20th week of 2020 patent applcation highlights part 51 |
Patent application number | Title | Published |
20200151223 | UNIFIED MESSAGE SEARCH - The disclosed embodiments include computerized methods, systems, and devices, including computer programs encoded on a computer storage medium, for generating terms of a search query based on a user's spoken utterances, identifying multiple cross-platform messages based on the generated terms, and to generating, via a presentation device, a single interface that enables the user to interact with identified messages. Based on a spoken utterance, the disclosed embodiments may determine user-specified search terms and/or criteria, and based on the user-specified search terms and/or criteria, may obtain cross-platform message data that corresponds to the search query. The communications device may generate one or more interface elements that describe corresponding ones of the cross-platform messages, which may be presented within a unified graphical user interface or voice-user interface by a communications device. | 2020-05-14 |
20200151224 | SYSTEM AND METHOD FOR DEEP LINKING AND SEARCH ENGINE SUPPORT FOR WEB SITES INTEGRATING THIRD PARTY APPLICATION AND COMPONENTS - A method for a website building system (WBS) includes enabling a user to create a website page with the WBS; enabling a user to add at least one instance of at least one third party application to the website page, each third party application comprising multiple internal pages; parsing the website page and extracting at least one identifier for the at least one instance and reconstructing a new outgoing uniform resource location (URL) for the website at least from the at least one identifier, the new URL providing direct access to the internal pages of the at least one third party application. | 2020-05-14 |
20200151225 | SYSTEM FOR CONNECTING TOPICALLY-RELATED NODES - A method includes storing a plurality of content items and storing one or more associations. Each of the one or more associations includes an association between exactly two of the plurality of content items. The method may also include causing a graphical user interface to be presented on a display of an electronic device. The graphical user interface may include a first representation of a first content item of the plurality of content items, a list of representations comprising a second representation of a second content item of the plurality of content items and a third representation of a third content item of the plurality of content items, a first visual indicator indicating that a first association of the one or more associations exists between the first content item and the second content item, and a second visual indicator indicating that a second association of the one or more associations exists between the first content item and the third content item. The method may also include receiving a user input at the first graphical user interface, the user input comprising an instruction to create an additional association between the first content item and the second content item. | 2020-05-14 |
20200151226 | SYSTEM AND METHOD FOR CREATION AND HANDLING OF CONFIGURABLE APPLICATIONS FOR WEBSITE BUILDING SYSTEMS - A website building system (WBS) includes a database of website components and definitions and instances of website building system configurable applications (WCAs), where the WCAs are single packaged entities which can also be accessed as a sets of customizable elements; a WCA app builder to enable a developer to develop a first version WCA; an in-site editor to provide specific editing capabilities for a user to edit at least one of a definition or an instance of the first version WCA and a WCA handler to receive a modification to the first version WCA from the user and an update to the first version WCA from the developer, the WCA handler to merge between the modification and the update to create a changed WCA, to resolve conflicts or loss of functionality and to handle permissions between the modification and the update. | 2020-05-14 |
20200151227 | COMPUTING SYSTEM WITH DYNAMIC WEB PAGE FEATURE - An example method involves accessing web-traffic data associated with a web page hosted by a first computing-device, wherein the web page comprises meta-tag data; using the accessed web traffic data to determine that the first computing-device received a threshold amount of requests that are (i) for the web page and (ii) associated with a search term; responsive to the determining, modifying the meta-tag data based on the search term; and transmitting the modified meta-tag data to a second computing-device, wherein the second computing-device is configured for (i) receiving the modified meta-tag data, (ii) receiving a request for a list of search results based on a set of search terms, (iii) responsive to receiving the request, using the set of search terms and the modified meta-tag data to perform a web search, thereby generating a list of search results, and (iv) transmitting the list of search results to a third computing-device. | 2020-05-14 |
20200151228 | SYSTEM FOR SYNCHRONIZATION OF CHANGES IN EDITED WEBSITES AND INTERACTIVE APPLICATIONS - A system for modifying a website or interactive application, including a published database accessible via an end user data service to present the most up to date version of objects of the website, viewable and editable by at least one user, a draft database accessible via a designer data service and viewable and editable by at least one designer to store edits to the objects of the published database; a published database request handler to coordinate concurrent viewing and updating of the objects between the end user data service and the published database and a draft database request handler to coordinate concurrent viewing, editing and updating of the objects between the designer data service and the draft database and to merge edits and updates to the objects in both the published database and the draft database and to return the merged version of the objects without modifying the published database. | 2020-05-14 |
20200151229 | CALLBACK NOTIFICATION FOR UNAVAILABLE WEBSITES - A server receives a first request for website access from an application on a device. The server determines the website is unavailable. The server identifies the status resource, wherein the status resource provides in-band updates on an availability of the website. The server provides status resource information to the device via the application on the device which communicated the first request. The server receives a second request for website access from the application on the device after the status resource information indicates that the website is available. The server provides access to the website. | 2020-05-14 |
20200151230 | INFORMATION PROCESSING SYSTEM, SERVER, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND METHOD FOR PROCESSING INFORMATION - An information processing system includes: a vehicle configured to capture an image of clothing and accessories of a user when the user gets in the vehicle to generate a clothing and accessories image; and a server configured to communicate with the vehicle and a terminal device of the user. The server is configured to: train a supervised learning model by using at least one of schedule information of the user and weather information as input data and clothing and accessories information as training data; estimate clothing and accessories according to at least one of schedule information of the user and weather information for the next time the user gets in the vehicle by using the trained supervised learning model; and send clothing and accessories recommendation information indicating the estimated clothing and accessories to the terminal device of the user. | 2020-05-14 |
20200151231 | SEARCHING PEOPLE, CONTENT AND DOCUMENTS FROM ANOTHER PERSON'S SOCIAL PERSPECTIVE - A method, system and computer program product for performing a search from another individual's social perspective. A name or a portion of a name of an individual known by the user is received. A directory search is then performed pertaining to the individual known by the user. After the user identifies the known individual from the directory search results, a selection to perform a directory, content or document search from the known individual's social perspective is received. Such a search may be performed based on the social network of the known individual. In this manner, by performing such searches from the social perspective of the known individual, such as the individual who disclosed the name of the individual who the user would like to contact, the user will be more likely to identify the correct individual, content or document in a more efficient manner. | 2020-05-14 |
20200151232 | Enhanced seller-oriented search results - A system and architecture for enhancing search results generated by an Internet search engine, so that those search results include enhanced buyer-oriented information, is disclosed. According to one aspect, a list of search results generated by an Internet search engine comprises one or more search results that are associated with one or more URLs in a set of URLs. For each such URL, seller-specific information, which may be based on and/or comprise ratings that are associated with registered selling entities that are associated with that URL, is presented in association with that URL's corresponding search result in the list of search results. A user who submitted query terms, based upon which the list of search results was generated, can use the presented rating information to determine which of the search results to investigate further. | 2020-05-14 |
20200151233 | DATA STORE WITH LOCK-FREE STATELESS PAGING CAPACITY - Disclosed are a method and apparatus for limiting the number of results returned by a data store in response to a query. Upon receiving an initial query, the data store returns a page of results that includes a subset of the data items within the data store satisfying the conditions of the query. The data store also provides a marker indicating the extent of the set of data items. If a subsequent query that requests additional results which satisfy the same query conditions and that includes the marker is received, the data store returns a page of results that includes a subset of data items that are disjoint from the initial subset, and provides an updated marker which indicates the extent of the union of the initial and subsequent subsets. If still further results are desired from the data store, an additional query containing the updated marker may be submitted. | 2020-05-14 |
