providing an answer submitted by the query-answering source to a user. Other aspects are described and claimed. | 2020-03-19 |
20200089781 | DATA STRUCTURES FOR EFFICIENT STORAGE AND UPDATING OF PARAGRAPH VECTORS - Systems and methods involving data structures for efficient management of paragraph vectors for textual searching are described. A database may contain records, each associated with an identifier and including a text string and timestamp. A look-up table may contain entries for text strings from the records, each entry associating: a paragraph vector for a respective unique text string, a hash of the respective unique text string, and a set of identifiers of records containing the respective unique text string. A server may receive from a client device an input string, compute a hash of the input string, and determine matching table entries, each containing a hash identical to that of the input string, or a paragraph vector similar to one calculated for the input string. A prioritized list of identifiers from the matching entries may be determined based on timestamps, and the prioritized list may be returned to the client. | 2020-03-19 |
20200089782 | ESTABLISHING OBJECT ATOMICITY IN SNAPSHOT BASED DISASTER RECOVERY ENVIRONMENTS - A computer-implemented method, according to one embodiment, includes: capturing a snapshot of data stored at a primary storage location, and determining a transaction identification which corresponds to each file operation included in the snapshot, where each file operation includes a respective number of sub-operations. Data included in the snapshot which corresponds to completed ones of the sub-operations is identified, and the determined transaction identifications as well as the identified data is used to populate entries in a data structure. The snapshot is sent to a secondary storage location, and an acknowledgement is received from the secondary storage location for each of the completed sub-operations that are successfully performed at the secondary storage location. Furthermore, the data structure is updated based on the received acknowledgements. | 2020-03-19 |
20200089783 | COLLATING FILE CHANGE SETS AS ACTION GROUPS - A method is provided in which a user can access to file. An action group is created that comprises a change set comprising changes to the file and metadata comprising information relating to the change set. User actions taken with respect to the file are monitored and the change set of the action group are updated if the file is changed. Information is collected relating to the user actions and the metadata of the action group is updated with information relating to the user actions. If a user action that defines an endpoint of a change set is detected, the action group is completed. | 2020-03-19 |
20200089784 | METHOD AND SYSTEM FOR REDUCED DATA MOVEMENT COMPRESSION USING IN-STORAGE COMPUTING AND A CUSTOMIZED FILE SYSTEM - One embodiment facilitates data compression. During operation, the system receives, by a host computing device, a request to write a first set of data. The system writes the first set of data to a first storage device of a storage component. A storage component controller performs compression on the first set of data to obtain compressed data. The controller transmits, to a file system component of the host computing device, metadata associated with the compressed data. The file system component inserts in a journal an entry based on the metadata associated with the compressed data. The system writes, by the controller, the compressed data to a second storage device of the storage component, thereby enhancing performance of the host computing device by reducing a number of data transfers involved in compressing and writing of the first set of data. | 2020-03-19 |
20200089785 | LOCAL TERMINAL AND SYNCHRONIZATION SYSTEM INCLUDING THE SAME - In a synchronization system including a local terminal, latest metadata of a file in a local storage and latest metadata of a file in the server storage are managed in a first tree database, which is a virtual database in a local terminal, and each of the local terminals is allowed to upload or download a changed file on the basis of the metadata in the first tree database so that a conflict that may occur due to multiple users simultaneously changing files can be minimized. | 2020-03-19 |
20200089786 | CLUSTERING TECHNIQUES TO AUTOMATICALLY CREATE GROUPS OF GEOGRAPHIC REGIONS - Techniques for automatically creating geographic region groups are provided. Attribute data about a plurality of regions is stored. Based on the attribute data, each region is classified as belonging to a tier of multiple tiers. A first set of region groups is generated, where each region group includes at least two regions assigned to different tiers. For each region group, group attribute data for that region group is generated. A comparison of first group attribute data of a first region group is performed with group attribute data of each other region group. Based on results of the comparison, first arrangement data that associates a second region group with the first region group is stored. | 2020-03-19 |
20200089787 | CHARACTERIZING ELECTRONIC DESIGNS VIA VISUAL PROCESSING AND DATA TRANSFORMATION - A cognitive, artificially intelligent system employs, in part, visual recognition and image processing to transform electronic design information, such as a schematic diagram, into a machine-readable data structure suitable for machine-based comparison of one data structure against another data structure of like kind. A comparison method identifies and quantifies similarities or equivalencies between the any such data structures, and hence between respectively corresponding electronic designs. | 2020-03-19 |
20200089788 | BALANCING WRITE AMPLIFICATION AND SPACE AMPLIFICATION IN BUFFER TREES - A buffer tree structure includes, at each internal node, a buffer having a compacted portion and an uncompacted portion. Insertion of data elements to the buffer tree can occur units called packets. A packet is initially stored in the uncompacted portion of a receiving node's buffer. When a compaction trigger condition exists, packet compaction is performed including a data element compaction operation. A buffer-emptying (flush) operation pushes the compacted packets to children nodes. | 2020-03-19 |
20200089789 | SYSTEMS AND METHODS OF OPERATION LOCK MANAGEMENT AND SYSTEM CATALOG OVERRIDES IN DATABASE SYSTEMS - Systems and methods are provided for a shared memory between a database system and a storage catalog server, which stores system catalog overrides and locks for at least a first workflow. The current system catalog overrides include at least a portion of the system catalog overrides and locks that are retrieved by the shared memory from the storage catalog server at a predetermined point in time. The database system performs a check of at least one of index validity and tenant validity for a second workflow or other database operation by checking a state of the corresponding tenant or index in the current system catalog overrides. The system catalog overrides suppress visibility of the respective system catalog changes when the database system determines that at least one of the index and the tenant is invalid based on the current system catalog overrides for the first workflow. | 2020-03-19 |
20200089790 | COMPUTER ARCHITECTURE FOR MAPPING CORRELITHM OBJECTS TO SUB-STRING CORRELITHM OBJECTS OF A STRING CORRELITHM OBJECT IN A CORRELITHM OBJECT PROCESSING SYSTEM - A device configured to link correlithm objects to string correlithm objects in a correlithm object processing system includes a string correlithm object generator configured to output a string correlithm object comprising a plurality of sub-string correlithm objects. Each sub-string correlithm object is adjacent in n-dimensional space to a preceding sub-string correlithm object and a subsequent sub-string correlithm object. A node is configured to receive a plurality of non-string correlithm objects, each non-string correlithm object representing data. A memory is configured to store a node table that associates sub-string correlithm objects with non-string correlithm objects such that a first sub-string correlithm object is associated with a first non-string correlithm object and a second sub-string correlithm object is associated with a second non-string correlithm object. | 2020-03-19 |
20200089791 | DISTRIBUTED PLATFORM FOR COMPUTATION AND TRUSTED VALIDATION - An example operation may include one or more of generating a plurality of successive data points of an iterative simulation based on predefined checkpoints, each data point identifying an evolving state of the iterative simulation with respect to a previous data point among the successive data points, transmitting a blockchain request for validating state data within a first data point among the plurality of successive data points to a first subset of endorsing nodes of a blockchain network, and transmitting a blockchain request for validating state data within a second data point among the plurality of successive data points to a second subset of endorsing nodes which are mutually exclusive from the first subset of endorsing nodes of the blockchain network for parallel endorsement of the first and second data points. | 2020-03-19 |
