18th week of 2022 patent applcation highlights part 56 |
Patent application number | Title | Published |
20220138234 | SYNONYM DISCOVERY - Methods, systems, and computer-readable media are provided for facilitating mapping of semantically similar terms between and among two or more information systems. In particular, to facilitate automatic discovery, establishment, and/or statistical validation of linkages between a plurality of different nomenclatures employed by a plurality of information systems, such as multiple electronic health record systems. In embodiments, the imputation of latent synonymy in corpora comprised of samples of historical records from each system enables automated terminology mapping between disparate systems' records, thereby establishing reliable linkages that may subsequently be utilized for realtime decision support, data mining-based research, or other valuable purposes. | 2022-05-05 |
20220138235 | CONFIDENCE SCORING OF GEOCODER RESULTS IN COMPUTER-BASED NAVIGATION - In one aspect, a method comprises identifying a set of main components of an address that have a highest importance for a specified geography are identified. The method comprises providing a geocoding database comprising a dataset of geocoded addresses of a geocoder. The method comprises receiving a set of responses from the geocoding database, wherein each response comprises a geocoded addresses of the geocoding database. The method comprises breaking each response into a set of components. The method comprises, based on the set of components, matching the address and each response in the set of components; based on the match, calculating a string similarity score and a component match score of each response between the address and each response. The method comprises sorting the responses based on the string similarity score of each response and the component match score of each response. The method comprises selecting a first response of the set of responses after sorting as the best response. The method comprises calculating a confidence score of the first response, wherein the confidence score is calculated using a formula which depends on the string similarity score and the component match score of the first response. | 2022-05-05 |
20220138236 | Geofence Information Delivery Systems and Methods - The present invention is directed to methods and systems for querying a database of geofences. A method for querying a database of geofences in the present invention includes generating at a device a first request comprising an Internet Protocol address, converting the IP address to a geographic location, identifying one or more geofences associated with the geographic location, and creating a first response to the first request wherein the first response comprises information describing the one or more geofences. | 2022-05-05 |
20220138237 | SYSTEMS, DEVICES, AND METHODS FOR CONTENT SELECTION - Disclosed are systems, methods, and computer-readable storage media to present content on an electronic display. In one aspect, a method includes identifying a first candidate content and a second candidate content for presentation on an electronic display, determining a first probability and a second probability that the first candidate content and the second candidate content respectively will elicit a particular type of input response, determining a first weight and a second weight based on the first probability and the second probability respectively, selecting either the first content or the second content based on the first weight and the second weight; and presenting the selected content on the electronic display. | 2022-05-05 |
20220138238 | MASSIVE SCALE HETEROGENEOUS DATA INGESTION AND USER RESOLUTION - This disclosure relates to data association, attribution, annotation, and interpretation systems and related methods of efficiently organizing heterogeneous data at a massive scale. Incoming data is received and extracted for identifying information (“information”). Multiple dimensionality reducing functions are applied to the information, and based on the function results, the information are grouped into sets of similar information. Filtering rules are applied to the sets to exclude non-matching information in the sets. The sets are then merged into groups of information based on whether the sets contain at least one common information. A common link may be associated with information in a group. If the incoming data includes the identifying information associated with to the common link, the incoming data is assigned the common link. In some embodiments, incoming data are not altered but assigned into domains. | 2022-05-05 |
20220138239 | TEXT GENERATION APPARATUS, TEXT GENERATION METHOD, TEXT GENERATION LEARNING APPARATUS, TEXT GENERATION LEARNING METHOD AND PROGRAM - A sentence generation device has: an estimation unit for receiving input of a first sentence and an output length, and estimating importance of each word constituting the first sentence using a pre-trained model; and a generation unit for generating a second sentence based on the importance, and thus makes it possible to evaluate importance of a constituent element of an input sentence, in correspondence with a designated output length. | 2022-05-05 |
20220138240 | SOURCE CODE RETRIEVAL - A method may include obtaining training code and extracting features from the training code. The extracted features of the training code may be mapped to natural language code vectors by a deep neural network. A natural language search query requesting source-code suggestions may be received, and the natural language search query may be mapped to a natural language search vector by the deep neural network. The method may include mapping the natural language search query to the natural language search vector in the same or a similar method as mapping the extracted features of the training code to natural language code vectors, and the natural language search vector may be compared to the natural language code vectors. Source code responsive to the natural language search query may be suggested based on the comparison between the natural language search vector and the natural language code vectors. | 2022-05-05 |
20220138241 | User-Focused, Ontological, Automatic Text Summarization - The present disclosure is directed to systems and methods of providing systems and methods of autonomously generating summary documents based, at least in part, on a plurality of queries provided by a system user. The systems and methods disclosed herein include processor circuitry to identify a plurality of information sources for a specific topic guided by an ontology with specific concepts and relations. The systems and methods disclosed herein also include processor circuitry to generate user-focused extractive text summarization from each of at least some of the plurality of identified information sources using a plurality of queries supplied by the user/researcher. | 2022-05-05 |
20220138242 | CONTENT MANAGEMENT SYSTEMS PROVIDING AUTOMATED GENERATION OF CONTENT SUMMARIES - Systems for generating content summaries in a web content management service, wherein in one embodiment a digital page editor and a component browser are launched to enable selection of a first content item. A summary of the first content item is automatically generated according to parameters that may have default values or values set by a user. The parameters may specify a size for the summary as a percentage of the first content item's size, as a particular number of lines, characters or words, as a size for a particular type of device, etc. The automatically generated summary is provided to the digital page editor, which can edit it and add it to the digital page. The summary is stored in a content repository as an independent summary content item with its own metadata. | 2022-05-05 |
20220138243 | PERSONALIZING UNSTRUCTURED DATA ACCORDING TO USER PERMISSIONS - A system and method provide unstructured data to a client device based on permissions possessed by the device user and required by the data for access. Items of unstructured data stored in a data storage device are organized into data segments based on classifications assigned to them by their creators using a content management system. When a user later requests access to the data via a cloud-based service, such as a search service, the user privileges are converted into data segment identifiers which are then searched, and only the items of unstructured data that correspond to matching identifiers are returned. Data segment identifiers may be provided illustratively as a hash function to facilitate searching and to guarantee non-collision of data segment identifiers. | 2022-05-05 |
20220138244 | MEDIUM RECOMMENDATION SYSTEM, TABLE CREATION SYSTEM, MEDIUM RECOMMENDATION DEVICE, AND TABLE CREATION METHOD - One or more embodiments of the invention is a medium recommendation system for recommending media or sets of media in a game that proceeds as a user selects media from a possessed medium group constructed to include D media and places the media in a game field, the recommended media or sets of media being media or sets of media to be added to a medium in order to construct at least a portion of the possessed medium group from the medium, the medium recommendation system including: an input acceptance unit that accepts the input of a single medium among the T kinds of media; a table storage unit that stores first tables; and a medium recommendation unit that is capable of outputting, as recommendation information, media or sets of media with which the single medium accepted by the input acceptance unit is associated in the first tables. | 2022-05-05 |