20200151234 | OPTIMIZING THIRD PARTY TAG INSERTION - Server side web based ad stitching and user specific optimization are disclosed. In various embodiments, a request for a page is received via a communication interface. A processor is used to provide an optimized version of the page at least in part by determining dynamically an optimized content element for the page based at least in part on a user attribute associated with the request and content performance data generated based at least in part on testing of alternative versions of the page with respect to other users having the user attribute. | 2020-05-14 |
20200151235 | OPTIMIZING WEB PAGES BY MINIMIZING THE AMOUNT OF REDUNDANT INFORMATION - An optimization system receives a first information item to be placed within a web page that is displayed on a graphical user interface. The optimization system retrieves stored user data about the first information item from a user history database. The optimization system calculates a redundancy value for the first information item, which is a measure of the frequency with which the user has interacted with the first information item in the past. The optimization system compares the redundancy value for the first information item to a predetermined threshold value. When the redundancy value of the information item is greater than or equal to the predetermined threshold value, the optimization system requests a second information item from the information source server. The optimization system receives the second information item and places the second information item on the web page that is displayed on the graphical user interface. | 2020-05-14 |
20200151236 | NON-DESTRUCTIVE MEMORY ARRAY TO IMPLEMENT A FULL ADDER - A non-destructive memory array implements a full adder. The array includes a column connected by a bit line and a full adder unit. The column stores a first bit in a first row of the bit line, a second bit in a second row of the bit line, and an inverse of a carry-in bit in a third row of the bit line. The full adder unit stores, in the second and third rows of the bit line, a sum bit and a carry out bit output, respectively, of adding the first bit, the second bit and the carry-in bit. The full adder unit does not overwrite any of the bits when a full adder table indicates that the sum bit and the carry out bit are equivalent to the second bit and the carry-in bit. | 2020-05-14 |
20200151237 | APPARATUS AND METHOD OF LOW COMPLEXITY OPTIMIZATION SOLVER FOR PATH SMOOTHING WITH CONSTRAINT VARIATION - An apparatus and method of low complexity optimization solver for path smoothing with constraint variation are herein disclosed. According to one embodiment, an apparatus includes an L1 central processing unit (CPU) configured to transform an L1 trend filtering problem to a primal-dual linear programming (LP) optimization problem pair; and an L1 arithmetic logic unit (ALU) connected to the L1 CPU and configured to solve a primal problem of the primal-dual LP optimization problem pair with an extended full tableau simplex method. | 2020-05-14 |
20200151238 | Processor and Methods Configured to Provide a Low-Complexity Input/Output Pruning Fast Fourier Transform - In some embodiments, a circuit may include an input configured to receive a signal and a radix-r input/output pruning fast Fourier transform (FFT) processing element coupled to the input. The radix-r input/output pruning FFT processing element may be configured to remove FFT operations on input values of zero within the signal and to determine a discrete Fourier Transform (DFT) output having fewer output values than a number of input values of the signal. | 2020-05-14 |
20200151239 | PLASMA GUN DIAGNOSTICS USING REAL TIME VOLTAGE MONITORING - Method and apparatus for monitoring and diagnosing gun performance is derived that can determine proper gun operation and if not operating properly diagnose potential causes for abhorrent operation. The voltage produced by the gun is sampled in real time and the frequency spectrum produced analyzed using FFT and then reducing the FFT pattern down to a set of numerical values or a signature that can be compared to known signatures for both correct operation and abnormal operation. Using best fit techniques the cause of any abnormal behavior can then be identified. The method can also be used to predict the end of hardware life and aid in production scheduling and spare parts acquisition by providing advanced notice of wear and usage. | 2020-05-14 |
20200151240 | CONTEXTUALLY ADJUSTING DEVICE NOTIFICATIONS - A computer-implemented method according to one embodiment includes identifying a topic associated with a received notification, determining a plurality of policies associated with the topic, determining a current environmental context, determining a generalization level, utilizing the plurality of policies and the current environmental context, modifying the notification, based on the generalization level, and presenting the modified notification. | 2020-05-14 |
20200151241 | WEBPAGE COMPONENT REPLICATION SYSTEM AND METHOD - A method, computer program product, and computing system device for receiving a selection of at least a portion of a webpage. Code associated with the selected portion of the webpage may be extracted. Network traffic associated with the selected portion of the webpage may be monitored. One or more webpage components may be generated based upon, at least in part, the extracted code and the monitored network traffic associated with the selected portion of the webpage. | 2020-05-14 |
20200151242 | Methods of Website Generation - Methods of generating websites using any combination of remotely and locally stored content are contemplated. Content is procured by a user on a client computer, and a request to add that content to a source folder is sent to a server. The server adds the content to the source folder, where it is made available for website creation. When a client requests creation of a website using the contents of a source folder, the server then generates that website. In some embodiments, the website can be generated according to a user-selected theme or a default theme. | 2020-05-14 |
20200151243 | SYSTEMS AND METHODS FOR RICH INPUT INTO TEXT FIELDS USING AN EMBEDDED BROWSER - Embodiments described include systems and methods for providing rich content for an input field of a network application that accepts text. A first client application establishes a first session to a network application via a first embedded browser. The first embedded browser displays an input field of a first user interface of the network application. The input field accepts text input. The first client application provides a second user interface that allows entering of rich content in association with the input field. The first client application receives, at least for display via the second user interface, rich content as input for the input field. The first client application stores a token in data of the input field of the first user interface to identify that the input field is associated with the rich content. The first client application stores the token to a data storage service. | 2020-05-14 |
20200151244 | MAPPING ANNOTATIONS TO RANGES OF TEXT ACROSS DOCUMENTS - An annotation corresponding to a first range of text of a first document may be received. Based on the annotation, comparisons may be performed between a text string that comprises the first range of text and a group of text of a second document at different positions in the group of text. Based on the comparisons, similarity scores between the text string and the group of text may be determined at the different positions in the group of text. A position for the annotation in the group of text may be selected based on the similarity scores at the different positions. The annotation may be associated with a second range of text in the group of text that corresponds to the position. | 2020-05-14 |
20200151245 | Content Processing Automation - In one implementation, a content processing system includes a computing platform having a hardware processor and a system memory storing a content classification software code, a natural language processor, and a computer vision analyzer. The hardware processor executes the content classification software code to receive content inputs from multiple content sources, and, for each content input, to parse the content input for metadata describing the content input, obtain a description of language-based content included in the content input from the natural language processor, and obtain a description of visual content included in the content input from the computer vision analyzer. The content classification software code further associates predetermined annotation tags with the content input based on the metadata, the description of the language-based content, and the description of the visual content, and assigns the content input to a predetermined subject matter classification based on the associated annotation tags. | 2020-05-14 |
20200151246 | Labeling Training Set Data - A computer readable storage medium comprising instruction which when executed cause a processor to: generate a machine learning model based on a limited set of labeled training data and a larger set of unlabeled training data, the labeled and unlabeled training data having a common subject matter, by: identifying an inclusion and exclusion list of terms; taking a subset of unlabeled documents which contain any term from the inclusion list and excluding any document that contain a term from the exclusion list; identifying terms that are similar within a set standard to a term from the inclusion list or exclusion list and adding those identified terms to the inclusion list or exclusion list, respectively; repeating until no new similar terms are identified; and generating training data of the machine learning model comprising a final subset of documents for each category from the unlabeled training data. | 2020-05-14 |