20200089792 | CONSISTENCY CHECKS BETWEEN DATABASE SYSTEMS - Techniques and solutions are described for determining whether an update to be sent to a production database system from a quality database system will provide consistent table relationships if applied at the production database system. These consistency checks can be carried out without transmitting entire table records from the quality system to the production system, which can reduce network traffic. These consistency checks can also reduce performance impacts at the production system, as test condition generation can be carried out at the quality database system. A consistency check method can include the quality database system determining values of updated or added records of a first table that should be consistent with a second table. The test conditions cause the production database system to execute a test to determine whether the values are present in the production system. Consistency violations can be remedied before the update is applied. | 2020-03-19 |
20200089793 | Method and System for Implementing Data Associations - Novel tools and techniques are provided for implementing data storage and/or retrieval, and, more particularly, for implementing data associations. In various embodiments, an associations rules engine might query data aggregation data services to determine whether a first data object (which along with a first relationship rule that indicates a one-to-one relationship between the first data object and a corresponding second data object) is associated with one or more third data objects; might abstract the first data object, the first relationship rule, and the one or more third data objects; might update, in a metadata catalog, a catalog entry corresponding to the first data object with one or more associations among various data objects; and might provide a requesting computing system with access to the catalog entry corresponding to the first data object, the computing system performing one or more computational tasks using the associations stored in the catalog entry. | 2020-03-19 |
20200089794 | GENERATING A DATABASE QUERY USING A DIMENSIONAL HIERARCHY WITHIN A GRAPHICAL USER INTERFACE - Generating a database query using a dimensional hierarchy within a graphical user interface including displaying a data set within a spreadsheet structure, wherein the data set comprises a plurality of columns; displaying a list structure comprising a first level and a second level; receiving a selection of a first column of the plurality of columns as a first key for the first level in the list structure; receiving a selection of a second column of the plurality of columns as a second key for the second level in the list structure; and in response to receiving the selection of the first column and receiving the selection of the second column and based on an order of the first key and the second key in the list structure, generating the database query defining a hierarchical relationship between the first column and the second column. | 2020-03-19 |
20200089795 | DATASET ORCHESTRATION WITH METADATA VARIANCE DATA - An example of an apparatus including a network interface to receive a first dataset and a second dataset. The first dataset includes first metadata and the second dataset includes second metadata. The apparatus further includes a processor to determine a variance value associated with the first metadata and the second metadata. The apparatus also includes an orchestration engine to use the variance value to orchestrate data between the first dataset and the second dataset. | 2020-03-19 |
20200089796 | GENERATING A DATABASE QUERY TO DYNAMICALLY AGGREGATE ROWS OF A DATA SET - Generating a database query to dynamically aggregate rows of a data set including determining a hierarchical relationship between a first column and a second column within a spreadsheet structure, wherein the first column and the second column comprise rows of the data set; receiving a calculation for a third column within the spreadsheet structure; determining that the third column is on a same hierarchical level as the first column; and in response to determining that the third column is on the same hierarchical level as the first column, generating the database query aggregating a plurality of rows of the data set based on the calculation for the third column and the hierarchical relationship between the first column and the second column. | 2020-03-19 |
20200089797 | GENERATING TEST DATA BASED ON DATA VALUE RULES OF LINKED DATA NODES - The disclosure herein describes generating test data based on a set of linked data nodes and associated data value rules. A plurality of data fields of a data structure is identified. A plurality of linked data nodes is generated based on the identified data fields, wherein each data node comprises a probability value and data value rules for generating data values for the data fields. Parent nodes of the linked data nodes are collapsed into associated child nodes to form combined data nodes. Test data values for the plurality of data fields are generated based on the combined data nodes and a data structure instance is populated with the generated test data values. The populated data structure instance is provided for use in executing tests. The generation of test data based on the data value rules of linked data nodes provides a realistic data environment for testing. | 2020-03-19 |
20200089798 | High volume-velocity time series data ingestion, analysis and reporting method and system - A computer-implemented time-series data processing method comprises receiving high volume-velocity time-series information from one or more data emission devices concerning the occurrences of events and a desired output to be generated. A data identification and structure scheme comprised of a set of identifiers, of a set of record keys and of a set of database tables is analyzed. The information concerning the occurrences of events and associated to the set of identifiers is received at a host computer that is one of one or more host computers configured to ingest and analyze the data. The computer-implemented method processes and stores the received data using the data identification and structure scheme. The computer-implemented method further processes the stored data to generate the desired output. | 2020-03-19 |
20200089799 | CUBE CONSTRUCTION FOR AN OLAP SYSTEM - Embodiments relate to cube construction. According to a method, a plurality of valid history queries that request to retrieve a cube comprising a first number of cuboids in an On-Line Analytical Processing (OLAP) system are collected. A plurality of dimension combinations is acquired from the plurality of valid history queries. A query frequency of each cuboid of a second number of cuboids with the plurality of dimension combinations is determined, the second number of cuboids being a subset of the first number of cuboids. A cuboid construction sequence for the second number of cuboids is determined based on the query frequency. The cube is constructed based on the cuboid construction sequence. | 2020-03-19 |
20200089800 | NORMALIZATION OF UNSTRUCTURED CATALOG DATA - Provided is a method and system for normalizing catalog item data to create higher quality search results. In one example, the method may include receiving a record comprising an unstructured description of an object, identifying a type of the object from among a plurality of object types and identifying a predefined attribute of the identified type of object, extracting a value from the unstructured description corresponding to the predefined attribute and modifying the extracted value to generate a normalized attribute value, and storing a structured record of the object in a structured format comprising a plurality of values of a plurality of attributes of the object from the unstructured description including the normalized attribute value for the predefined attribute of the object. | 2020-03-19 |
20200089801 | DISTURBANCE-FREE PARTITIONING AND MIGRATION OF DATA FROM ONE STORAGE ACCOUNT TO ANOTHER STORAGE ACCOUNT - Methods and devices for data migration may include initially processing requests from a plurality of geographic regions for a cloud service using a global back-end service with a global storage account storing data. The methods and devices may include establishing a region back-end service with a region storage account in at least one geographic region of the plurality of geographic regions to support the cloud service for users in the at least one geographic region, wherein the region back-end service includes a region RTable. The methods and devices may include receiving, by the region back-end service, user requests for the cloud service from one or more users in the at least one geographic region and accessing, via the region RTable, one or more rows of data associated with the at least one geographic region from the global storage account in response to the user requests. | 2020-03-19 |