20220138245 | SYSTEM AND METHOD TO AUTOMATICALLY CREATE, ASSEMBLE AND OPTIMIZE CONTENT INTO PERSONALIZED EXPERIENCES - A method and system provide the ability to personalize a digital channel. Multiple content assets are obtained and include an image content associate. Each of the assets is associated with an associated set of semantic elements. The multiple content assets are clustered into content clusters based on a similarity of the semantic elements. A first content asset is selected. The clustering is used as a metric to estimate distances between the first content asset and remaining multiple content assets. The remaining multiple content assets are scored based on the distances. One of the remaining multiple content assets is selected based on the scoring and provided for a personalized component of the digital channel. In addition, a coverage map that includes both users and content may be generated based on the clusters and then utilized to select the content asset. | 2022-05-05 |
20220138246 | PHOTOGRAPH CONTENT CLUSTERING FOR DIGITAL PICTURE FRAME DISPLAY - A method for automated routing of pictures taken on mobile electronic devices to a digital picture frame including a camera integrated with the frame, and a network connection module allowing the frame for direct contact and upload of photos from electronic devices or from photo collections of community members. The integrated camera is used to automatically determine an identity of a frame viewer and can capture gesture-based feedback. The displayed photos are automatically shown and/or changed according to the detected viewers. The photos can be filtered and cropped at the receiver side. Clustering photos by content is used to improve display and to respond to photo viewer desires. | 2022-05-05 |
20220138247 | TEXT ADJUSTED VISUAL SEARCH - Embodiments of the technology described herein, provide improved visual search results by combining a visual similarity and a textual similarity between images. In an embodiment, the visual similarity is quantified as a visual similarity score and the textual similarity is quantified as a textual similarity score. The textual similarity is determined based on text, such as a title, associated with the image. The overall similarity of two images is quantified as a weighted combination of the textual similarity score and the visual similarity score. In an embodiment, the weighting between the textual similarity score and the visual similarity score is user configurable through a control on the search interface. In one embodiment, the aggregate similarity score is the sum of a weighted visual similarity score and a weighted textual similarity score. | 2022-05-05 |
20220138248 | SYSTEMS AND METHODS FOR FILE ARCHIVING - Systems and methods for file archiving. The systems may obtain an image file to be transmitted that includes image data in a first format and a metadata file in a second format. The metadata file may include identification information of the image data. The image data may be acquired from a scan of a subject using an imaging device. The systems may transmit, according to a first protocol, the image data in the first format to an image archiving system for archiving. The systems may also transmit, according to a second protocol, the metadata file in the second format to the image archiving system for archiving. | 2022-05-05 |
20220138249 | IDENTIFYING AND PROVIDING DIGITAL IMAGES DEPICTING HUMAN POSES UTILIZING VISUAL INTERACTIVE CONTENT SEARCH AND VIRTUAL MANNEQUINS - The present disclosure relates to systems, methods, and non-transitory computer readable media for accurately, efficiently, and flexibly identifying and providing digital images of human figures in poses corresponding to a query pose. In particular, the disclosed systems can provide multiple approaches to searching for and providing pose images, including identifying a digital image depicting a human figure in a particular pose based on a query digital image that depicts the pose or identifying a digital image depicting a human figure in a particular pose based on a virtual mannequin. Indeed, the disclosed systems can provide a manipulable virtual mannequin that defines a query pose for searching a repository of digital images. Additionally, the disclosed systems can generate and provide digital pose image groups by clustering digital images together according to poses of human figures within a pose feature space. | 2022-05-05 |
20220138250 | METHOD, SYSTEM, AND DEVICE OF VIRTUAL DRESSING UTILIZING IMAGE PROCESSING, MACHINE LEARNING, AND COMPUTER VISION - A computerized method, system and computer program product may comprise: generating or receiving a search result in response to a user query by a user that searches for an item, the search result depicting the item; and modifying the search result by generating a combination image that depicts user-defined subject matter engaging with the item. The present invention may provide other and/or additional benefits or advantages. | 2022-05-05 |
20220138251 | PARALLEL PREDICTION OF MULTIPLE IMAGE ASPECTS - Example embodiments that analyze images to characterize aspects of the images rely on a same neural network to characterize multiple aspects in parallel. Because additional neural networks are not required for additional aspects, such an approach scales with increased aspects. | 2022-05-05 |
20220138252 | IMAGE SEARCHES BASED ON WORD VECTORS AND IMAGE VECTORS - A mobile device hosts an artificial intelligence model trained for text-based image searches. Images associated with an image album of the mobile device are indexed by generating, based on the artificial intelligence model, image vectors from the images and word vectors from the image vectors. In response to user input that includes text representing a keyword search, a word vector is generated from the text based on the artificial model. A match is determined between the word vector and one or more of the word vectors to generate a search result that identifies one or more images corresponding to the one or more word vectors. The mobile device displays the search result on a user interface. | 2022-05-05 |
20220138253 | SYSTEMS AND METHODS FOR SCREENSHOT LINKING - Systems and methods of the present disclosure are directed to analyzing screenshots A system can include a computing device including a processor coupled to a memory and a display screen configured to display content. The system can include an application stored on the memory and executable by the processor. The application can include a screenshot receiver configured to access, from storage to which a screenshot of the content displayed on the display screen captured using a screenshot function of the computing device is stored, the screenshot including an image and a predetermined marker. The application can include a marker detector configured to detect the predetermined marker included in the screenshot. The application can include a link identifier configured to identify, using the predetermined marker, a link to a resource mapped to the image included in the screenshot, the resource accessible by the computing device via the link. | 2022-05-05 |
20220138254 | SYSTEMS AND METHODS FOR SCREENSHOT LINKING - Systems and methods of the present disclosure are directed to analyzing screenshots A system can include a computing device including a processor coupled to a memory and a display screen configured to display content. The system can include an application stored on the memory and executable by the processor. The application can include a screenshot receiver configured to access, from storage to which a screenshot of the content displayed on the display screen captured using a screenshot function of the computing device is stored, the screenshot including an image and a predetermined marker. The application can include a marker detector configured to detect the predetermined marker included in the screenshot. The application can include a link identifier configured to identify, using the predetermined marker, a link to a resource mapped to the image included in the screenshot, the resource accessible by the computing device via the link. | 2022-05-05 |
20220138255 | PLAYLIST ANALYTICS - A method includes logging first user interactions associated with a playlist of content items and generating first metrics based on the logged first user interactions with the playlist. The first metrics include a first metric indicating a first duration of playback of a first content item of the playlist during playback of the playlist. The first duration of playback of the first content item during the playback of the playlist is greater than a first default duration of playback. The method further includes reporting at least the first metric to a creator or curator of the playlist, logging second user interactions associated with the playlist, and generating second metrics based on the logged second user interactions with the playlist. The logged first user interactions correspond to more deviations from a default playback sequence of the playlist than the logged second user interactions. | 2022-05-05 |
20220138256 | COGNITIVELY RENDERED EVENT TIMELINE DISPLAY - Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can be used to determine a level of significance of an event in a database of events based on context. Embodiments of the present invention can, in response to the determined level of significance of the event reaching a threshold value for significance, generate a visual representation of the event in the database of events. Embodiments of the present invention can also be used to integrate the generated visual representation of the event into a user display. | 2022-05-05 |