20200151247 | EXTENDING SYSTEM ENTITIES FOR CONVERSATIONAL SYSTEM - A computer-implemented method is provided for processing a set D of conversation logs. The method includes learning, by a processor device, a set R of entity relation mining rules from a set K of known entity utterances uttered by known entities. The method further includes automatically recommending, by the processor device, extended utterances of the known entities from unrecognized ones of the known entities based on the set R. | 2020-05-14 |
20200151248 | SYSTEM AND METHOD FOR MODEL DERIVATION FOR ENTITY PREDICTION - A system and method are presented for model derivation for entity prediction. An LSTM with 100 memory cells is used in the system architecture. Sentences are truncated and provided with feature information to a named-entity recognition model. A forward and a backward pass of the LSTM are performed, and each pass is concatenated. The concatenated bi-directional LSTM encodings are obtained for the various features for each word. A fully connected set of neurons shared across all encoded words is obtained and the final encoded outputs with dimensions equal to the number of entities is determined. | 2020-05-14 |
20200151249 | Automated Constraint Extraction and Testing - Methods, systems and computer program products for automatic extraction and testing of constraints are provided herein. A computer-implemented method includes obtaining a first set of documents describing constraints and a second set of documents describing properties of entities, building a first dictionary of entity types and a second dictionary of relations among the entity types, extracting constraint triples representing the set of constraints from the first set of documents, and extracting fact triples from the second set of documents utilizing the first dictionary and the second dictionary. The method also includes receiving a query to evaluate whether at least one of the set of constraints is satisfied, determining whether the at least one constraint is satisfied by evaluating a constraint satisfaction formula utilizing the constraint triples and the fact triples, and providing a response to the query that indicates whether the at least one constraint is satisfied. | 2020-05-14 |
20200151250 | MULTI-RESOLUTION CONVOLUTIONAL NEURAL NETWORKS FOR SEQUENCE MODELING - Methods and systems for natural language processing include generating respective feature vectors, for each word in an input, based on sequences of input words of different respective lengths. The respective feature vectors for each word in the input are combined to form a combined vector for each word. A hidden state is determined for each word in the input based on the combined vector. The hidden states for all words in the input are combined to form a multi-resolution context vector. A natural language processing action is performed using the multi-resolution context vector. | 2020-05-14 |
20200151251 | DETERMINING STATES OF CONTENT CHARACTERISTICS OF ELECTRONIC COMMUNICATIONS - Disclosed in some examples are methods, systems, devices, and machine-readable mediums for determining states of content characteristics of electronic messages. In some embodiments, the probability of the states of the content characteristics of electronic messages are determined. Some embodiments determine a scores for states of content characteristics. Some embodiments determine a score for electronic messages for content characteristic diversity and inclusion based on a probability of a gender-bias state, a probability of a gender-neutral state, and a probability of not applicable to gender-bias state or gender-neutral state. In some embodiments the probabilities are determined based on a natural language model that is trained with data structures that relate training phrases to states of content characteristics. | 2020-05-14 |
20200151252 | ERROR CORRECTION FOR TABLES IN DOCUMENT CONVERSION - A method is presented for error correction of tabular data in document conversion. The method includes identifying errors from tabular data transformation by employing an error/invalidation checking module and correcting the identified errors from the tabular data transformation by employing an error correction module. The error correction module includes identifying a main structure pattern from common row structures, concatenating separate keywords according to natural language processing models employing training data obtained from a plurality of candidate tabular data, adjusting cells in the tabular data based on a domain-specific knowledge database including the training data in combination with linguistic and semantic knowledge, merging partial tabular data pieces, and generating an adjusted table as output on a display of a computing device. | 2020-05-14 |
20200151253 | INTENT DISCOVERY WITH A PROTOTYPE CLASSIFIER - In some applications, it may be desired to process a message to determine an intent of the message, where the intent indicates the meaning of the message. An intent classifier may be used to determine the meaning of a message by processing the message to compute a message embedding vector that represents the message in a vector space. Each possible intent may be represented by a prototype vector, and the intent of the message may be determined by comparing the message embedding to one or more prototype vectors, such as by selecting an intent whose prototype vector is closest to the message embedding. An intent classifier may be used, for example, (i) to implement an automated communications system with states where each state is associated with a subset of the possible intents or (ii) for processing usage data of a communications system to update the intents of the communications system. | 2020-05-14 |
20200151254 | PROCESSING COMMUNICATIONS USING A PROTOTYPE CLASSIFIER - In some applications, it may be desired to process a message to determine an intent of the message, where the intent indicates the meaning of the message. An intent classifier may be used to determine the meaning of a message by processing the message to compute a message embedding vector that represents the message in a vector space. Each possible intent may be represented by a prototype vector, and the intent of the message may be determined by comparing the message embedding to one or more prototype vectors, such as by selecting an intent whose prototype vector is closest to the message embedding. An intent classifier may be used, for example, (i) to implement an automated communications system with states where each state is associated with a subset of the possible intents or (ii) for processing usage data of a communications system to update the intents of the communications system. | 2020-05-14 |
20200151255 | COGNITIVE RESPONSES WITH ELECTRONIC MESSAGING - Providing cognitive responses with an electronic message system includes predicting an urgency level corresponding to an electronic message received by the system based on detecting pre-defined features within the message and assigning a classification to the message based on the detected features. The message and corresponding urgency level can be mapped to a response action based on the classification assigned to the message. A notification of the response action and corresponding urgency level can be generated. | 2020-05-14 |
20200151256 | CONVERSATION CONTENT GENERATION BASED ON USER PROFESSIONAL LEVEL - The present disclosure provides a method, computer system and computer program product facilitating generation of a conversation content. A computer-implemented method comprises: obtaining, by a device operatively coupled to one or more processors, history conversation data of an user; determining, by the device, a professional level of the user based on the history conversation data; and generating, by the device, a conversation content for the user based on the professional level of the user. | 2020-05-14 |
20200151257 | EVENT DETECTION WITH CONVERSATION - A method, system, and computer program product are provided. At least some received event candidate information concerning a possible event is stored as an event candidate in a database. A dialogue is generated with an occupant of a vehicle located in a vicinity of the possible event to obtain and store information to resolve any insufficiency or ambiguity regarding the event candidate in the database. When the information stored in the database regarding the event candidate is determined to be sufficient and unambiguous the event candidate is made into an event in the database. The event is reported to at least one vehicle approaching a location corresponding to the event. | 2020-05-14 |
20200151258 | METHOD, COMPUTER DEVICE AND STORAGE MEDIUM FOR IMPEMENTING SPEECH INTERACTION - The present disclosure provides a method, apparatus, computer device and storage medium for implementing speech interaction, wherein the method comprises: a content server obtaining a user's speech information from a client device, and completing the speech interaction in a first manner; the first manner comprises: sending the speech information to an automatic speech recognition server and obtaining a partial speech recognition result returned by the automatic speech recognition server each time; after determining that voice activity detection starts and if it is determined through semantic understanding that the partial speech recognition result obtained each time already includes entire content that the user hopes to express, taking the partial speech recognition result as a final speech recognition result, obtaining a response speech corresponding to the final speech recognition result, and returning the response speech to the client device. The solution of the present disclosure can be applied to improve the speech interaction response speed. | 2020-05-14 |
20200151259 | ADVANCED MACHINE LEARNING INTERFACES - A smart assistant is disclosed that provides for interfaces to capture requirements for a technical assistance request and then execute actions responsive to the technical assistance request. Example embodiments relate to parsing natural language input defining a technical assistance request to determine a series of instructions responsive to the technical assistance request. The smart assistant may also automatically detect a condition and generate a technical assistance request responsive to the condition. One or more driver applications may control or command one or more computing systems to respond to the technical assistance request. | 2020-05-14 |