20200089802 | INFERRING TOPICS WITH ENTITY LINKING AND ONTOLOGICAL DATA - Systems and methods are disclosed for inferring topics from a file containing both audio and video, for example a multimodal or multimedia file, in order to facilitate video indexing. A set of entities is extracted from the file and linked to produce a graph, and reference information is also obtained for the set of entities. Entities may be drawn, for example, from Wikipedia categories, or other large ontological data sources. Analysis of the graph, using unsupervised learning, permits determining clusters in the graph. Extracting features from the clusters, possibly using supervised learning, provides for selection of topic identifiers. The topic identifiers are then used for indexing the file. | 2020-03-19 |
20200089803 | COMPARING KEYWORDS TO DETERMINE THE RELEVANCE OF A LINK IN TEXT - A method of checking a link in a body of text comprises receiving the text and detecting a link to an external source within the received text. At least a portion of the received text is selected for analysis and one or more important keywords within the selected portion of the received text are determined. Text is obtained from the external source by accessing the link. At least a portion of the obtained text is selected for analysis and one or more important keywords within the selected portion of the obtained text are determined. The more important keywords within the selected portion of the original received text are compared with the important keywords within the selected portion of the obtained text from the link, and an output is provided depending upon the result of the comparison of the one or more important keywords within the selected portion of the received text with the one or more important keywords within the selected portion of the obtained text. | 2020-03-19 |
20200089804 | COMPUTER ARCHITECTURE FOR MAPPING ANALOG DATA VALUES TO A STRING CORRELITHM OBJECT IN A CORRELITHM OBJECT PROCESSING SYSTEM - A string correlithm object generator is configured to output a string correlithm object comprising a plurality of sub-string correlithm objects. A node is configured to receive a plurality of data values. A memory is configured to store a node table that associates sub-string correlithm objects with the data values such that a first sub-string correlithm object is associated with a first data value and a second sub-string correlithm object is associated with a second data value. A processor is configured to receive a third data value that is between the first data value and the second data value, determine a third sub-string correlithm object that is interpolated between the first sub-string correlithm object and the second sub-string correlithm object, and associate the third sub-string correlithm object with the third data value. | 2020-03-19 |
20200089805 | Voice-Activated Events Management System - Disclosed herein are system, method, and computer program product embodiments for providing voice-activated events management. An embodiment operates by receiving an audio-formatted query through an application associated with an event. A first user ID, registered with the event, is determined to be associated with the mobile device. It is determined whether the query is an event query or a user query based on one or more keywords. Based on the determination that the query is either the event query or the user query, the answer to the event query is determined from data retrieved over a network, or the answer to the user query is determined from the locally stored data at the mobile device. The determined answer to the query is provided via the application operating on the mobile device. | 2020-03-19 |
20200089806 | METHOD OF DETERMINING PROBABILITY OF ACCEPTING A PRODUCT/SERVICE - A method of determining a probability of a procuring organization accepting a product/service offering of an offering organization may include using a processor to obtain a first collection of information items relating to the product/service offering and that may be generated internally of the offering organization. The method may include using the processor to obtain a second collection of information items relating to the first collection of information items and that may be generated externally of the offering organization. The method may further include using the processor to generate a respective relevance score for each second collection of information items relative to a corresponding first collection of information items and generate a respective sentiment score for each second collection of information items. The method may further include using the processor to generate the probability of accepting the product/service offering based upon the respective relevance scores and respective sentiment scores. | 2020-03-19 |
20200089807 | METHOD FOR SENSORY ORCHESTRATION - According to one embodiment, a computer-implemented method includes obtaining a sensory profile, identifying an occurrence of a sensory aspect event affecting a user, comparing the sensory aspect event to the sensory profile, determining from comparing the sensory profile, whether the sensory aspect event is a positive sensory aspect, and countering and/or adjusting the sensory aspect event in response to determining the sensory aspect event is not a positive sensory aspect. | 2020-03-19 |
20200089808 | SEARCH SYSTEM FOR PROVIDING SEARCH RESULTS USING QUERY UNDERSTANDING AND SEMANTIC BINARY SIGNATURES - Technology for the improved processing of search queries is provided. In one embodiment, methods may return semantically relevant search results for a search query. During a pre-computing offline processing, an inventory semantic index may be generated and may include inventory binary hashing signatures that are associated with inventory listings, such as goods or services for sell, and the index may be partitioned by categories and shards. When a search query is received, relevant categories are determined using a relevant category recognition service, and a search query binary hashing signature maybe generated for the search query. The relevant categories are searched to determine hamming distances between the inventory binary hashing signatures and the search query binary hashing signature, where the hamming distance indicates semantic relevance. | 2020-03-19 |
20200089809 | METHOD AND SYSTEM FOR FILTERING CONTENT - The present teaching relates to methods, systems, and programming for information retrieval. A search result associated with a search query is obtained and provided to a user. Upon receiving a filtering request from the user, the search result is filtered based on the filtering request to generate an updated search result. The updated search result is provided to the user in response to the filtering request. | 2020-03-19 |
20200089810 | JOURNALING ENGINE - A journaling engine receives input from a variety of sources to synthesize editable journal of experiences over a given date range. The engine uses application program interfaces to interface to a transaction database for cataloging experiences during an event. The engine further evaluates transactions to retrieve venue and activity information associated with the experiences. The user may edit the journal by adding or subtracting experiences. The final journal may be posted to social media by exporting the journal in an appropriate format. The user and those viewing the journal on social media may receive offers related to the experiences in the journal or similar experiences local to the user and viewers. | 2020-03-19 |
20200089811 | SELECTING FRIENDS FOR SHARING ON SOCIAL MEDIA - A graphical user interface allows a user to dynamically select a scope of friends to share media content based on a sharing criteria and interest degree analysis. The sharing criteria may be selected by the user to filter friends for sharing content. The interest degree analysis may be provided from a social media platform that identifies the topic and content of the media which is being shared and determines a degree of interest for each friend on the identified topic. The degree of interest is used to assign each friend to a sharing scope on the graphical user interface to allow the user to select a scope of friends to share the media. | 2020-03-19 |
20200089812 | UPDATING SOCIAL MEDIA POST BASED ON SUBSEQUENT RELATED SOCIAL MEDIA CONTENT - Methods, systems and computer program products for updating a social media post based on subsequent related social media content. Aspects include receiving first social media content and second social media content, wherein the first and second social media are displayed in a respective first and second social media posts associated with a user account. Aspects also include determining that the first social media content is correlated to the second social media content based on contextual analysis. Aspects also include updating the first social media post to include an indication of the second social media post. | 2020-03-19 |
20200089813 | SYSTEMS AND METHODS FOR PRESENTING ADDITIONAL CONTENT FOR A NETWORK APPLICATION ACCESSED VIA AN EMBEDDED BROWSER OF A CLIENT APPLICATION - Embodiments described include systems and methods for presenting additional content for a network application accessed via an embedded browser of a client application are provided. Additional content related to network applications may be presented on client devices. Specifically, activity such as embedded browser activity may be monitored. Responsive to detecting an event based on the monitored activity, additional content related to the network application may be provided. In various embodiments, the additional content is provided to a client application on the client device for presentation on the client device. | 2020-03-19 |