20220138257 | SYSTEM AND METHOD FOR JOURNEY RECORDING - A journey recording system, the journey recording system comprising a processing circuitry configured to: obtain (a) user journey information of a plurality of user journeys, each performed in a respective session within a website or a computerized application, each of the user journeys including information of a respective series of actions made by a corresponding user, within the website or the computerized application, in order to achieve a goal, (b) a user identifier associated with the corresponding user, and (c) one or more properties of the respective session; upon two or more of the sessions having (a) respective user identifiers that meet a first criterion, and (b) at least one respective property that meet a second criterion, determine that the two or more sessions are part of a multi-session journey; and associate the two or more journeys with a common multi-session identifier. | 2022-05-05 |
20220138258 | IDENTIFICATION OF EMERGING CLUSTERS - A system and method to generate and manage clusters of search terms. A cluster generation process is executed at a first time to generate a first set of clusters including respective sets of search terms. At least one of a first value of a first parameter associated with the first set of clusters or a first value of a second parameter associated with the first set of clusters is determined. At a second time, the cluster generation process is executed to generate a second set of clusters. At least one of a second value of the first parameter associated with the second set of clusters or a second value of the second parameter associated with the second set of clusters is determined. A determination is made whether either the second value of the first parameter satisfies a first condition or the second value of the second parameter satisfies a second condition. The system and method identify an emerging cluster within the second set of clusters in response to satisfaction of either the first condition or the second condition. Information identifying the emerging cluster is displayed via a user interface. | 2022-05-05 |
20220138259 | AUTOMATED DOCUMENT INTAKE SYSTEM - Systems, methods, and articles for performing document intake, such as intake of legal documents. The systems disclosed herein receive pages of documents, automatically group the pages to identify documents in a legal matter, and automatically update a status of the legal matter based on the identified documents. This is achieved by one or more of receiving a file which contains one or more pages, grouping the pages, determining a document type for each group, obtaining a plurality of phases for a legal matter, assigning a phase to each group, and organizing the groups based on the assigned phase for each group. | 2022-05-05 |
20220138260 | METHOD, APPARATUS, AND SYSTEM FOR ESTIMATING CONTINUOUS POPULATION DENSITY CHANGE IN URBAN AREAS - An approach is disclosed for estimating population density change where dynamic signals are not available or are not dense enough to be representative. The approach involves, for example, determining map features of a first map space. The approach also involves identifying partitions of the first map space based on the identified partitions (i) having features that are substantially similar, and (ii) having respective change functions that are substantially similar. The approach further involves determining an estimated change function based on one or more of the respective change functions that are substantially similar and that are associated with the first map space. The approach further involves using the estimated change function for at least one partition of a second map space based on the at least one partition of the second map space and at least one map partition of the first map space having map features that are substantially similar. | 2022-05-05 |
20220138261 | HYBRID GRAPH AND RELATIONAL DATABASE ARCHITECTURE - Aspects of the disclosure relate to searching a dual database graph. The dual database graph is resident on a dual database graph platform. The platform includes two or more nodes interconnected by one or more edges. The graph database stores graph data corresponding to the graph(s) and a relational database for storing metadata corresponding to the graph(s). The method includes receiving as input a search criterion. The search criterion may include a plurality of data points corresponding to a relational database node profile or a relational database subgraph profile. The platform may search the relational database for a subset of graphs that each includes a relational database node or a relational database subgraph that matches the node profile or subgraph profile of the search criterion. The platform may then retrieve a relational database node or a relational database subgraph that matches the node profile or subgraph profile. | 2022-05-05 |
20220138262 | TECHNIQUES TO GENERATE AND STORE GRAPH MODELS FROM STRUCTURED AND UNSTRUCTURED DATA IN A CLOUD-BASED GRAPH DATABASE SYSTEM - Embodiments include systems, methods, articles of manufacture, and computer-readable media configured process data in a structured format and an unstructured format and applying one or more algorithms to detect elements and links between the elements in the data. Embodiments are further configured to generate a graph model comprising nodes comprising the elements and edges comprising the links. | 2022-05-05 |
20220138263 | ADVICE PRESENTATION SYSTEM - An advice presentation system that combines functions of a terminal such as a smartphone, advice data such as famous or wise sayings that have been stored in a database, and functions such as a communications channel together, and provides appropriate advice according to the emotions of a user at that time. Firstly, emotion-related data pertaining to the emotions of the user is entered from the terminal. The advice presentation system connects to a web server via Internet connection, and emotion data corresponding to the entered emotion-related data is selected and extracted from an emotion database by using an emotion data selection means for an application server. At least one piece of advice data stored in an advice database is selected and extracted by an advice data selection means for the application server, on the basis of the selected emotion data. The selected advice data is sent to the terminal of the user, and famous or wise sayings, etc., are presented from an advice display means as advice data. | 2022-05-05 |
20220138264 | SYSTEM AND METHOD FOR GENERATING A RECOMMENDATION - A method of generating recommendations for a collective profile, the collective profile being linked to a first profile and a second profile. The method may include authenticating a login request from an end user device in association with the collective profile based on credentials associated with the first profile, identifying a query from among a plurality of queries and transmit the query to the end user device, receiving a response to the query, determining that the response is not inconsistent with one or more earlier responses received in association with the second profile and, in response, refining at least one attribute or goal in the collective profile based on the response to generate and store a refined collective profile, and determining whether the refined collective profile results in a new recommendation and, if so, outputting the new recommendation. | 2022-05-05 |
20220138265 | PROVIDING EFFICIENT GRAPHICAL USER INTERFACES FOR VISUALIZING LARGE DATASETS - The present disclosure relates to systems, non-transitory computer-readable media, and methods for efficiently providing a graphical user interface for visualizing large amounts of data on a single interface. In particular, in one or more embodiments, the disclosed systems utilize topic hierarchies and multidata display elements to intuitively present many types of data for many topics on a single interface. The system also uses an activatable timeline to visualize changes to large amounts of data over time. | 2022-05-05 |
20220138266 | LEARNING-BASED AUTOMATED MACHINE LEARNING CODE ANNOTATION WITH GRAPH NEURAL NETWORK - Obtain, at a computing device, a segment of computer code. With a classification module of a machine learning system executing on the computing device, determine a required annotation category for the segment of computer code. With an annotation generation module of the machine learning system executing on the computing device, generate a natural language annotation of the segment of computer code based on the segment of computer code and the required annotation category. Provide the natural language annotation to a user interface for display adjacent the segment of computer code. | 2022-05-05 |
20220138267 | GENERATION APPARATUS, LEARNING APPARATUS, GENERATION METHOD AND PROGRAM - A generation apparatus includes a generation unit configured to use a machine learning model learned in advance, with a document as an input, to generate a question representation for a range of an answer in the document, wherein when generating a word of the question representation by performing a copy from the document, the generation unit adjusts a probability that a word included in the range is copied. | 2022-05-05 |
20220138268 | STYLING A QUERY RESPONSE BASED ON A SUBJECT IDENTIFIED IN THE QUERY - User experience parameters are applied in formatting results to a query for presentation. The user experience parameters correspond to at least one particular subject related to the query. | 2022-05-05 |
20220138269 | IDENTIFICATION OF POTENTIALLY SENSITIVE INFORMATION IN DATA STRINGS - Methods for identifying potentially sensitive information and protecting such potentially sensitive information include scanning systems that collect and/or disseminate such information. Without limitation, systems collect and/or disseminate personal identification numbers (e.g., personal identification numbers, tax identification numbers, etc.), such as merchant systems, bank systems, healthcare systems, and the like, that collect, use, or disseminate sensitive information may be scanned to identify sequences of data that are likely to be sensitive, and may take actions to protect such sequences of data. Scanning and protection systems are also disclosed. | 2022-05-05 |