20200151260 | DOMAIN-SPECIFIC PROCESS DIFFICULTY PREDICTION - A method of determining an operational difficulty of a process described in a document including text includes generating text data corresponding to the text of the document, and generating a word vector output by processing the text data through a plurality of word vectors, the plurality of word vectors based on a domain-specific text collection and a general-language text collection. The method further includes generating a statistical information output by processing the text data through a plurality of statistical information vectors, the plurality of statistical information vectors based on the domain-specific text collection and the general-language text collection, and generating a gated recurring unit (GRU) output by processing (i) the word vector output, (ii) the statistical information output, (iii) word-level data based on the text data, (iv) sentence-level data based on the text data, and (v) paragraph-level data based on the text data through at least one GRU. | 2020-05-14 |
20200151261 | System for Selective Data Capture and Translation - Systems for selective data capture and translation are provided. In some examples, a system, may receive data from one or more systems, networks, applications, devices, or the like. The data may include data associated with one or more issues occurring at the system, network, application, device, or the like. In some examples, a plurality of data containers may be generated. In some arrangements, each data container may be associated with a different issue, type of issue, system, application, or the like. The data containers may be generated in response to receiving data associated with an issue or may be pre-generated. In some arrangements, the received data may be evaluated (e.g., using machine learning) to determine whether it should be added to one or more data containers of the plurality of data containers. If so, the data may be added and, if not the data may be preserved and/or further evaluated to determine whether it should be added to a different data container. | 2020-05-14 |
20200151262 | OBJECT SEARCH ON PARTIAL DATA RECEIVED FROM EXTERNAL SYSTEM - In an example embodiment, a first payload in a first electronic communication is received, the first payload containing localization information regarding a first node in a taxonomy of objects, categories, and characteristics. The first payload is parsed to identify one or more dependencies. For each of the one or more dependencies, a dummy node in the taxonomy corresponding to the dependency is created, the dummy node containing information about the dependency from the first payload. A search mechanism is provided to a graphical user interface, the search mechanism designed to receive user interactions from a user and cause one or more hardware processors to retrieve and cause display of information in one or more of the dummy nodes in the taxonomy. | 2020-05-14 |
20200151263 | SNIPPET GENERATION SYSTEM - Systems and methods are provided for generating a rank vector comprising an array of values for each term position of a document and setting a value at a position of each term identifier in the document to a distance score for each term identifier, calculating snippet frame quality scores for each frame of a plurality of frames in the rank vector, determining whether a length of the character string associated with the frame with the highest frame quality score is similar to a requested length for a snippet, if necessary, adjusting the size of the character string to be similar to the requested length for the snippet and, once the length of a character string for one or more frames is similar to the requested length for the snippet, generating the character string to be provided as a snippet. | 2020-05-14 |
20200151264 | LOCATION TAGGING FOR UBIQUITOUS ACCESS - A vehicle includes a controller programmed to identify tag phrases for locations that express a relationship between the location and a learned location tag. The tag phrases are based on words and word sequences learned from prior selections and inputs of a user. The controller is programmed to communicate the tag phrases to the user and provide trip assistance based on a selected tag phrase chosen by the user. The locations and tag phrases are accessible to devices such that locations are identified with common tag phrases on each of the devices. | 2020-05-14 |
20200151265 | PLACE VISIBILITY SCORING SYSTEM - Systems and methods are provided for receiving geographic coordinates for a location, determining a road segment associated with the location based on the geographic coordinates for the location, and determining a plurality of places associated with the road segment associated with the location. The systems and methods further provide for extracting visual data for each of the plurality of places, generating a plurality of feature values based on the visual data for each of the plurality of places, and analyzing the plurality of feature values to generate a visibility score for each of the plurality of places. | 2020-05-14 |
20200151266 | DATA PROCESSING USING EXTERNAL INFORMATION - An example operation may include one or more of receiving, by a calculation node, a request for an external data of a user from a data server accessible over a blockchain network, executing, by the calculation node, a smart contract to query an external server for the external data based on a registration data of the user derived from the request, receiving, by the calculation node, a result of the query and provide the result to the data server, receiving, by the calculation node, a data of the user corresponding to the result from the data server, executing, by the calculation node, a smart contract to convert the data by an adjustment process, executing, by the calculation node, a smart contract to assess the adjusted data to confirm that the adjusted data matches a processing condition, and in response to a match to the processing condition, committing, by the calculation node, the adjusted data to a ledger of the blockchain network. | 2020-05-14 |
20200151267 | DATA DEDUPLICATION WITH LESS IMPACT ON SPEED OF ACCESS - A method, system and computer readable program storage device for performing data deduplication. In an embodiment, the method comprises receiving input data for storage in a data storage. The input data comprises a multitude of data blocks, and the data blocks are accessed at different times in the data storage by a given application. The method further comprises selecting, by a processor device, one or more of the data blocks for data deduplication based on when the data blocks are accessed by the given application. In an embodiment, the selecting data blocks for data deduplication includes selecting data blocks for deduplication to obtain a target deduplication ratio. In an embodiment, the selecting data blocks for data deduplication includes selecting for the deduplication data blocks that are accessed later by the given application relative to data blocks that are accessed earlier by the given application. | 2020-05-14 |
20200151268 | BOUNDING COST OF FLUSHES IN BUFFER TREES - A buffer tree structure includes, at each internal node, a buffer having a compacted portion and an uncompacted portion. Insertion of data elements to the buffer tree can occur units called packets. A packet is initially stored in the uncompacted portion of a receiving node's buffer. When a compaction trigger condition exists, packet compaction is performed including a data element compaction operation. A buffer-emptying (flush) operation pushes the compacted packets to children nodes. | 2020-05-14 |
20200151269 | CONSENSUS TRANSACTION SCHEDULER - An example operation may include one or more of connecting, by a scheduler node, to a blockchain network comprised of member nodes, receiving, by the scheduler node, a plurality of transactions that include deadlines from the member nodes, comparing, by the scheduler node, the deadlines of the plurality of the transactions against an average time to append to a ledger (ATAL) pre-calculated for the scheduler node, dropping, by the scheduler node, the transactions of the plurality of the transactions, if a sum of the ATAL and a current time is larger than the deadlines of the plurality of the transactions, calculating, by the scheduler node, a priority usage balance (PUB) for the member nodes based on the transactions of the plurality of transactions remaining after the transactions of the plurality of the transactions have been dropped, scheduling, by the scheduler node, a transaction with an earliest deadline from the plurality of the remaining transactions to be validated first for an execution, and arranging, by the scheduler node, a validation order for the plurality of the remaining transactions based on the PUBs. | 2020-05-14 |
20200151270 | INVOLVED NODE AVAILABILITY - An example operation may include one or more of receiving a transaction request for a first transaction into a blockchain network, determining one or more potentially linked transactions subsequent to the first transaction, determining one or more nodes required for the first transaction and the one or more potentially linked transactions, determining an availability for the one or more nodes, for example, by analyzing social network usage at the respective nodes, and determining, from the availability of the one or more nodes, a preferred time to initiate the first transaction. | 2020-05-14 |
20200151271 | USING MODIFIED BLOCKCHAIN CONCEPTS TO GUARANTEE NO TUPLE LOSS AND/OR NO TUPLE CORRUPTION - Method, system, and computer program product are provided to guarantee no tuple loss and/or corruption in a real-time data streaming environment. In some embodiments, a stream of tuples is sent from an entry operator to downstream operator(s), and, at the entry operator, a mark is placed on each tuple in the stream of tuples. In an embodiment where the stream of tuples includes first, second, and subsequent tuple(s), for example, the mark may comprise a tuple-unique number and a tuple-data hash of data contained in the tuple, and the mark on the second and each subsequent tuple may further comprise a link-back hash associated with the immediately preceding tuple in the stream of tuples. In some embodiments, the link-back hash is used to check whether a tuple is lost or received out of order, and the tuple-data hash is used to check whether a received tuple is corrupt. | 2020-05-14 |