20200089814 | SOFTWARE DETECTION BASED ON USER ACCOUNTS - A method for detecting software installed on a computer may be provided. The method may comprise obtaining a default user identifier, collecting an installed user identifier, performing an identifier comparison by comparing the installed user identifier with the default user identifier and determining whether an installed user identifier matches a default user identifier, assigning a probability value based on the identifier comparison, performing a threshold comparison of the probability value to the a predetermined threshold value, determining whether the probability value exceeds the threshold value, and in response to determining that the probability value exceeds the threshold value, concluding that the software has been installed on the computer system. | 2020-03-19 |
20200089815 | AUTOMATICALLY CATEGORIZING BOOKMARKS FROM CUSTOMIZED FOLDERS AND IMPLEMENTATION BASED ON WEB BROWSING ACTIVITY - A computer-implemented method, according to one embodiment, includes: collecting information which corresponds to internet browsing activity, receiving a request to create a bookmark for a first website, and creating keyword and density pairs (KDPs) for the first website using the information collected prior to receiving the request to create the bookmark. Creating the KDPs includes: extracting a plurality of keywords from the first website, and calculating a density value for each of the plurality of keywords based on the information collected prior to receiving the request to create the bookmark. Furthermore, each keyword and respective density value are added to a hash map as a KDP entry. Other systems, methods, and computer program products are described in additional embodiments. | 2020-03-19 |
20200089816 | Equipment and Method for Hash Table Resizing - A method for optimizing hash table lookup speed during hash table resize on a computing device, the method including performing the following on the computing device: providing a first hash table having N slots for entries, designating the first hash table as an active hash table, allocating a second hash table, and performing the following after allocating the second hash table: when a hash table insertion of an entry is requested, performing insertion by inserting the entry to the first hash table and inserting the entry to the second hash table, and when a hash table lookup is requested, looking up the requested entry in the active hash table, one of the performing insertion and the performing deletion including also copying K entries, K being greater than or equal to 1, from the first hash table to the second hash table. Related apparatus and methods are also described. | 2020-03-19 |
20200089817 | Composition Engine for Analytical Models - A computer-implemented method for executing a composition of analytical models. In one embodiment, the computer-implemented method creates analytical model composition definitions for a plurality of analytical models. The computer-implemented method receives analytical model definitions and an analytical model composition. The computer-implemented method binds the analytical model composition to the analytical model definitions. The computer-implemented method deploys the analytical model composition using the analytical model composition definitions. The computer-implemented method executes the analytical model composition and returns a result of the analytical model composition. | 2020-03-19 |
20200089818 | SYSTEM AND METHOD DASHBOARD SELECTION - One or more client instances hosted by a platform may support access to a cloud-based application to select a dashboard, such as via a client device. Each dashboard includes one or more visualizations of analytic or summary information. When a user of the client device accesses the cloud-based application, a subset of dashboards are initially provided based on recent usage history of dashboards. Specifically, the cloud-based application determines if the user has access to each dashboard of the subset of dashboards and, in response to determining the user does have access to a dashboard, displays the dashboard within the subset of dashboards. The user may select a dashboard from the subset of dashboards, where the selected dashboard is displayed on the client device. | 2020-03-19 |
20200089819 | Direct Room Modeling in Computer-Aided Design - The present invention concerns a computer-implemented method, a computer system and a computer program product for direct room modeling in a CAD model. The CAD model comprises a rectangular coordinate system comprising mutually orthogonal height, first horizontal and second horizontal directions. A first position and subsequently a second position within the model are obtained via a user input device. The first and second positions define a rectangle perpendicular to the height direction and aligned with the horizontal directions. The rectangle comprises edges and corners. The rectangle comprises the first and second positions at diagonally opposite corners. A room drawing operation is automatically performed based on the rectangle. One or more walls and/or wall portions, each extending in the height direction and along an edge of the rectangle over in essence the full length of the edge, are thereby inserted or removed. | 2020-03-19 |
20200089820 | IC TEST INFORMATION MANAGEMENT SYSTEM BASED ON INDUSTRIAL INTERNET - The present invention discloses an information management method and system for IC tests, and a storage medium. The method comprises steps of: providing test data generated by performing an IC test by an IC test platform, the IC test platform being an IC test platform having more than one stage, each stage of the IC test platform comprising a plurality of test devices: providing resource data related to the IC test, other than the test data; and analyzing the IC test according to the test data of the IC test and the resource data, to obtain result data related to the IC test. In this way, the present invention can provide technical support for utilizing the value of test data generated in IC tests. | 2020-03-19 |
20200089821 | SYSTEMS AND METHODS FOR PERFORMING A FAST SIMULATION - Systems and methods are provided for performing a fast simulation using test parameter vectors as inputs. The method includes retrieving precomputed samples from a sample repository stored in a non-volatile memory, the precomputed samples being precomputed using a simulated model, predetermined parameter vectors, and random inputs; storing respective subsets of the precomputed samples in local memories of a plurality of respective hardware processors; storing the test parameter vectors in the local memories of the hardware processors; at each of the hardware processors, selecting a subset of the precomputed samples stored in the local memory of the hardware processor based on the test parameter vectors, computing test samples by executing the simulated model using the test parameter vectors and the random inputs; and combining the subset of the precomputed samples and the test samples to produce a simulation result. | 2020-03-19 |
20200089822 | USER INTERFACE TO SIMULATE TARGET DETECTION AND RECOGNITION - A method is disclosed of providing a graphical user interface (GUI) for simulating target detection and recognition. The method includes providing a user entry area for receiving user entered ground truth attributes defining one or more respective simulated physical objects, and providing a user entry area for receiving user entered collection attributes defining one or more collections, each collection being a simulation of automated target recognition applied to simulated sensor output associated with simulated sensing of the one or more simulated physical objects. The method further includes simulating detection of the one or more simulated physical objects and recognition based on the ground truth attributes and the collection attributes, generating detection data about at least one detected object based on the simulated target detection, and displaying the detection data. | 2020-03-19 |
20200089823 | 3D BLOCK MODELLING OF A RESOURCE BOUNDARY IN A POST-BLAST MUCKPILE TO OPTIMIZE DESTINATION DELINEATION - A method for 3-D block modelling of a resource boundary in a post-blast muckpile to optimize destination delineation for resource control is provided. An in-situ pre-blast model of an ore deposit to be mined, movement data, blast design and explosive loading information, and post-blast topographic data are input in to the memory of a general purpose computer. Using the pre-blast block model, movement data, blast design and explosive loading information, and post-blast topographic data a three-dimensional vector field is generated. The method uses the three-dimensional vector field to move a plurality of centroids of the in-situ block model to populate a three-dimensional post-blast location. Then method optimizes the populated three dimensional post-blast location to determine a plurality of sets of optimal dig boundaries. | 2020-03-19 |