20220138270 | PROCESS AND SYSTEM FOR DATA TRANSFERRING AND MAPPING BETWEEN DIFFERENT APPLICATIONS - A method and system for efficiently and automatically moving electronic data from a source, such as a website, to a sink, such as an electronic document; and building, training, and updating the system is provided. Generally, the method uses a system that employs a template for a source that contains labels associated with particular subject matter type of data, and a stitch or electronic link that associate the labeled data to a specific sink. | 2022-05-05 |
20220138271 | Method, Device and Computer Program for Collecting Data From Multi-Domain - The present invention relates to a method for collecting data from a multi-domain in a data collection device. The method includes a step A of collecting data from a general web that is accessible through a search engine; a step B of collecting data from a dark web site that is not accessible with a general web browser and is accessible with preset specific software; and a step C of standardizing the collected data in a preset format and generating metadata for the collected data. | 2022-05-05 |
20220138272 | AUTOMATED ASSISTANCE FOR GENERATING RELEVANT AND VALUABLE SEARCH RESULTS FOR AN ENTITY OF INTEREST - Systems and methods are provided for identifying relevant information for an entity, referred to as a seed entity. A plurality of search queries can be generated each comprising a property of a seed entity or one of the entities associated with the seed entity (seed-linked entities). Preferably, a collection of search queries includes ones representing different properties of the seed entity and properties of different seed-linked entities. Optionally, the collection of search queries is optimized to reduce search burden. Searches can then be conducted with the search queries in one or more data sources to obtain a plurality of search results, wherein each search result comprises a hit entity and one or more entities associated with the hit entity (hit-linked entity). For each of the search results, a score can be determined taking as input (a) likelihood of match between the seed entity and the hit entity or between a seed-linked entity and a hit-linked entity, (b) presence of a new entity in the search result not present in the search queries or a difference between the new entity and an entity present in the search queries, and (c) characteristic of the new entity in the search result. Based on the scores, high priority search results can be presented a user for further analysis. | 2022-05-05 |
20220138273 | Customized Navigation Flow - Methods and systems as described herein may enable customized navigation flow for websites/applications. Navigation flows (e.g., the pages, user interfaces, views, etc. that are displayed to a user) may be customized for each user. Navigation parameters may be generated for a user and may indicate a customized navigation flow for the user. The navigation parameters may indicate one or more pages of a website/application and an order that each of the one or more pages should be displayed to the user. The navigation parameters may indicate a trigger for each page. A trigger may indicate an action and/or event that causes a change in display to the next page in the navigation flow. Navigation parameters may be shared between devices, which may enable the user to experience the same navigation flow across multiple websites/applications. | 2022-05-05 |
20220138274 | SYSTEM, METHODS AND COMPUTER PRODUCTS FOR DETERMINING AFFINITY TO A CONTENT CREATOR - Affinity scores are computed for a plurality of user accounts, each affinity score quantifies an affinity of a user account to a content creator of one or more digital objects hosted in a content hosting platform. Each affinity score is computed by collecting interaction data for the user account corresponding to the content creator, normalizing the collected interaction data using a total activity data of the user account on the content hosting platform and attribute data associated with the content creator, and generating the affinity score using the normalized interaction data. | 2022-05-05 |
20220138275 | DIGITAL SEARCH RESULTS GENERATION - A method, system, and computer program product for enabling a digital search is provided. The method includes monitoring, in response to receiving authorization from a user, Web search results of a user, social media accounts, and media sources. In response data indicating an importance of world related factors with respect to the user is received. The data is analyzed with respect to results of the monitoring and an associated metadata model and modeling software application personalized for the user is generated. A search request associated with initiating a Web search for a product or service is initiated and the modeling software application is executed with respect to the metadata model and Web search. Personalized Web search results are generated and presented to the user. The personalized Web search results indicate entities associated with providing the product or service for the user via Internet based commerce Websites. | 2022-05-05 |
20220138276 | GEO-BASED INFORMATION PROVISION, SEARCH AND ACCESS METHOD AND SOFTWARE SYSTEM - Method and system consist of a mobile application installed on a mobile device with internet connection and a geographical positioning device; a remote hosting server configured with software and database; an onsite wireless communication hosting apparatus. The mobile application communicates with the remote hosting server and the onsite wireless communication apparatus. The remote hosting server and onsite wireless communication apparatus communicate and transfer data to one another, the remote hosting server communicates with third party databases via secured access and retrieves location related information requested by onsite users of the mobile device. Web users at anywhere may select a location displayed on a digital map over interface of a web application configured to the remote hosting server; access the same as onsite users; including data entered by location owners, received from third-party databases via secured connection, and uploaded from onsite wireless communication apparatus. | 2022-05-05 |
20220138277 | Systems and Methods for Enhanced Networking, Conversion Tracking, and Conversion Attribution - The present disclosure provides systems and methods for electronically providing each of a plurality of content distributors with access to a library of content items, facilitating the selection of a combination of the content items, creating a unique set of links for each recipient-distributor combination, and distributing the selected content and unique links via one or more distribution channels to a plurality of recipients. As each link is associated with both a recipient and a distributor, conversion actions stemming from the selection of a link by a recipient are attributed to the proper distributor. Distributors can create content distribution approaches that can be shared with other distributors. | 2022-05-05 |
20220138278 | SYSTEM AND METHOD FOR URL FETCHING RETRY MECHANISM - A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved. | 2022-05-05 |
20220138279 | BROWSER BASED FEEDBACK FOR OPTIMIZED WEB BROWSING - The present invention relates to systems, apparatus, and methods of accelerating web transactions. One embodiment includes observing, with a web browser plug-in operating on a computer, at least a portion of a first web page transaction in a web browser operating on the computer. A web browser module may be used to identify transaction information from the observing of the at least a portion of the first web page transaction. The browser may communicate transaction information to a prefetching system in a communication separate from the first web page transaction; and the transaction information may be used to perform a prefetch operation. | 2022-05-05 |
20220138280 | Digital Platform for Trading and Management of Investment Securities - A stratified or segmented composite data structure can be formed by selecting a group of data entities, stratifying or segmenting them according to attributes, and assigning relative weights to the components based on their stratified or segmented positions. The attributes are selected from a universe of possible values. Further positive and negative biases can be applied at any arbitrary point or position, including to individual data entities, groups of arbitrarily selected data entities, or arbitrary positions. | 2022-05-05 |
20220138281 | ASSIGNING PROCESSING THREADS FOR MATRIX-MATRIX MULTIPLICATION - An apparatus includes a processor and a memory to store instructions. The instructions, when executed by the processor, cause the processor to perform threading of a first matrix along a first dimension of the first matrix and a second dimension of the matrix. The threading represents block sizes of the first matrix to assign to process threads of a multiplication algorithm to determine a third matrix that represents a product of the first matrix and a second matrix. The block sizes include a first block size along the first dimension and a second block size along the second dimension. The second matrix shares the second dimension with the first matrix. The instructions, when executed by the processor, cause the processor to provide data to the multiplication algorithm, which represents the first block size and the second block size. | 2022-05-05 |