20200151272 | EFFICIENT QUERYING USING OVERVIEW LAYERS OF GEOSPATIAL-TEMPORAL DATA IN A DATA ANALYTICS PLATFORM - A computer-implemented method includes accessing, by a processing unit, an existing layer representing geospatial-temporal data at a selected timestamp. A first overview layer of the existing layer is generated by iteratively aggregating each cluster of cells of the existing layer into a corresponding lower-resolution cell of the first overview layer. The first overview layer therefore has a lower resolution than the existing layer. A query is received related to the geospatial-temporal data in the existing layer, and the query is processed with reference to the first overview layer. | 2020-05-14 |
20200151273 | VOICE RESPONSE SYSTEM FOR TEXT PRESENTATION - In response to a user query, aspects identify a content requirement for satisfaction of the user query as a function of context profile data of the user comprising a subject matter requirement, a personal requirement, and a restriction parameter, retrieve a search result that satisfies the content requirement, select a first portion of the search result as a function of a user current context, and the restriction parameter, and present the first selected portion to the user in satisfaction of the first user query | 2020-05-14 |
20200151274 | NATURAL LANGUAGE PROCESSOR FOR COGNITIVELY GENERATING CONTEXTUAL FILLER DESIGNED TO KEEP USERS ENGAGED - A computer-implemented method includes detecting, using a processor system, a first delay in a conversation system. Initial contextual data is received at a first orchestration layer of the processor system, where the initial contextual data describes a context of a user. The first orchestration layer queries a first data source, based on the initial contextual data. Based on querying the first data source, the first orchestration layer augments the initial contextual data to determine updated contextual data describing the context of the user. Filler content personalized to the user is generated based on the updated contextual data describing the context of the user. The filler content is presented through a user interface during the first delay, responsive to detecting the first delay in the conversation system. | 2020-05-14 |
20200151275 | Histograms Based on Varying Data Distribution - Systems and methods for producing histograms are disclosed. One method for producing a histogram includes processing a database table to produce a grouped result set, and dividing the grouped result set into a plurality of collections with each collection containing one or more intervals of the grouped result set. Further, for each collection containing one or more intervals, the method includes determining one or more statistical parameters characterizing a distribution of the data within the collection. Still further, for each collection, the method includes applying one of a plurality of different histogram-producing algorithms based on the one or more statistical parameters to produce a histogram such that at least two of the different histogram-producing algorithms are used to render a respective different portion of the histogram. | 2020-05-14 |
20200151276 | COGNITIVE AUTOMATION TOOL - A requirements-traceability system extracts and classifies project requirements stored in a set of source documents. If a source document is unstructured, such as a natural-language word-processing file, the system uses a self-learning or cognitive natural-language tool to inferentially infer requirements in that document. Each requirement may be composed of more detailed sub-requirements in parent-child relationships. Requirements are reclassified into a standardized classification scheme and stored in a standardized hierarchical data structure in which each level corresponds to a requirement's relative degree of granularity. The tree is updated whenever requirements are revised, allowing users and downstream applications to bidirectionally trace each requirement's ancestors and descendants and to review and audit revision histories of the project's entire requirements hierarchy. | 2020-05-14 |
20200151277 | GENERATING THREE-DIMENSIONAL DIGITAL CONTENT FROM NATURAL LANGUAGE REQUESTS - Methods, systems, and non-transitory computer readable storage media are disclosed for generating a three-dimensional scene based on a natural language phrase. For example, the disclosed system can analyze a natural language phrase to determine dependencies involving entities and commands in the natural language phrase. The disclosed system can then use the dependencies to generate an entity-command representation of the natural language phrase. Additionally, the disclosed system can generate a semantic scene graph for the natural language phrase from the entity-command representation to indicate contextual relationships of the entities and commands. Furthermore, the disclosed system generates the requested three-dimensional scene by using at least one scene of a plurality of available three-dimensional scenes identified using the semantic scene graph of the natural language phrase. | 2020-05-14 |
20200151278 | ONLINE REPUTATION MONITORING AND INTELLIGENCE GATHERING - A system and method is provided for an automated online reputation monitoring and intelligence gathering solution that also provides services that manage a reputation once content damaging to the reputation has been identified. Functions and services of the automated online reputation monitoring and intelligence gathering solution include the aggregation of information from non-proprietary websites and social networks, the ability to contact support for assistance with reputation management, the ability to submit requests to fix online reputation, and the delivery of alerts directly to a user device. | 2020-05-14 |
20200151279 | WEB APPLICATION ARCHITECTURE FOR INFORMATION MANAGEMENT - Various examples are directed to systems and methods for implementing a web-based information system. A web application system may access a web application document that comprises object data, user interface data, and rule data. The web application system may serve the first user interface page to a first instance of a web application executing at a first user computing device, the first user interface page including first data object attributes of the first data object. The web application system may receive, through the first user interface page, a change to the first data object. The web application system may determine that the rule data describes a first action to be executed in response to the change to the first data object and execute the first action. | 2020-05-14 |
20200151280 | DYNAMICALLY BUILDING FILE GRAPH - System and techniques for dynamically building a file graph are described herein. Meta data is received for a first and a second file. An intersection of the first metadata set and the second metadata set is computed. An edge in a file graph is created based on the intersection. Then, after receiving a query about the first file, the second file is provided as a result to the query based on the edge in the file graph. | 2020-05-14 |
20200151281 | PERFORMING QUERY-TIME ATTRIBUTION CHANNEL MODELING - The present disclosure relates to performing attribution channel modeling in real time using touchpoint data that corresponds to a user-specified set of channels and is retrieved from a database using a user-specified attribution model. For example, in one or more embodiments, a system stores raw data in an attribution database that comprises an aggregator and a plurality of nodes. In particular, each node stores touchpoint data associated with a different user. Upon receiving a query, the system can, in real time, retrieve subsets of the touchpoint data that corresponds to a user-defined set of distribution channels in accordance with a user-specified attribution model. The system then combines the subsets of touchpoint data using the aggregator and generates the digital attribution report using the combined data. | 2020-05-14 |
20200151282 | PERFORMING ATTRIBUTION MODELING FOR ARBITRARY ANALYTICS PARAMETERS - The present disclosure relates to performing attribution modeling in real time using touchpoint data that correspond to arbitrary analytics parameters (e.g., a user-specified dimension) and are retrieved from a database using an attribution model. For example, in one or more embodiments, a system stores raw data in an analytics database that comprises an aggregator and a plurality of nodes. In particular, each node stores touchpoint data associated with a different user. Upon receiving a query, the system can, in real time, retrieve subsets of the touchpoint data that correspond to a user-specified dimension in accordance with an attribution model. The system then combines the subsets of touchpoint data using the aggregator and generates the digital attribution report using the combined data. | 2020-05-14 |
20200151283 | LOCATION PLAN OPTIMIZATION - In one embodiment, a method receives input specifying criteria for generating a seating plan where at least a portion of the criteria includes a priority value. A layout of locations is received in which the seating plan is applied and a valuation function is received that defines a scoring system for the plan. The scoring system using the priority value to generate a score for criteria associated with the priority value. The method creates a set of seating plans based on the criteria to place users in locations in the layout. The set of seating plans include different combinations of users placed in different locations. A seating plan is selected that maximizes a result from scores generated for criteria in the seating plan over other results associated with other seating plans. Then, the method outputs the seating plan. | 2020-05-14 |