20200089824 | SYSTEM AND METHOD FOR MODELING, SIMULATION, OPTIMIZATION, AND/OR QUOTE CREATION - A computer may display on a graphical user interface (GUI) a component library including a set of components relating to a compressed air system. The GUI may have a modeling interface for configuring a virtual model using the set of components. The computer may simulate the virtual model to determine one or more optimizations to the compressed air system. The computer may also determine the cost of implementing the compressor system optimization. | 2020-03-19 |
20200089825 | APPARATUSES, SYSTEMS, AND METHODS FOR PERFORMING REMOTE REAL-TIME EXPERIMENTS - Embodiments of the present invention include apparatuses and methods for performing remote experiments in real-time. The method includes sending requests to perform remote experiments for a desired configuration to a first and second facility. The desired configuration may include a first and second configuration. The method includes running a first remote experiment in real-time at the first facility to obtain a first output variable. The first facility may include the first configuration with a first input variable. The method includes simultaneously running a second remote experiment in real-time at a second facility to obtain a second output variable. The second facility may include the second configuration with a second input variable. The first output variable may be set as the second input variable to mimic the desired configuration. The method includes obtaining experimental results of the desired configuration via the first and second input and output variables. | 2020-03-19 |
20200089826 | INTEGRATED PROCESS-STRUCTURE-PROPERTY MODELING FRAMEWORKS AND METHODS FOR DESIGN OPTIMIZATION AND/OR PERFORMANCE PREDICTION OF MATERIAL SYSTEMS AND APPLICATIONS OF SAME - Integrated process-structure-property modeling framework and method for design optimization and/or performance prediction of a material system are provided. The Integrated process-structure-property modeling framework includes a powder spreading model using a discrete element method to generate a powder bed; a thermal-fluid flow model of the powder melting process to predict voids and temperature profile; a cellular automaton model to simulate grain growth based on the temperature profile; and a reduced-order micromechanics model to predict mechanical properties and fatigue resistance of resultant structures by resolving the voids and grains. | 2020-03-19 |
20200089827 | SIMULATION OF UNIT OPERATIONS OF A CHEMICAL PLANT FOR ACID GAS REMOVAL - The present invention is related to a method for determination of unit operations of a chemical plant for acid gas removal, the method carried out by a computer or a distributed computer system and the method comprising the steps of: providing a first set of parameters for the unit operations; providing a second set of parameters for the unit operations based on the provided first set of parameters and based on data retrieved from a database; determining a digital model of the chemical plant based on the first set of parameters and the second set of parameters, wherein the digital model comprises a system of equations defining the unit operations of the chemical plant; selecting starting points for an equation-based solution method of the system of equations, wherein the starting points are at least partially selected from the: (i) the first set of parameters; (ii) the second set of parameters; and (iii) the data retrieved from the database; determining resultant settings for the unit operations of the chemical plant using the equation-based solution method for the system of equations initialized by the selected starting points. | 2020-03-19 |
20200089828 | BOUNDARY ASSERTION-BASED POWER RECOVERY IN INTEGRATED CIRCUIT DESIGN - Systems and methods of performing boundary assertion-based power recovery in integrated circuit design set boundary assertions based on a specified slack value. A boundary defines a set of components of the integrated circuit and setting the boundary assertions includes specifying arrival times at input pins of the set of components and required arrival times at output pins of the set of components. The method includes performing timing analysis of the set of components and performing the power recovery by replacing ones of the set of components based on a result of the timing analysis. The integrated circuit design is provided for fabrication based on completing the power recovery. | 2020-03-19 |
20200089829 | COMPLEXITY-REDUCED SIMULATION OF CIRCUIT RELIABILITY - A system and method for simulating an electronic circuit is disclosed. The method includes creating a finite set of circuit or device parameter points selected from within an n-dimensional parameter space. The method includes determining, for each circuit or device parameter point of the set, a corresponding response value of the performance metric and a corresponding probability of occurrence. The method includes determining, for a predetermined value of the performance metric, the total probability of occurrence. | 2020-03-19 |
20200089830 | Elmore Delay Time (EDT)-Based Resistance Model - We disclose an integrated circuit design tool for modeling resistance of a terminal of a transistor such as a gate, a source, a drain, and a via. A structure of the terminal is specified in a data structure in memory using a three-dimensional (3D) coordinate system. For each of a plurality of volume elements in the specified structure, an Elmore delay time (EDT) is determined. For those volume elements in the plurality of volume elements that are located on a surface of the gate terminal which faces the channel region, an average EDT (aEDT) is determined based on the EDT. Point-to-point resistance values of the terminal are generated as a function of the aEDT and a capacitance of the terminal. | 2020-03-19 |
20200089831 | AUTOMATED METHOD FOR INTEGRATED ANALYSIS OF BACK END OF THE LINE YIELD, LINE RESISTANCE/CAPACITANCE AND PROCESS PERFORMANCE - A method of electrical device manufacturing that includes measuring a first plurality of dimensions and electrical performance from back end of the line (BEOL) structures; and comparing the first plurality of dimensions with a second plurality of dimensions from a process assumption model to determine dimension variations by machine vision image processing. The method further includes providing a plurality of scenarios for process modifications by applying machine image learning to the dimension variations and electrical variations in the in line electrical measurements from the process assumption model. The method further includes receiving production dimension measurements and electrical measurements at a manufacturing prediction actuator. The at least one of the dimensions or electrical measurements received match one of the plurality of scenarios the manufacturing prediction actuator using the plurality of scenarios for process modifications effectuates a process change. | 2020-03-19 |
20200089832 | APPLICATION- OR ALGORITHM-SPECIFIC QUANTUM CIRCUIT DESIGN - Techniques for designing application or algorithm specific quantum computing circuits for particular applications or algorithms are presented. A design component can comprise an extractor component that can extract qubit pairs determined to satisfy a defined threshold potential of having to use a direct connection between each other in a quantum circuit design based on analysis of an application or algorithm; and a design management component (DMC) that can determine a circuit design of the quantum circuit to use for the application or algorithm based on analysis of characteristics associated with the qubit pairs. DMC can sort the qubit pairs by weighting schemes and the characteristics, comprising the number of affecting downstream qubits, the number of two-qubit gate operations between qubit pairs, and/or whether a qubit pair affects a measurement. Based on the sorting, DMC selects highest ranking qubit pairs to assign a direct connection. | 2020-03-19 |
20200089833 | METHODS FOR ENGINEERING INTEGRATED CIRCUIT DESIGN AND DEVELOPMENT - Systems and methods for engineering integrated circuit design and development are described. A requester posts a request for an integrated circuit chip design using the systems and methods. Moreover, using design tools of the systems and methods, one or more designers generate one or more designs. The designers use computer software that is provided by the systems and methods to test the one or more designs. Moreover, the designs are independently verified by a design engineering entity or by other designers. The one or more designs are provided to a fab via the systems and methods to fabricate a prototype of an integrated circuit chip. The prototype is tested on a printed circuit board by using a test software, which is provided by the systems and methods. | 2020-03-19 |