20220138282 | COMPUTING DEVICE AND COMPUTING METHOD - A computing device includes processing circuitry and control circuitry. The processing circuitry computes an M×K-dimensional first output matrix being a product of an M×P-dimensional first input matrix and a P×K-dimensional second input matrix, computes an M×K-dimensional cumulative addition matrix by adding a first output matrix and an M×K-dimensional matrix to store the M×K-dimensional cumulative addition matrix in a cumulative register, compute an addition vector by adding each of M-dimensional cumulative addition vectors included in the cumulative addition matrix and an M-dimensional temporary vector to store the addition vector in each vector register, and output the temporary vector from an M-th one of the vector registers, and perform a vector operation to the output temporary vector to output an output vector. The control circuitry controls the computation instructions as to the computations. | 2022-05-05 |
20220138283 | Secure Content Access - Systems, apparatuses, and methods are described for causing output of content via an output device such as a casting device. The output device may be associated with a device identity token indicating an identity for the output device. Another computing device may obtain, based on the device identity token, an output authorization token indicating a content item and the identity of the output device. The output device may, based on the output authorization token, obtain authorization data for output of the content item. | 2022-05-05 |
20220138284 | METHOD OF OPERATING NEURAL NETWORK MODEL USING DRM PACKAGE AND METHOD OF PROCESSING DATA USING THE SAME - In a method of operating a neural network model, neural network model data and raw data are received during a non-secure mode. The neural network model data is encrypted by digital rights management (DRM). An operation mode is changed from the non-secure mode to a secure mode based on the receiving the neural network model data and the raw data. The neural network model is executed during the secure mode based on decrypted neural network model data that is obtained by decrypting the neural network model data encrypted by the DRM. The inference operation is performed on the raw data during the secure mode using the neural network model. | 2022-05-05 |
20220138285 | Pairing Devices to Prevent Digital Content Misuse - A method for preventing digital content misuse can include detecting, by a client-side computing device, that the client-side computing device is paired to a viewing device such that, after being paired, the client-side computing device can cause digital content received from a remote server to be presented on a display of the viewing device; after detecting that the client-side computing device is paired to the viewing device, detecting, by the client-side computing device, that the client-side computing device has been unpaired from the viewing device; and in response to detecting that the client-side computing device has been unpaired from the viewing device, executing a remedial action. | 2022-05-05 |
20220138286 | GRAPHICS SECURITY WITH SYNERGISTIC ENCRYPTION, CONTENT-BASED AND RESOURCE MANAGEMENT TECHNOLOGY - Systems, apparatuses and methods may provide for encryption based technology. Data may be encrypted locally with a graphics processor with encryption engines. The graphics processor components may be verified with a root-of-trust and based on collection of claims. The graphics processor may further be able to modify encrypted data from a non-pageable format to a pageable format. The graphics processor may further process data associated with a virtual machine based on a key that is known by the virtual machine and the graphics processor. | 2022-05-05 |
20220138287 | PUBLISHED CONTENT PROTECTION - A method, computer system, and a computer program product for published content protection is provided. The present invention may include receiving a content file from a content management system (CMS). The present invention may include extracting a feature from the received content file. The present invention may include transforming, using an adversarial generation algorithm, the received content file into an adversarial content file. The present invention may include returning the adversarial content file to the CMS. The returned adversarial content file may represent an equivalent of the received content file to a content consumer. The present invention may include preventing an application of the returned adversarial content file in at least one machine learning task based on the adversarial noise included in the returned adversarial content file. | 2022-05-05 |
20220138288 | COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATED COMPUTER SCRIPT ANALYSIS AND MALWARE DETECTION AND METHODS THEREOF - Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification. | 2022-05-05 |
20220138289 | System for Interactive Matrix Manipulation Control of Streamed Data - An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data sets can be included in a single stream. A rights management system controls matrix manipulation and other aspects of user control of the data, including one or more of rendering in various different 2D, 3D, or other media formats, reconstruction and modeling, zooming, frame grab, print frame, parental controls, picture in picture, preventing unauthorized copying, adapting to different data transmission formats, adapting to different resolutions and screen sizes, and actively control functionality contained in embedded data, encryption/decryption. Control can be exerted by an external entity through a user-side virtual machine. Control codes can optionally be embedded in the media, embedded in the user's device, and/or sent separately to the device. | 2022-05-05 |
20220138290 | METHOD AND SYSTEM FOR A SECURE TRANSACTION - The present invention herein relates to method and system for authenticating user, protecting user data, and resetting security code. One of the advantages of the present invention is the protection of data in transit to ensure a secure user authentication and user data protection both in transit and at rest. Another advantage of the present invention is through a new security code resetting method, user can be verified without the need of storing the user verification data in the platform. | 2022-05-05 |
20220138291 | RECURRING TOKEN TRANSACTIONS - A method is disclosed. The method includes receiving a communication comprising a real credential from a communication device and providing the real credential to a token computer. The token computer generates a token and a cryptogram, and the cryptogram is formed using a resource provider initiated transaction indicator. The method includes receiving, from the token computer, the token and the cryptogram, and transmitting, to a processing computer, an authorization request message comprising the token, the cryptogram, a resource provider identifier, and a transaction amount for a first transaction. The processing computer validates the cryptogram, exchanges the token for the real credential, stores the resource provider identifier, and forwards the authorization request message including the real credential, and the transaction amount to an authorizing entity computer. The method also includes receiving an authorization response message from the authorizing entity computer. | 2022-05-05 |
20220138292 | Bayesian Continuous User Authentication - Bayesian continuous user authentication can be obtained by receiving observed behavior data that collectively characterizes interaction of an active user with at least one computing device or software application. A sequence of events within the observed behavior data can be identified and scored using a universal background model that generates first scores that characterize an extent to which each event or history of events is anomalous for a particular population of users. Further, the events are scored using a user model that generates second scores that characterizes an extent to which each event or history of events is anomalous for the particular user who owns the account. The first scores and the second scores are smoothed using a smoothing function. A probability that the active user is the account owner associated with the user model is determined based on the smoothed first scores and the smoothed second scores. | 2022-05-05 |
20220138293 | SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON PASSIVE BIOMETRICS - A computer-implemented method is disclosed. The method includes: receiving, via an input interface associated with an electronic device, a first user input; identifying a first device class based on a current usage mode of the electronic device and a first set of device property values associated with the current usage mode of the electronic device; obtaining normalized values of input features associated with the first user input, the input feature values being normalized based on representative device property values that are defined for the first device class; and performing authentication of a user of the electronic device based on the normalized input feature values associated with the first user input. | 2022-05-05 |
20220138294 | SYSTEMS AND METHODS FOR A CONFIGURABLE DEVICE ENVIRONMENT - A system for a configurable device environment, the system comprising a computing device configured to receive remote data corresponding to a subject and a plurality of signals from at least a sensor proximate to the subject, retrieve a biometric profile of the subject, identify a pattern of accessory device states for a plurality of accessory devices, wherein identifying includes determining a coordinated state change for a group of accessory devices of the plurality of accessory devices as a function of the remote data and the biometric profile and identifying the pattern of accessory device states as a function of the coordinated state change, determine an automation rule for the group of accessory devices as a function of the pattern of accessory device states, and transmit, to the group of accessory devices, the automation rule. | 2022-05-05 |