20200151284 | PILLOW CUSTOMIZATION SYSTEM AND METHOD - A method of pillow customization includes analyzing shapes associated with people through the use of sensors to create analytical data; receiving photos from a subject user through a first computing device and a server; determining a firmness of a mattress of the subject user based on the photos; determining body measurements of the subject based on the photos through one or more algorithms and a second computing device; providing the subject user with a pillow diagram, the pillow diagram having one or more zones, each of the one or more zones being customizable in firmness; receiving one or more subject user inputted selections through the first computing device; and designing a pillow based on the firmness of the mattress, the body measurements, and the one or more subject user inputted characteristics, the pillow being customized to the subject user. | 2020-05-14 |
20200151285 | DESIGN SUPPORT APPARATUS THAT SUPPORTS DESIGN ON THE BASIS OF PERFORMANCE INFORMATION - A design support apparatus stores performance information of past processing of a workpiece, design information of a current workpiece, and allowance information including allowable shape information by which a change in dimension is permitted to a design shape. The respective information are stored for each element of the workpiece. The design support apparatus includes an extraction unit extracting the performance information including a shape of an element similar to a design shape of an element of the current workpiece. The design support apparatus includes an evaluation unit evaluating a processing technique of the elements included in the performance information. The design support apparatus includes a shape setting unit setting a shape of the element based on the processing technique selected by the evaluation unit and an allowable shape. | 2020-05-14 |
20200151286 | CONVERSION OF GEOMETRY TO BOUNDARY REPRESENTATION WITH FACILITATED EDITING FOR COMPUTER AIDED DESIGN AND 2.5-AXIS SUBTRACTIVE MANUFACTURING - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using data format conversion (e.g., of output(s) from generative design processes) and user interface techniques that facilitate the production of 3D models of physical structures that are readily usable with 2.5-axis subtractive manufacturing, include: modifying smooth curves, which have been fit to contours representing discrete height layers of an object, to facilitate the 2.5-axis subtractive manufacturing; preparing an editable model of the object using a parametric feature history, which includes a sketch feature, to combine extruded versions of the smooth curves to form a 3D model of the object in a boundary representation format; reshaping a subset of the smooth curves responsive to user input with respect to the sketch feature; and replaying the parametric feature history to reconstruct the 3D model of the object, as changed by the user input. | 2020-05-14 |
20200151287 | Computer System and Method for Managing Coordination Issues in Construction Projects - The present disclosure is directed to a software tool that facilitates coordination between various parties that are involved in the process of rectifying a problem identified in a combined three-dimensional model file. In one implementation, the software tool may cause a computing device to (a) receive an indication requesting creation of a coordination issue that relates to a portion of a rendered three-dimensional view of a construction project, (b) in response to the receipt of the indication, create a data set defining the coordination issue, the data set including (i) a representation of the portion of the rendered three-dimensional view, and (ii) data indicating an assignee of the coordination issue, and (c) cause an indication of the coordination issue to be presented to a client station associated with the assignee. | 2020-05-14 |
20200151288 | Deep Learning Testability Analysis with Graph Convolutional Networks - Techniques to improve the accuracy and speed for detection and remediation of difficult to test nodes in a circuit design netlist. The techniques utilize improved netlist representations, test point insertion, and trained neural networks. | 2020-05-14 |
20200151289 | DEEP LEARNING BASED IDENTIFICATION OF DIFFICULT TO TEST NODES - Techniques to improve the accuracy and speed for detection and remediation of difficult to test nodes in a circuit design netlist. The techniques utilize improved netlist representations, test point insertion, and trained neural networks. | 2020-05-14 |
20200151290 | METHOD OF ENCODING A 3D SHAPE INTO A 2D SURFACE - The present invention concerns a method for encoding a given 3D shape into a target 2D linkage. The method comprises: (a) providing an initial 2D surface; and (b) defining on the initial 2D surface an auxetic pattern of geometric elements planarly linked between them to obtain the target 2D linkage, the pattern allowing the target 2D linkage to be virtually stretched. The target 2D linkage has a spatially varying scale factor thereby spatially varying the stretching capability of the 2D linkage. | 2020-05-14 |
20200151291 | MACHINE LEARNING-BASED PREDICTION, PLANNING, AND OPTIMIZATION OF TRIP TIME, TRIP COST, AND/OR POLLUTANT EMISSION DURING NAVIGATION - A method of predicting, in real-time, a relationship between a vehicle's engine speed, trip time, cost, and fuel consumption, comprising: monitoring vehicle operation over time to acquiring data representing at least a vehicle location, a fuel consumption rate, and operating conditions; generating a predictive model relating the vehicle's engine speed, trip time, and fuel consumption; and receiving at least one constraint on the vehicle's engine speed, trip time, and fuel consumption, and automatically producing from at least one automated processor, based on the predictive model, a constrained output. | 2020-05-14 |
20200151292 | SYSTEMS AND METHODS FOR THE DESIGN AND ANALYSIS OF STRUCTURAL CONNECTIONS - A method includes arranging, via a processor, a design layout of a plurality of visualization objects representing a plurality of structural components of a structural system. The method includes receiving, via the processor, one or more input parameters for each visualization object. Each input parameter corresponds to a parameter of the represented structural component. The method includes generating, via the processor, a model of the design layout based at least in part on boundary conditions calculated from the structural components. The method also includes generating, via the processor, an updated layout of the visualization components based at least in part on the results of the model and generating, via the processor, a design report of the updated layout. The design report comprises instructions on arranging the structural components of the structural system. | 2020-05-14 |
20200151293 | SYSTEMS AND METHODS FOR THE ANALYSIS OF STRUCTURAL COMPONENTS - A method includes arranging, via a processor, a design layout of a plurality of visualization objects representing a plurality of structural components of a structural system. The method also includes receiving, via the processor, one or more input parameters for each visualization object. Each input parameter corresponds to a parameter of the represented structural component. The method also includes generating, via the processor, a first model of the design layout based on boundary conditions calculated from the structural components and a rigid baseplate assumption. The method also includes generating, via the processor, a second model of the design layout based on boundary conditions calculated from the structural components and a flexible baseplate assumption. The method also includes comparing the first and second models and generating, via the processor, an updated layout of the visualization components based at least in part on the results of the comparison. | 2020-05-14 |
20200151294 | METHOD FOR GENERATING AGING MODEL AND MANUFACTURING SEMICONDUCTOR CHIP USING THE SAME - A method for generating an aging model used in the design of a semiconductor chip includes: extracting a plurality of aging scenarios including a use condition of the semiconductor chip from an aging model library of the semiconductor chip; calculating a first aging parameter commonly applied to a plurality of semiconductor elements included in the semiconductor chip from the plurality of aging scenarios; and generating characteristic deterioration information due to aging of each of the semiconductor elements through simulation using the first aging parameter and a second aging parameter of each of the semiconductor elements. | 2020-05-14 |
20200151295 | Method for determining IC voltage and method for finding relation between voltages and circuit parameters - Disclosed is an IC voltage determining method including: executing a static timing analysis according to a circuit design to obtain data of a critical path and then generating a netlist; executing a circuit parameter simulation and Monte Carlo simulation with the netlist according to a regular voltage and prescribed parameters to obtain a circuit parameter reference value and a variance of circuit parameter values; executing an adaptive voltage scaling analysis according to a voltage range to obtain a voltage-versus-parameter relation indicative of the number of times that each of circuit parameter deviations that are respectively associated with predetermined voltages within the predetermined voltage range is of the variance; and testing an IC according to the regular voltage to obtain a circuit parameter test value and determining the IC voltage according to the voltage-versus-parameter relation and a difference between the circuit parameter test value and the circuit parameter reference value. | 2020-05-14 |
20200151296 | SYSTEM AND METHOD FOR ESTIMATING LEAKAGE POWER OF CIRCUIT DESIGN AT EARLY STAGE - A computer-implemented method of estimating leakage power of a circuit design may include: obtaining waveform data by performing a functional simulation on a circuit design according to reference input signals; obtaining leakage power data by calculating power consumption of the circuit design according to the waveform data; generating a leakage power model of the circuit design based on the waveform data and the leakage power data; and estimating leakage power of the circuit design by performing a functional simulation on the circuit design according to test input signals on a basis of the leakage power model. | 2020-05-14 |