20200089834 | SYSTEM AND METHOD FOR INTERACTIVE DATASHEETS - A method includes retrieving an interactive datasheet for a product and displaying, on an output device, a first view of the interactive datasheet for the product, including a first section and a second section. The method also includes adjusting, in response to receiving, by an input device of the computing device from a user, a first value of a characteristic of the product, to produce a first adjusted characteristic, and updating a model of the product, based on the first value of the characteristic of the product, to produce an updated interactive datasheet for the product. Additionally, the method includes updating the first view of the interactive datasheet for the product displayed on the output device, the first view, based on the updated interactive datasheet for the product and storing, in the memory, the updated interactive datasheet for the product, in response to receiving an indication by the user. | 2020-03-19 |
20200089835 | Creating and Reusing Customizable Structured Interconnects - A customizable routing system allows designers to create custom connection layouts that can be stored, turned into templates, reused, and further customized. The system describes designer-input custom connection layouts in terms of “structural directives” that specify its patterns and properties instead of using precise dimensions. Structural directives may describe particular connection patterns between structural components (e.g., backbone or fishbone), the placement, width, direction or layer of specific structural components, and properties of structural components relative to other components. These structural directives are implemented generally during routing, such as through design constraints, which allows the router to locally optimize the design (e.g., for cost or wire length) while considering the structural intentions of the designer. The system can also learn and replicate customization patterns based on existing layout templates by comparing connectivity information to that of existing layout templates and applying applicable structural directives. | 2020-03-19 |
20200089836 | CAPACITANCE EXTRACTION METHOD FOR SEMICONDUCTOR SADP METAL WIRES - A system, method and computer program product for extracting integrated circuit on-chip parasitic capacitance in semiconductor structures including structures formed according to a Self-Aligned Double Patterning (SADP) semiconductor manufacturing process. A method of calculating the capacitance of a conductive signal wire in a SADP layer whose adjacent wires or groups of wires are floating (not connected to a circuit or net and not signal carrying). Further, there is provided a system running an iterative method for accurately and efficiently eliminating a group of floating metals by eliminating one floating metal wire per iteration while extracting its corresponding on-chip parasitic coupling capacitance effect. Further, system and methods calculate parasitic capacitance calculation for an “isolated” wire(s) or a “semi-isolated wire” resulting from employing a Self-Aligned Double Patterning (SADP) processing technique. The system and method provides a capacitance calculation and circuit simulation solution without involving use of and without computing a capacitance matrix. | 2020-03-19 |
20200089837 | SYSTEM AND METHOD FOR FORMING INTEGRATED DEVICE - A method for forming an integrated device includes the following operations. A first circuit layout is provided. The first circuit layout includes a first device and a connecting portion. A first voltage level is applied to the first circuit layout. The first circuit layout is analyzed according to the first voltage level to determine if a failing signal occurs in the first circuit layout. The first device is analyzed when the failing signal occurs. It is determined, according to a second voltage level, whether a violation occurs in the first device. The first circuit layout is modified when a violation occurs. | 2020-03-19 |
20200089838 | DEFECT INSPECTION APPARATUS AND DEFECT INSPECTION METHOD - An apparatus for inspecting a defect includes a memory storage and a processing unit coupled to the memory storage. The processing unit is configured to acquire pattern data for one or more patterns implemented on a wafer from a storage device, clip a portion that corresponds to the pattern data from a figure indicated by design data to generate design information and one or more circuit patterns, assign a first set of numbers to the one or more patterns of the pattern data, assign a second set of numbers to the one or more circuit patterns of the design information, generate relation information indicative of one or more correspondences between the first set of numbers and the second set of numbers, verify whether or not the one or more patterns indicated by the pattern data constitute a crucial defect based on the relation information, and send a verification result to a device. | 2020-03-19 |
20200089839 | SYSTEM AND METHOD FOR ESTIMATION OF CHIP FLOORPLAN ACTIVITY - Simulation or calculation to estimate activity per unit in a chip design, combined with estimation of the specific location or region in which the unit logic will be finally placed, provides for calculation of an estimation of the activity distribution within the floorplan. Activity distribution estimation can be performed with fine granularity (at a gate level), at coarse granularity (at a macro level), or at an intermediate granularity (at a network-on-chip unit level). The estimation is displayed, visually, to a user of a design tool. Furthermore, the estimation is used to make manual or automatic optimizations of the floorplan and the location and configuration of units within the floorplan. | 2020-03-19 |
20200089840 | Placement Constraint Method for Multiple Patterning of Cell-Based Chip Design - A method for outputting a first number of subsets of a layer pattern comprising a plurality of cells arranged in a row includes selecting subsets of cells from the plurality of cells, constructing a graph representation for each subset of cells, identifying graph representations that are not colorable with a first number of labels, identifying subsets of cells that correspond to the identified graph representations, changing a distance between cells in each of the identified subset of cells, wherein the changed distances are greater than the first spacing, labeling the graph representations with the first number of labels, and outputting subsets of the layer pattern to a machine readable storage medium for manufacturing a set of masks that is used to form a single, patterned layer. Each subset of the layer pattern represents a separate mask pattern and includes features of the layer pattern corresponding to a label in the labeled graph representations. | 2020-03-19 |
20200089841 | Mapping Intermediate Material Properties to Target Properties to Screen Materials - A system for evaluating candidate materials for fabrication of integrated circuits includes a data processor coupled to a memory. Roughly described, the data processor is configured to: calculate and write to a first database, for each of a plurality of candidate materials, values for each property in a set of intermediate properties; calculate and write to a second database, values for a selected target property for various combinations of values for the intermediate properties and values describing candidate environments; and for a particular candidate material and a particular environment in combination, determine values for the intermediate properties for the candidate material by reference to the first database, and determine the value of the target property for the candidate material by querying the second database with, in combination, (1) the determined intermediate property values of the candidate material and (2) a value or values describing the particular environment. | 2020-03-19 |
20200089842 | RANDOM SEQUENCE GENERATION FOR GENE SIMULATIONS - A random sequence generation of defined values may be provided. A method comprises pre-loading a RAM block with an initial list comprising the defined values of a sequence of values to be updated, and shuffling the defined values of the sequence using a counter and a random offset for indices in the list. | 2020-03-19 |
20200089843 | FILE-BASED SOFTWARE APPLICATION DISCOVERY - A system may include a computational instance disposed within a remote network management platform and associated with a managed network, where the computational instance contains a configuration management database. The system may also include a software application disposed on a server device of the managed network and configured to perform operations comprising: obtaining, from the configuration management database, a list of directories, a list of file types, and a list of file names; remotely accessing a computing device of the managed network; for each respective directory in the list of directories, obtaining, from the computing device, information respectively related to discovered files that are: (i) disposed within the respective directory on the computing device, and (ii) specified by the list of file types or specified in the list of file names; and transmitting, to the configuration management database, the information related to the discovered files. | 2020-03-19 |