20220138295 | CHALLENGE-RESPONSE METHOD FOR BIOMETRIC AUTHENTICATION - A biometric authentication method is provided. In the method, identification information is collected from a user. A biometric scanner is used to scan a particular biometric characteristic of the user. If the user identification corresponds to the scanned biometric characteristic, then the scanner requests the user perform a predetermined action of a portion of the user's body. The predetermined action may be, for example, a hand gesture. The biometric characteristic is monitored while the predetermined action is being scanned. The scanner determines that the predetermined action is performed with the same portion of the user's body that was scanned for the biometric characteristic. The scanner determines if the portion of the user's body leaves the scanning area and monitors the scanning area for extraneous objects. The method provides more resistance against a replay attack. | 2022-05-05 |
20220138296 | ACCESS AUTHENTICATION IN AI SYSTEMS - Access authentication in an artificial intelligence system includes perceiving electronically with a first user's artificial intelligence voice response system (AIVRS) a physical presence of a second user. A voice request is generated by the first user's AIVRS and conveyed to a second user requesting access to a knowledge corpus stored by an AIVRS of the second user. Based on a voice response of the second user, the first user's AIVRS instantiates an electronic communications session with the second user's AIVRS. The session is initiated via an electronic communications connection with a portable device of the second user. Selected portions of the knowledge corpus are retrieved by the first user's AIVRS from the second user's AIVRS, the portions selected based on the voice response. An action by one or more IoT devices is initiated in response to a voice prompt interpreted by the first user's AIVRS based on the selected portions. | 2022-05-05 |
20220138297 | BIOMETRIC INPUT DEVICE - In an example implementation according to aspects of the present disclosure, an input device of a plurality of input switches, a plurality of biometric sensors integrated into each of the plurality of input switches and a processor. The processor configured to receive an indication from a first input switch. The processor receives a biometric data collected by one of the biometric sensors. The processor determines whether the received indication corresponds with a first state in a predetermined sequence. The processor determines whether the biometric data corresponds with as second state in a predetermined biometric data sequence. The processor authenticates the user based on the first and second states. | 2022-05-05 |
20220138298 | DEVICE AND SYSTEMS FOR STRONG IDENTITY AND STRONG AUTHENTICATION - Verifying identity of a person using remote communication (e.g., Internet) is difficult because images of identity documents can be fraudulent or copied and distributed to adversaries without the person's permission. A user device and a server use facial scanning to verify identity of a person and to provide strong authentication. The user device captures a scanned image of an identity document (e.g., a driver license, a passport, a credential document, etc.) extracts the photo of the person from the identity document. The user device also captures an image of the person's face (e.g., a selfie photo) and compares this image with the extracted photo from the identity document. If the faces match, then the person's identity is verified. The verification of the identity and a related action (e.g., registration of the person, logging into a system, etc.) are authenticated using strong authentication such as Fast Identity Online (FIDO) authentication. | 2022-05-05 |
20220138299 | AMBIENT COOPERATIVE INTELLIGENCE SYSTEM AND METHOD - A method, computer program product, and computing system for detecting the issuance of a verbal command by a requester to a virtual assistant; authenticating that the requester has the authority to issue the verbal command to the virtual assistant; if the requester is authenticated, allowing the effectuation of the verbal command to the virtual assistant; and if the requester is not authenticated, preventing the effectuation of the verbal command to the virtual assistant. | 2022-05-05 |
20220138300 | DETECTING APNEIC EPISODES VIA BREATHING ANALYSIS BY CORRELATION TO ENVIRONMENTAL CONDITIONS AND BIOFEEDBACK - A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software. | 2022-05-05 |
20220138301 | USER IDENTITY AUTHENTICATION USING VIRTUAL REALITY - A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (VR) scenario of a VR application for initiating a service, identifying, using one or more sensors communicably coupled to the VR device, one or more interactive operations of a user of the VR device with the one or more virtual elements, determining whether the one or more interactive operations match one or more predetermined operations for selecting the one or more virtual elements to initiate the service and trigger biometric authentication for user identity authentication, invoking biometric authentication if the one or more interactive operations match one or more predetermined operations, presenting a virtual guidance in the VR scenario for guiding the user to perform the biometric authentication, and presenting a service interface to the user if the biometric authentication is successful. | 2022-05-05 |
20220138302 | SECURING COMPOSITE OBJECTS USING DIGITAL FINGERPRINTS - A system comprises a combination of digital fingerprint authentication techniques, processes, programs, and hardware to facilitate highly reliable authentication of a wide variety of composite physical objects. “Composite” in this case means that there are distinct regions of the object that must be authenticating individually and in tandem to authenticate the entire object. Preferably, a template is stored that defines for a class of objects what regions must be found, their locations, optionally semantic content of the regions, and other criteria. digital fingerprinting is utilized to locate and attempt to match candidate regions by querying a database of reference object records. | 2022-05-05 |
20220138303 | Certificate Management in a Technical Installation - A control system for a technical installation includes a certification body, first and second installation components, wherein the certification body issues/revokes certificates for the first and second installation components, where a certificate revocation list service receives from the certification body a certificate revocation list having certificates already revoked by the certification body and provides the certificate revocation list to the components, a certificate revocation list distribution service implemented on the first and second installation components receives the certificate revocation list from the certificate revocation list service and stores the certificate revocation list in a storage device of the respective installation component, and where the certificate revocation list distribution service of an installation component additionally in each case connects to the certificate revocation list distribution service on another installation component and receives the certificate revocation list from this certificate revocation list distribution service on the other component. | 2022-05-05 |
20220138304 | USER AUTHENTICATION - In an example there is provided a method of authenticating a user. An authentication challenge is received in response to a request to authenticate a user. The challenge is distributed to each device from a subset of a set of registered devices. At each device a share of an authentication token is accessed and a partial response to the challenge is generated based on an authentication token and challenge. A response to the challenge is generated by combining the partial responses from the subset of devices, and is communicated to an authenticator. The user is authenticated when the subset of devices is an authorised subset. Every authorised subset of the set of registered devices comprises at least one device from the first group of devices. | 2022-05-05 |
20220138305 | AUTHENTICATION OBJECT, AUTHENTICATION SYSTEM, AND AUTHENTICATION MEDIUM PRODUCTION METHOD - [Problem] To easily and accurately perform authentication at low cost. | 2022-05-05 |
20220138306 | OFFLINE MULTI-FACTOR ONE-TIME PASSWORD AUTHENTICATION - A server may encrypt an authentication signal using a public encryption key (e.g., a public encryption key that was generated together with a private encryption key stored on a user device pre-registered with the server). The server passes the encrypted authentication signal to a user agent (e.g., such as the web browser) and the user agent encodes the encrypted authentication signal into a machine-readable optical label. The user agent displays the machine-readable optical label for scanning by the user device. Accordingly, the user device may be unlocked by a user (e.g., using an unlock password or an unlock gesture), and the user device may scan the machine-readable optical label, decode the encrypted authentication signal encoded in the machine-readable optical label, decrypt the decoded authentication signal that was encrypted by the server, and generate an authentication code based on the decrypted authentication signal. | 2022-05-05 |