20200151297 | MULTI-BIT STANDARD CELL - A multi-bit standard cell embodied on a non-transitory computer-readable medium includes: a first logic cell with a first logic cell height measured from a first lower boundary to a first upper boundary of the first logic cell; and a second logic cell with a second logic cell height measured from a second lower boundary to a second upper boundary of the second logic cell, the second logic cell height different from the first logic cell height, and the second upper boundary attached to the first lower boundary. The first logic cell is arranged to perform a first logical function, the second logic cell is arranged to perform a second logical function, and the first logical function is the same as the second logical function. | 2020-05-14 |
20200151298 | INTEGRATED CIRCUIT INCLUDING DIFFERENT TYPES OF CELLS, AND METHOD AND SYSTEM OF DESIGNING THE SAME - A method of generating an integrated circuit design includes receiving input data defining input cells of the integrated circuit design, selecting first standard cells from a first standard cell library to represent the input cells having a first characteristic, selecting second standard cells from a second standard cell library to represent the input cells having a second characteristic different from the first characteristic, and generating output data representing the integrated circuit design by performing placement and routing on the selected first standard cells and the selected second standard cells. The first standard cell library includes a first type of standard cells manufactured using a first diffusion break scheme. The second standard cell library includes a second type of standard cells manufactured using a second diffusion break scheme. Each of the second type of standard cells has a same function as a respective one of the first type of standard cells. | 2020-05-14 |
20200151299 | TESTING SYSTEM AND TESTING METHOD - A testing method includes the following operations: performing a place and route procedure according to a netlist file corresponding to a chip, in order to generate first layout data; determining whether to replace a flip-flop circuit in the chip with a gated flip-flop circuit according to the first layout data, in order to generate second layout data; and running a test on the chip according to the second layout data. | 2020-05-14 |
20200151300 | Design Rule Compliance Checking and Design Generation with Rule Access Security - A method and apparatus for checking compliance of a design for a product with design rules. An executable rule module comprising the design rules is received. The design rules comprise design checking rules that specify conditions. Design data representing the design is received. The executable rule module is run using the design data to determine compliance of the design with the design rules by determining whether the design satisfies the conditions. A compliance report to indicate the compliance of the design with the design rules is generated. The design data may be used to manufacture the product in response to a determination that the design complies with the design rules. | 2020-05-14 |
20200151301 | ESTIMATING THE PROBABILITY OF MATRIX FACTORIZATION RESULTS - A method for ranking a relationship between drugs and adverse events includes creating a matrix of associations between a plurality of drugs and a plurality of adverse events and factoring the matrix of associates into a pair of matrix factors. The matrix factors, when multiplied, approximate the matrix of associations, and a product of the matrix factors is a matrix of observed scores. The method further includes determining, for each drug and adverse event pair in the matrix of observed scores, a z-score, an expected score for each drug and adverse event pair, and a standard deviation for each drug and adverse event pair, calculating a probability of a relationship between a drug and adverse event using the z-score for the drug and adverse event pair, and determining that the drug and adverse event are related, when the probability of a relationship is greater than a predetermined magnitude. | 2020-05-14 |
20200151302 | PRE-KEY WITH AUTHENTICATION USING LOGICAL COMBINATIONS OF PRE-KEY BITS WITH OTHER INFORMATION - A pre-key is combined with non-pre key data to render a content key useful for decrypting content, such as audio-video content. This other, non-pre key data may be anything that, for example, an ATSC 3.0 source such as a Broadcaster would like to authenticate into the content. For example, the data that is XOR'd with pre-key information may include various fields such as the Broadcaster designated market area (DMA), a copyright notice, the identification of the content to be decrypted, the user's group ID (subscriber group), etc. | 2020-05-14 |
20200151303 | DIGITAL RIGHTS MANAGEMENT - Embodiments include method, systems and computer program products for digital rights management. Aspects include receiving, by a processor, a request to access media content from a requestor, wherein the media content is protected by a digital rights management (DRM) system that requires a license, obtaining context data associated with the requestor, analyzing the context data to determine a validity score for the request, and transmitting a license or access key to the requestor based on determining that the validity score exceeds a threshold. | 2020-05-14 |
20200151304 | SECURITY TOOL - A memory stores a catalog of applications and a catalog of trusted sources. A processor detects that a first user attempted to install an application, determines that a source of the application is in the catalog of trusted sources, scans the application to determine that the application does not contain a virus, and determines that there is a first license that allows the first user to install the application. The processor also stores the application into a repository and adds the application to the catalog of applications. The processor receives a request from a second user to install the application, determines that the application is in the catalog of applications, and determines that there is a second license that allows the second user to install the application. The processor further retrieves the application from the repository and initiates installation of the application on a device of the second user. | 2020-05-14 |
20200151305 | COMPUTER PROGRAM CODE OBFUSCATION METHODS AND SYSTEMS - Methods and systems for obfuscating computer program code are disclosed. In an embodiment, a method of generating obfuscated binary code from input source code for execution on a target processor comprises: generating a set of random obfuscation transform selections; and iteratively optimizing the obfuscation transform selections until a termination criterion is met. The obfuscation transformation selections may comprise indications of custom instructions which are executable on the co-processor in order to reduce side channel leakage. | 2020-05-14 |
20200151306 | Method and device for the secure verification of the opening of a safe door - A method and a device for secure verification of opening of a safe door of a safe, in particular a safe door of a safe of an automated teller machine, includes a safe door and storage compartments for cash boxes that are arranged relative to each other such that the cash boxes can only be removed from and inserted into the storage compartments when the safe door is open. A control unit verifies an opening of the safe door by checking if cash boxes have been removed from the safe and have been inserted into the safe in swapped order compared to a first operating state. | 2020-05-14 |
20200151307 | METHOD FOR FACIAL AUTHENTICATION OF A WEARER OF A WATCH - A method for facial authentication of a wearer of a watch includes: initiating an authentication process including detecting at least one triggering movement/gesture carried out by the wearer; capturing at least one sequence of images relative to the face of the wearer pivoting from one direction to another in front of the optical sensor; acquiring surface geometric data of the face associated with each image of at least one sequence; generating a three-dimensional model of the face of the wearer from at least one captured sequence of images and from the acquired geometric data; determining an identification index generated based on identification data relative to a plurality of features characteristic of the face of the wearer of the watch detected on the basis of the three-dimensional model, and identifying the wearer if the identification index is greater than a reference identification index. | 2020-05-14 |
20200151308 | BRAIN ACTIVITY-BASED AUTHENTICATION - A method of authentication of a user is provided. The method comprises capturing a brain activity signal from a user; comparing the brain activity signal with reference data; and determining, based at least in part on the comparison, whether the identity of the user can be confirmed. Also provided is a computing device comprising at least one processor and at least one memory. The computing device is adapted to: communicate with a brain activity sensing system to capture a brain activity signal from the user; provide the captured brain activity signal to an authentication service computing system; and authenticate the user based at least in part on the result of a comparison with reference data received from the authentication service computing system. A system comprising the computing device and a brain activity sensing system, and am authentication service computing device are also provided. | 2020-05-14 |
20200151309 | METHOD OF CLASSIFICATION OF AN INPUT IMAGE REPRESENTATIVE OF A BIOMETRIC TRAIT BY MEANS OF A CONVOLUTIONAL NEURAL NETWORK - The present invention concerns a method of classification of an input image representative of a biometric trait by means of a first convolutional neural network, CNN, characterized in that it comprises the implementation by data processing means ( | 2020-05-14 |
20200151310 | METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION - Apparatuses and methods are disclosed for identity authentication. An exemplary method may include obtaining biometric information for authentication collected by a terminal, and identity information sent by the terminal. The method may also include obtaining prestored biometric information corresponding to the identity information. The method may further include determining whether the biometric information for authentication matches the prestored biometric information. If yes, the method may include determining that the identity authentication is successful. Otherwise the method may include determining that the identity authentication is not successful. | 2020-05-14 |