20200089844 | SECURE DRM-AGNOSTIC KEY ROTATION - Systems and methods for managing provisioning of keys prior to a key rotation are provided. A license server generates a license that is associated with a renewal time. The renewal time is a time that is prior to a key rotation time, and triggers a receiver device to send a renewal request prior to the key rotation time. The renewal time may be a randomized time prior to the key rotation time that differs for different receiver devices. The license is transmitted to the receiver device. The license server then receives a renewal request from the receiver device that is triggered at the renewal time. The license server generates a next license that comprises a next key, whereby the next key is a decryption key for decrypting the encrypted signal after the key rotation time. The next license is transmitted to the receiver device prior to the key rotation time. | 2020-03-19 |
20200089845 | SYSTEM AND METHOD FOR INTER-PROGRAM FILE CONTROL COMMUNICATION - A system for communication between two or more computer programs is disclosed. The system includes a memory, an interface, and a processor. The memory stores a first file, expected metadata for the first file, and expected metadata for one or more fields in the first file. The interface receives a file from a computer program. The file comprises fields that each comprise information provided by one or more sources. The processor executes a second computer program which extracts a first set of file metadata from the received file, compares the extracted first set of file metadata to the expected metadata, and determines if the extracted first set of file metadata corresponds to the expected metadata. If the extracted first set of file metadata corresponds to the expected metadata for the first file, then the processor performs analogous comparisons at a field level and stores the first file in the memory. | 2020-03-19 |
20200089846 | CONTROL PROGRAM EXECUTION METHOD - The present invention relates to a control program execution method. According to one embodiment of the present invention, the control program execution method performed in a terminal device in which a lower control program for managing a device to be controlled and/or an upper control program for executing the lower control program are installed comprises the steps of: receiving an input of an execution request for the upper control program from a user; searching for the device to be controlled, by the upper control program executed on the basis of the execution request; searching for the lower control program corresponding to identification information of the searched-for device to be controlled, by using the identification information; and connecting communication between the searched-for lower control program and the device to be controlled, wherein the lower control program is sequentially executed after the upper control program is executed. | 2020-03-19 |
20200089847 | Verifying A User Of A Computer System - A method and system for verifying a user of a computer system are presented. One example comprises observing behavioral characteristics of the user's interactions with the computer system during a current session of computer system usage, the behavioral characteristics being based on command invocation behavioral characteristics. The example further comprises identifying variations between the observed behavioral characteristics and a behavioral profile developed based on prior command invocation behavioral characteristics of the user. A verification procedure for the user to complete to continue the current session is then implemented based on the identified variations between the observed behavioral characteristics and the behavioral profile. | 2020-03-19 |
20200089848 | SUPERVISED LEARNING SYSTEM FOR IDENTITY COMPROMISE RISK COMPUTATION - Systems are provided for improving computer security systems that are based on user risk scores. These systems can be used to improve both the accuracy and usability of the user risk scores by applying multiple tiers of machine learning to different the user risk profile components used to generate the user risk scores and in such a manner as to dynamically generate and modify the corresponding user risk scores. | 2020-03-19 |
20200089849 | METHOD AND SYSTEM FOR BEHAVIOR-BASED AUTHENTICATION OF A USER - The method for the behavior-based authentication of the current user to a mobile, portable communication system includes repeated performance of capturing the gross-motor measurement data, inputting the gross-motor measurement data into the gross-motor classification module, generating a first classification result, and storing the first classification result. The method further includes accessing of the memory of the system in order to read out at least one of the stored first classification results from the memory, reading out of the at least one first classification result and evaluating same in accordance with a specified checking criterion, and generating an authentication signal if the checking criterion is met. | 2020-03-19 |
20200089850 | METHODS AND SYSTEMS FOR USER AUTHENTICATION - A user device, such as a smartphone or laptop, may be password (passphrase) protected. The user device may combine biometric input analysis, such as facial recognition, with viseme analysis to authenticate a user attempting to use a password (passphrase) to access the user device. Secure authentication on methods and systems are described that account for variations in how, based on the user's emotion (e.g., mood, temperament, unique pronunciation, etc . . . ), a password (passphrase) may be presented to the user device. | 2020-03-19 |
20200089851 | Electronic Devices and Corresponding Methods for Precluding Entry of Authentication Codes in Multi-Person Environments - An electronic device includes a user interface. The user interface can include a display. One or more sensors, which may include an imager, can be included as well. One or more processors are operable with the user interface and the one or more sensors. The one or more processors determine, from signals from the one or more sensors, whether one or more persons are within a predefined environment of the electronic device. Where only one person is within the predefined environment, the one or more processors request entry of a user authentication code at the user interface to authenticate the one person as an authorized user of the electronic device. However, where two or more persons are within the predefined environment, the one or more processors preclude entry of the user authentication code at the user interface. This prevents nefarious actors from seeing entry of the user authentication code. | 2020-03-19 |
20200089852 | CONTROLLING ELECTRONIC ACCESS BY PORTABLE ELECTRONIC DEVICE RESPONSIVE TO SEQUENCE OF SCANNED FINGERPRINTS FORMING PIN - A processor of an electronic device receives a personal identification number (PIN) having a sequence of numeric digits. For each digit of the PIN, a fingerprint scan is received from a fingerprint detector, and is registered as associated with the digit of the PIN. Subsequently, when a fingerprint scan matches the fingerprint scan that was registered for the digit of the PIN, the operations increment the PIN digit counter. In contrast, when the fingerprint scan does not match the fingerprint scan that was registered for the digit of the PIN, but does match the fingerprint scan that was registered for the next one of the PIN digits, the next PIN digit counter is incremented. When a PIN entry completion condition is satisfied, the operations selectively allow electronic access by a user to an application based on determining whether the sequence of PIN digit counters contain values matching the PIN. | 2020-03-19 |
20200089853 | VALIDATING AUTHORIZED ACTIVITIES APPROVED BY A GUARDIAN - A computer-implemented method includes: receiving, by a computer device, biometric data scanned from a guardian and biometric data scanned from a ward; receiving, by the computer device, data defining a relationship between the guardian and the ward; storing, by the computer device, the biometric data scanned from the guardian, the biometric data scanned from the ward, and the data defining the relationship in a record in a secure database; receiving, by the computer device, a request for validation including scanned biometric data; determining, by the computer device, the scanned biometric data matches the record in the secure database; and transmitting, by the computer device and in response to the determining, data defining an authorization based on the relationship. | 2020-03-19 |
20200089854 | USER AUTHENTICATION USING PASSPHRASE EMOTIONAL TONE - An authentication passphrase is analyzed to identify a first set of parts of speech in the passphrase. Based on comparing the first set with a second set of parts of speech corresponding to a stored passphrase, it is determined that the first set and the second set have less than a threshold number of common elements. In response to the determining, the passphrase is analyzed to score a level of a previously-set emotional tone in the passphrase. Access to a protected resource is allowed in response to the score being above a threshold. | 2020-03-19 |