20220138307 | Automated Mobile Device Staging System - A method of staging mobile computing devices includes, at a computing device: receiving a staging request from a mobile computing device in response to insertion of the mobile computing device in a network-connected charging rack; selecting a source of staging data to fulfill the staging request; sending a source identifier of the selected source of staging data to the mobile computing device; and in response to sending the source identifier of the selected source of staging data, sending an access control command to the network-connected charging rack to lock the mobile computing device in the charging rack. | 2022-05-05 |
20220138308 | ELECTRONIC DEVICE AND CONTROL METHOD - An electronic device includes an authentication unit and a control unit. The authentication unit performs an authentication communication with an external device for determining whether or not the external device is a predetermined device. The control unit requests a second power that is greater than a first power from the external device, in a case where the external device is determined to be the predetermined device and the external device is determined to be a no-additional-cable-required type of power supply device. | 2022-05-05 |
20220138309 | SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE - Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components. | 2022-05-05 |
20220138310 | Keystroke Cipher Password Management System and Method - A system and a method of protecting master passwords from technicians/employees that need access to at least one of the security systems such as an access control, a CCTV/surveillance system, burglar alarm and fire alarm system on a network with no internet access is provided in the present disclosure. The method includes creating a ciphered version of a master password for a user i.e., encrypting the ciphered password and creating an encryption key on a password management server, transmitting the ciphered password to a Smartphone application on a user device by securely authenticating the user on the Smartphone application. Further, transferring the ciphered password and the encryption key to an Intelligent USB Drive via using Bluetooth® by securely authenticating the USB Drive with the user device and then connecting the USB drive to the security system via USB port or GUI interface, where the user inputs or inserts the USB carrying the ciphered password and the encryption key, to access the security system. | 2022-05-05 |
20220138311 | SYSTEMS AND METHODS FOR DETECTING AND MITIGATING CODE INJECTION ATTACKS - The present disclosure generally relates to computer security and malware protection. In particular, the present disclosure is generally directed towards systems and methods for detecting and mitigating a code injection attack. In one embodiment the systems and methods may detect a code injection attack by scanning identified sections of memory for non-operational machine instructions (“no-ops”), detecting a code injection attack based on the scan(s) and mitigating the code injection attack by taking one or more defensive actions. | 2022-05-05 |
20220138312 | PROCESSING TRANSACTIONS INVOLVING CARD READER DEVICES CONTAINERIZED EXECUTION OF CODE - A method and apparatus for executing code in a container are described. In one embodiment, the method comprises generating code on a host computer system using a user interface; and executing the code inside a container on the host computer system, including performing access control based on one or more properties of the host computer system. | 2022-05-05 |
20220138313 | Software Verification of Dynamically Generated Code - In an embodiment, dynamically-generated code may be supported in the system by ensuring that the code either remains executing within a predefined region of memory or exits to one of a set of valid exit addresses. Software embodiments are described in which the dynamically-generated code is scanned prior to permitting execution of the dynamically-generated code to ensure that various criteria are met including exclusion of certain disallowed instructions and control of branch target addresses. Hardware embodiments are described in which the dynamically-generated code is permitted to executed but is monitored to ensure that the execution criteria are met. | 2022-05-05 |
20220138314 | AUTOMATED GENERATION OF A SANDBOX CONFIGURATION FOR MALWARE DETECTION - A method that automatically generates blacklists for a sandbox application. The method first obtains a set of disassembled operating system (OS) dynamic-link libraries (DLLs) and then identifies application programming interfaces (API) functions that have respective kernel interruptions. The identified API functions that have kernel instructions are saved to an interrupt list. Based on the interrupt list, a processor generates a blacklist that includes for each of the DLLs, the identified API functions in the interrupt list, all API functions that directly or indirectly invoke one of the identified API functions in the interrupt list via one or more nested API functions. The method outputs the blacklist to the sandbox application that operates on a sample file to emulate API functions of the sample file that match the blacklist. All other APIs not identified as being blacklisted, are then considered whitelisted and are allowed to run natively. | 2022-05-05 |
20220138315 | PROTECTION METHOD, COMPUTER PROGRAM PRODUCT AND ASSOCIATED SYSTEMS - A method for protecting the execution of a software module having at least one protected function, the method including:
| 2022-05-05 |
20220138316 | CHARACTERIZING SUSCEPTIBILITY OF A MACHINE-LEARNING MODEL TO FOLLOW SIGNAL DEGRADATION AND EVALUATING POSSIBLE MITIGATION STRATEGIES - The disclosed embodiments relate to a system that characterizes susceptibility of an inferential model to follow signal degradation. During operation, the system receives a set of time-series signals associated with sensors in a monitored system during normal fault-free operation. Next, the system trains the inferential model using the set of time-series signals. The system then characterizes susceptibility of the inferential model to follow signal degradation. During this process, the system adds degradation to a signal in the set of time-series signals to produce a degraded signal. Next, the system uses the inferential model to perform prognostic-surveillance operations on the set of time-series signals with the degraded signal. Finally, the system characterizes susceptibility of the inferential model to follow degradation in the signal based on results of the prognostic-surveillance operations. | 2022-05-05 |
20220138317 | Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters - Aspects of the disclosure relate to detecting and protecting against cybersecurity attacks using unprintable tracking characters. A computing platform may receive a character-limited message sent to a user device. Subsequently, the computing platform may detect that the character-limited message sent to the user device includes suspicious content. Then, the computing platform may generate a modified character-limited message by inserting one or more special characters into the character-limited message and cause transmission of the modified character-limited message to the user device. Next, the computing platform may receive, from the user device, a spam report that includes the modified character-limited message. Then, the computing platform may identify a presence of the one or more special characters included in the modified character-limited message and adjust one or more filters based on the identification. | 2022-05-05 |
20220138318 | MEMORY TEST METHOD - The present disclosure provides a memory test method. The method includes: determining a refresh cycle T, a designed attack resistance frequency F, and a single row read time t of a target repository; determining an attack row quantity N based on the refresh cycle T, the designed attack resistance frequency F, and the single row read time t; determining a group of target attack rows in the target repository based on a value of the attack row quantity N, where the group of target attack rows include N target attack rows, and at least two of the N target attack rows are spaced apart by one row; detecting, after reading the N target attack rows for X consecutive times, whether data exception occurs in all adjacent rows of the target attack rows, to complete one attack test. | 2022-05-05 |
20220138319 | APPARATUS FOR DETECTING UNKNOWN MALWARE USING VARIABLE OPCODE SEQUENCE AND METHOD USING THE SAME - Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI. | 2022-05-05 |
20220138320 | Detection of Unauthorized Encryption Using Deduplication Efficiency Metric - Techniques are provided for detection of unauthorized encryption using one or more deduplication efficiency metrics. One method comprises obtaining a deduplication efficiency value for a deduplication operation in a storage system; evaluating the deduplication efficiency value for the deduplication operation relative to an expected deduplication efficiency value; and performing one or more automated remedial actions, such as generating an alert notification, in response to the evaluating satisfying one or more deduplication criteria. A count of a number of concurrent users may be compared to an expected number of concurrent users, and/or (ii) a count of a number of concurrent sessions for a given user may be compared to an expected number of concurrent sessions for the given user. A ransomware alert or an unauthorized encryption alert may be generated when the evaluating and/or the comparison satisfy predefined attack criteria. | 2022-05-05 |