20200151311 | CREDENTIAL MANAGEMENT FOR MOBILE DEVICES - The present disclosure relates to credential management for mobile devices that can be used for access to secured physical environments. One aspect comprises a computer implemented method comprising a mobile computing device: receiving, from a server system, and storing, on the mobile computing device: one or more application sequence counter values, one or more limited use credentials (LUCs), each LUC being bound to a corresponding one of the application sequence counter values; one or more emergency credentials, and an account token; subsequently receiving an authentication request from a terminal; in response to receiving the authentication request, determining that no LUC is available for fulfilling the request; and in response to determining that no LUC is available for fulfilling the request: transmitting, to the terminal, the account token and an application cryptogram generated from an emergency credential of said one or more emergency credentials; and updating a current application sequence counter. | 2020-05-14 |
20200151312 | METHOD FOR CONTROLLING ACCESS TO A SECURITY MODULE - A method for controlling access to a security module [of a mobile terminal by an application of the mobile terminal is described. The method includes sending by a current application of the mobile terminal a request to access the security module, said access request comprising the current identifier of an applet comprised in the security module. The operating system of the mobile terminal reads a look-up table comprising a set of access control rules, an access control rule comprising the identifier of an applet of the security module associated with a control value for an application of the mobile terminal, said access control rule indicating that said application of the mobile terminal is authorized to communicate with the applet of the security module. A current control value is obtained for the current application from at least one certificate of a developer of the current application and an identifier of the current application, associated with the current application, and the look-up table is searched for an access control rule comprising the current identifier of the applet associated with the current control value, the current application being authorized to communicate with the current applet when the search is positive. | 2020-05-14 |
20200151313 | APPLICATIONS LOGIN USING A MECHANISM RELATING SUB-TOKENS TO THE QUALITY OF A MASTER TOKEN - Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction. | 2020-05-14 |
20200151314 | SYSTEM AND METHOD EMPLOYING REDUCED TIME DEVICE PROCESSING - Methods and systems for facilitating a transaction are provided. A transaction involving an integrated circuit user device in contact with an access device is processed in less time, such that the user device can be removed at an earlier time. In embodiments, an access device provides an estimated value to a user device such that a cryptogram can be generated without waiting for a final value. Additionally, the access device can store user device data and then complete the transaction with the user device before authorizing the transaction, such that the user device can be removed without waiting for an authorization response. | 2020-05-14 |
20200151315 | METHOD FOR PROVIDING AUTOFILL FUNCTION AND ELECTRONIC DEVICE INCLUDING THE SAME - An electronic device and method are disclosed, the method including a communication circuitry, a memory storing an application, a display, and a processor operatively connected with the communication circuitry, the memory, and the display. The processor executes the method, including: receiving a request to execute the application, outputting an information input screen relevant to executing the application on the display based on the request, receiving at least one piece of input information to be entered into the information input screen, from a specific external electronic device via the communication circuitry, and automatically entering the at least one piece of input information into the information input screen. | 2020-05-14 |
20200151316 | SYSTEMS AND METHODS FOR SENSOR-BASED LAYER VARIATION ON MOBILE DEVICES - The present disclosure generally relates to visually varying an image using parallax image layers, and more specifically, relates to visually varying presentation of an access right displayed on a mobile device to enhance verification of access to resources. The variation of multiple layers of an image may be based on sensor data detected at the mobile device. | 2020-05-14 |
20200151317 | METHOD AND SYSTEM FOR AUTHENTICATING USERS - A method and a system for authenticating users by implementing artificial intelligence techniques is provided. A graphical user interface (GUI) is rendered on a computing device of a user by a server. The GUI displays objects in random motion. The objects are selected in a sequential manner by the user to form a pattern. With each selection of the object, a corresponding confidence score is determined that is based on a set of factors. Further, the selected object becomes static and the remaining objects that are yet to be selected continue to move in random motion. On forming the pattern, the aggregate of confidence scores is determined to authenticate the user. | 2020-05-14 |
20200151318 | AUTOMATIC UPGRADE FROM ONE STEP AUTHENTICATION TO TWO STEP AUTHENTICATION VIA APPLICATION PROGRAMMING INTERFACE - A client transmits a user identifier and a password to a server via an application programming interface (API). The client establishes an authenticated session with the server in which the client has a first set of permissions for operations associated with the API. The client receives, responsive to a verification of the user identifier and password by the server, a logon response and a shared secret. The client generates a one time passcode (OTP) based upon the shared secret. The client sends the OTP to the server via the API. Responsive to the server validating the OTP against the shared secret, the server grants a second set of permissions for operations associated with the API. | 2020-05-14 |
20200151319 | INTEGRATED DEVELOPMENT ENVIRONMENT INFORMATION SHARING FOR AUTHENTICATION PROVISIONING - Resource access credential security is improved by providing authentication tools and techniques which do not rely on embedment of credentials in the source code or configuration files of programs that use the credentials to access secured resources. A program under development in a development tool determines through the operation of authentication code that it is under development and that a developer identity is to be used to obtain access credentials, instead of using an identity of the program itself as occurs when the program is not under development. The development tool may be stand-alone, or may be in an integrated development environment, and may be extensible or not. The program may be an application, a web service, or other software, and may be deployed to a cloud or other networked environment. Authentication may be based on a selected developer identity or selected account or other subscriber data. | 2020-05-14 |
20200151320 | TRUSTED APPLICATION ACCESS CONTROL METHOD AND TERMINAL - Embodiments of the present invention relate to a trusted application access control method and a terminal. The method includes: receiving, by a terminal in a TEE, a request for accessing a target trusted application (TA) that is sent by a client application (CA); determining, by the terminal, a service level of the CA in a trusted execution environment (TEE) based on the request for accessing the target TA; and providing, by the terminal in the TEE by using the target TA, a service corresponding to the service level for the CA. In this way, the target TA provides different levels of services for the CA, and determines, in the TEE, the service level corresponding to the CA, thereby enhancing constraint and limitation of accessing the target TA by the CA, and improving security of accessing the target TA by the CA. | 2020-05-14 |
20200151321 | Catheter Authorization System And Method - In the present invention, a medical device authorization system is employed to associate software contained on a medical computing system/computer, such as an EP mapping and recording system, that pertains to a specific medical device, e.g., a transducer, connected to the computer such that the software is only utilized by the computer in conjunction with a catheter that is authorized for use with the computer. The authorization system utilizes an analog authorization waveform/signal that is mixed with the analog device/catheter measured signals transmitted to the computer. The authorization waveform distorts the measured signals in a manner that renders the signals able to be displayed by the system but unusable, unless the computer includes a signal filter operably connected to the device/transducer interface that is configured to remove the interfering authorization waveform from the measured signal. | 2020-05-14 |
20200151322 | METHODS FOR INCREASING AUTHENTICATION SECURITY - Methods and systems for authenticating an account based on a password are disclosed. In one aspect, a method includes providing a configuration defining a delay criterion for a delay between at least two characters of a password for an account, providing a user interface configured to set the delay criterion for the account based on input received in the user interface setting a user-configurable value for the delay. If the user-configurable value for the delay is received, the delay criterion for the account is set according to the received user-configurable value. If the user-configurable value for the delay is not received, the delay criterion for the account is set to a system-assigned value for the delay. A notification is also provided conveying the system-assigned value for the delay. An authentication request for the account is received, and the delay criterion is enforced when authenticating the account. | 2020-05-14 |