20200089855 | Method of Password Authentication by Eye Tracking in Virtual Reality System - A method of password authentication by eye tracking for a computing device of a virtual reality (VR) system is disclosed. The method comprises obtaining a user's focus point, displaying at least a graphical unlocking pattern for the user by a head-mounted display (HMD) of the VR system, determining whether the user's focus point is at the graphical unlocking patterns within a time interval or following a preconfigured focal sequence, and determining a password authentication operation is unlocked when the focus point at the graphical unlocking patterns within the time interval or following the preconfigured focal sequence. | 2020-03-19 |
20200089856 | SYSTEM AND METHOD FOR SHARING OF DATA SECURELY BETWEEN ELECTRONIC DEVICES - A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a processor, memory and biometric sensor. Personal data is stored in the memory of the personal information device. The personal information device may be registered with a centralized system. Data stored on the personal information device may be uploaded to an access device upon verification of a user's identity using a biometric recognition technique. | 2020-03-19 |
20200089857 | Fingerprint Recognition Method and Terminal Device - When detecting a first touch operation performed by a user on a touchscreen of the terminal device, the terminal device determines an object in an area corresponding to the first touch operation as a touch object, and the touchscreen has a fingerprint recognition function. The terminal device determines whether the touch object is included in a preset whitelist, and the whitelist includes at least one touch object that supports fingerprint authentication. If the touch object is included in the whitelist, the terminal device collects fingerprint information of the user by using the touchscreen. The terminal device performs fingerprint authentication by using the collected fingerprint information. | 2020-03-19 |
20200089858 | SYSTEMS AND METHODS FOR SECURE BIOMETRIC IDENTIFICATION USING RECORDED PRESSURE - Described herein are systems and methods for secure biometric identification using dynamic pressure sensing that are convenient and intuitive to use. Accurate identification is accomplished by using a set of finely spaced analog sensors that measure and output a dynamic pressure profile that is then evaluated based on data from a trained model. The model comprises a number of personal biometric characteristics that may be used to uniquely identify a person, e.g., for authentication purposes, such as granting access to sensitive, confidential information in connection with an electronic commercial transaction, an Internet of Things (IoT) device, an automotive device, an identity and access management (IAM), or a robotic or high functioning touch sensing device. | 2020-03-19 |
20200089859 | Method for Starting Up Device and Device - A device includes a power button and a fingerprint sensor, where the power button is integrated with the fingerprint sensor. A method is applied to a process in which a user presses the power button to start up the device. The method includes obtaining fingerprint information acquired by the fingerprint sensor, and saving the fingerprint information. The method further includes obtaining a fingerprint authentication request. The method further includes providing the fingerprint information to perform fingerprint authentication to log in to an operating system of the device. | 2020-03-19 |
20200089860 | ROBOTIC PROCESS AUTOMATION USING CONTROLLER EXECUTION MODEL - Systems, computer program products, and methods are described herein for implementing a robotic process automation using controller execution model. The present invention is configured to receive electronically, from a user computing device, a request to establish a communication link with a hosted virtual desktop (HVD) bot; determine a controller hosted virtual desktop (CHVD) hub associated with the HVD bot, wherein the CHVD hub comprises one or more HVD bots connected to the CHVD hub in a hub-and-spoke configuration, wherein the HVD bot is accessible only via the CHVD hub; receive one or more authentication credentials associated with the CHVD from an encrypted credential repository; validate the one or more authentication credentials associated with the CHVD, wherein validating further comprises authorizing the user computing device to access to the CHVD hub; and establish a communication link between the user computing device and the HVD bot, via the CHVD. | 2020-03-19 |
20200089861 | PACKAGING WITH AUTOMATIC AUTHENTICATION SYSTEM FOR PACKAGED PRODUCT - A product with packaging includes an envelope having a cavity. An envelope flap may be opened, and may initiate a smart packaging feature, such as an NFC chip embedded in the packaging. The NFC chip may search for an electronic device, such as the electronic device of the specific user, and once connected may initiate or carry out an authentication process or activation process. | 2020-03-19 |
20200089862 | AUTHENTICATION USING EMOJI-BASED PASSWORDS - An application platform may receive an input from a user associated with a user account. The input may relate to a request for access to the user account, and include a selection of emojis or images. The application platform may identify text strings associated with the emojis or images, where each text string may correspond to a respective emoji or image. The application platform may perform an action to generate a combined text string based on the text strings, and process the combined text string to derive an output value after performing the action. The application platform may determine whether the output value corresponds to a particular value after processing the combined text string, and authenticate the user to permit the user to access the user account based on determining whether the output value corresponds to the particular value. | 2020-03-19 |
20200089863 | USER AUTHENTICATION - A method, computer system, and computer program product for authenticating a user is provided. The method includes the steps of receiving a user input via a pressure-sensitive input interface, the user input being indicative of a possible component part of an authentication code or pattern, determining a pressure applied to the pressure-sensitive input interface by the user when providing the user input, determining whether to ignore the user input as a component part of the authentication code or pattern based on the pressure applied and irrespective of the whether the user input is determined to be ignored, providing an input acknowledgement signal to an output interface for indicating the user input was received. An associated apparatus is also included. | 2020-03-19 |
20200089864 | METHOD FOR LOGGING IN TO SYSTEM - A method for logging in to a system is provided in which a mobile terminal is provided with a function to create a high-density two-dimensional code, access information for accessing an electronic chart system and a time stamp are recorded in the high-density two-dimensional code, the high-density two-dimensional code is deformed, generated and displayed in synchronism with time information of the time stamp, and a high-density two-dimensional code generated by a high-density two-dimensional code authentication read scanner is read, whereby logging in to the electronic chart system becomes possible while taking security into consideration. | 2020-03-19 |
20200089865 | ACCELERATOR ACCESS CONTROL - Accelerator access control whereby an application's access to an accelerator is revoked in order to allow the system to perform a system function. In one or more embodiments, when an application is executing, a credit system is utilized to provide credits for controlled access to the accelerator. When request information is received to remove access to a credit associated with the application's access to the accelerator, the credit is marked to fail with operating system interfaces. Also, in one or more embodiments, if the credit is in use for accessing the accelerator, an effective address associated with the credit is unmapped from the accelerator. | 2020-03-19 |
20200089866 | METHODS AND APPARATUSES FOR VALIDATING SUPPLY CHAIN FOR ELECTRONIC DEVICES USING SIDE-CHANNEL INFORMATION IN A SIGNATURE ANALYSIS - Some embodiments described herein include a method to validate supply chains for electronic devices using side-channel information in a signature analysis. The method includes sending, to a target device, a first signal associated with a set of codes to be executed by the target device, and then receiving first side-channel information associated with the target device in response to the target device executing the set of codes. The method also includes determining second side-channel information associated with a simulated device in response to the set of codes. The method further includes comparing a discriminatory feature of the first side-channel information with a discriminatory feature of the second side-channel information to determine a characteristic of the target device based on a pre-determined characteristic of the simulated device. Finally, the method includes sending, to a user interface, a second signal associated with the characteristic of the target device. | 2020-03-19 |