20220138321 | ENCRYPTION AS A SERVICE WITH REQUEST PATTERN ANOMALY DETECTION - A system and method mediate transfer of encrypted data files between local applications and external computer systems. Application containers perform cryptographic operations using stored credentials to decrypt data coming from these external systems and configurably forward them to the local applications, and to encrypt data sent from the local applications to the external systems. Access to this encryption-as-a-service (EaaS) functionality is gated by a fingerprint service that classifies requests by security level, and detects anomalous requests. Security classification is performed by a supervised machine learning algorithm, while anomalous request detection is performed by unsupervised machine learning algorithm. Stored keys are monitored, and when they near expiration or are damaged, embodiments proactively undertake key renewal and key exchange with the external computer systems. Containerization enables key storage in multiple vaults, thereby making such storage vendor-agnostic. | 2022-05-05 |
20220138322 | REDUCING THREAT DETECTION PROCESSING BY APPLYING SIMILARITY MEASURES TO ENTROPY MEASURES OF FILES - The disclosed technology teaches reducing threat detection processing by applying similarity measures. The method includes recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, at least an entropy measure of the previously processed file, and calculating an entropy measure for the edited version of the file. The method applies a similarity measure to compare the entropy measures for the edited version and the previously processed file, avoiding full threat scanning of the file to detect malware except when the similarity measure reaches a scanning trigger. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Further included is logging the edited version of the file for further processing when the similarity measure reaches a logging trigger. | 2022-05-05 |
20220138323 | Methods and Systems for Implementing Automated Controls Assessment in Computer Systems - Methods and systems are described for implementing automated controls assessment through an application programming interface (“API”) driven software development kit. For example, the system may receive a response from an API-based agent to an automated controls assessment audit. The system may process the response, using a library of reusable features for controls assessment audits for a plurality of computer domains, to generate a result of the automated controls assessment audit. The system may then generate an outcome of the first automated controls assessment audit. | 2022-05-05 |
20220138324 | REGULATING MESSAGES WARNING ABOUT IMPACTS OF FIRMWARE CHANGES - A technique includes detecting a presence of a hardware security module in a computer. The hardware security module performs trusted computing base measurements in response to the boot of the computer. The technique includes detecting an intention to change firmware of the computer and regulating providing a message warning about an impact of the change based on the determination. The regulation includes determining whether an operating system of the computer binds operations to the trusted computing base measurements and allowing communication of the message based on the determination. | 2022-05-05 |
20220138325 | SECURE ENCLAVE PATHING CONFIGURATION FOR DATA CONFIDENCE FABRICS - One example method includes performing a secure boot of hardware at a node of a data confidence fabric, creating an artifact that includes information concerning the secure boot, storing the artifact, receiving a data stream at the node, annotating data of the data stream with trust metadata, and associating the artifact with the data. An immutable ledger entry may be created that includes a pointer to the data, and a pointer to the artifact, and the immutable ledger entry may be accessible by an application. | 2022-05-05 |
20220138326 | Human Factors Framework - A system, method, and computer-readable medium are disclosed for performing a human factors risk operation. The human factors risk operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a human factors framework; and, performing a human factors risk operation in response to the analyzing the security related activity. | 2022-05-05 |
20220138327 | SYSTEM AND METHOD FOR MANAGING SECURITY RISK OF INFORMATION TECHNOLOGY SYSTEMS IN AN ENTERPRISE - The disclosure relates to system and method for managing security risk of information technology (IT) systems in an enterprise. The method includes determining valid trustware components that need to be evaluated for security risk of an IT system within the enterprise; correlating information associated with each of the valid trustware components in a set of data repositories; generating a mapping list comprising the valid trustware components, test cases corresponding to each of the valid trustware components, and test environments corresponding to each of the valid trustware components based on the correlation; triggering trustware security units for testing the valid trustware components based on the mapping list; and identifying security issues associated with the valid trustware components based on the testing. The trustware security units are arranged in a sequential manner or a parallel manner to align with execution of the test cases corresponding to each of the valid trustware components. | 2022-05-05 |
20220138328 | VALIDATION OF TRANSACTION LEDGER CONTENT USING JAVA SCRIPT OBJECT NOTATION SCHEMA DEFINITION - Embodiments may be associated with a secure, distributed transaction ledger. The system may include a Database that contains electronic records providing JSON schema content format requirements. A computer processor of a content validation smart contract creation platform, coupled to the JSON schema data store, may access information in the JSON schema data store. The content validation smart contract creation platform may then automatically create a content validation smart contract based on the JSON schema content format requirements. The content validation smart contract may then be deployed by the content validation smart contract creation platform to the secure, distributed transaction ledger. | 2022-05-05 |
20220138329 | MICROPROCESSOR PIPELINE CIRCUITRY TO SUPPORT CRYPTOGRAPHIC COMPUTING - In one embodiment, a processor of a cryptographic computing system includes a register to store an encryption key and address generation circuitry to obtain a pointer representing a linear address to be accessed by a read or write operation, the pointer being at least partially encrypted, obtain the key from the register and a context value, decrypt the encrypted portion of the pointer using the key and the context value as a tweak input, and generate an effective address for use in the read or write operation based on an output of the decryption. | 2022-05-05 |
20220138330 | COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS IN RESPONSE TO A PUBLIC FILE REQUEST - A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder in response to a public file request. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions. | 2022-05-05 |
20220138331 | PRIVACY SCORE - Methods, computer-readable media, software, and apparatuses may calculate and inform a consumer of company privacy scores corresponding to companies with which the consumer has a corresponding account, or for a company associated with a website that a consumer may visit. A consumer privacy score may also be determined, based on the company privacy scores. The company privacy scores may be based on a calculation including elements of a privacy practice of the corresponding company and elements of a privacy policy of the corresponding company | 2022-05-05 |
20220138332 | SECURITY OF ADVANCED SHORT-RANGE COMMUNICATION ARCHITECTURES - Modulated active sensor waveforms are used to transport data, within a system, to a decision-making computer, in an autonomous or semi-autonomous operation environment. Modulation creates distinct waveforms when a multitude of in-band signals are present. The waveform content is shared between the paired transmitter and receiver, validating the data content of the echo. Variable data are the modulation pattern, controlled by a processor within the system, matching patterns tests at the receiver select which data enter the critical autonomous processes. Matched echoes are secured controlled communications. Validation of the system's transmitter modulation, at the receiver, enhances security of autonomous actions for robotic systems on roads and in factories, transportable computers in office and home settings. Secondarily these secured, under-utilized, resources can safely be aggregated and repurposed without risk to their primary functions once secure communications are established. | 2022-05-05 |
20220138333 | SYSTEM AND METHOD FOR ENABLING AND VERIFYING THE TRUSTWORTHINESS OF A HARDWARE SYSTEM - To determine whether an IoT system connected with a network environment (e.g., the internet) is compromised, a networked Trust as a Service (TaaS) server receives system data indicative of various characteristics of the IoT system, wherein the system data is harvested by a software agent installed on the IoT system. The TaaS server initially establishes a baseline characteristics profile for the IoT system, such that subsequently received system data from the software agent may be compared against the baseline characteristics profile to quickly identify discrepancies between the originally established baseline characteristics profile and current operating characteristics of the system. Such discrepancies may be caused by desirable software updates, in which case the discrepancies may be integrated into the baseline characteristics profile, or the discrepancies may result from the IoT system being undesirably compromised. | 2022-05-05 |