27th week of 2022 patent applcation highlights part 42 |
Patent application number | Title | Published |
20220215072 | MEDIA CONTENT FEED FORMAT FOR MANAGEMENT OF CONTENT IN A CONTENT HOSTING WEBSITE - A system and method for providing a content feed file for a content file to a content host. The method comprises delivering the content file and the content feed file to the content host, wherein the content feed file comprises one or more policies and the one or more policies direct the content host to manage the content file according to the one or more policies. After the content host processes the content file according to the provided policies, the content owner receives a status report wherein the status report comprises information about actions taken by the content host according to the one or more policies. | 2022-07-07 |
20220215073 | SYSTEMS AND METHODS FOR SOFTWARE LICENSE MANAGEMENT USING A DISTRIBUTED LEDGER - Systems and methods for software license management using a distributed ledger are disclosed. A method for software license management may include: receiving, from an agent executed by an electronic device in a computer network, a request for a new software license for the electronic device or for a user; determining that there are no available tokens for associated with the software license in a license inventory; obtaining a license for the software; generating a token for the license, wherein the token comprises an identification of a license type and a software identifier; writing the token to a license distributed ledger with an indication that the token is available; reserving the token for the electronic device or the user and writing the reservation to the license distributed ledger; and adding a second token for the license to an electronic wallet associated with the electronic device or the user. | 2022-07-07 |
20220215074 | END-POINT MEDIA WATERMARKING - Apparatus, systems, methods, and articles of manufacture related to end-point media watermarking are disclosed. An example device includes a media receiver to receive a media signal, a watermark generator to generate a watermark, a trigger to activate the watermark generator to generate the watermark based on an external input, an encoder to encode the media signal with the watermark to synthesize an encoded media signal, a media output to render the encoded media signal. | 2022-07-07 |
20220215075 | TOKENIZED MEDIA CONTENT MANAGEMENT - A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file. | 2022-07-07 |
20220215076 | TOKENIZED MEDIA CONTENT MANAGEMENT - A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file. | 2022-07-07 |
20220215077 | VIDEO COPYRIGHT PROTECTION METHOD - A video content protection method is provided. A video copyright method is provided for protecting copyright on video content by placing information in the video content, wherein information is placed in the video content which identifies a specific user who at a given moment in time is viewing the video content, specifically information relating to the code of the user profile from which the user is viewing the video content, the user's name, and a verified image of the user's face or an image of the user via a web camera, wherein the form of said information and the position in which it is displayed on the screen changes constantly and randomly during the viewing of the video content, thus preventing circumvention of the display of information identifying a specific user in the video content, and impeding unauthorized copying, downloading and subsequent distribution of the video content. | 2022-07-07 |
20220215078 | SECURE ACCESS CONTROL FRAMEWORK USING DYNAMIC RESOURCE REPLICATION - Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths. | 2022-07-07 |
20220215079 | AUTHENTICATION BY A FACIAL BIOMETRIC - In some implementations, a terminal device may receive, from a mobile device associated with a user, first information identifying a first facial depth map of the user generated by the mobile device. The terminal device may generate a second facial depth map of the user. The first facial depth map may be generated before the second facial depth map. The terminal device may determine whether the user is authenticated to perform an exchange based on whether the first information identifying the first facial depth map corresponds to second information identifying the second facial depth map. The terminal device may transmit, to the mobile device and based on determining that the user is authenticated, a message indicating that the user is authenticated. The terminal device may receive, from the mobile device, exchange information identifying a credential for performing the exchange. | 2022-07-07 |
20220215080 | AUTHENTICATION DEVICE AND PROGRAM - To achieve authentication without impairing the appearance of an installation target. There is provided an authentication device including an authentication unit configured to perform authentication based on input identification information, in which the authentication unit specifies, on the basis of the coordinates of an operation subject detected on an operation surface, input information corresponding to such coordinates, and performs authentication using the specified input information as the identification information. | 2022-07-07 |
20220215081 | AUTHENTICATION BASED INTEGRATED LOCK MECHANISM ON COMPUTING DEVICES FOR ENHANCED USER EXPERIENCE - A system and method of authentication-based operation of a lock mechanism include detecting an authentication signal from an electronic authentication module, authenticating the authentication signal using a stored user profile, wherein the stored user profile is used for login authentication purposes and includes at least user data, and when the authentication signal is authenticated, activating an electromechanical mechanism to release a latch switch associated with a lock mechanism. | 2022-07-07 |
20220215082 | METHOD AND APPARATUS FOR FACILITATING THE LOGIN OF AN ACCOUNT - Systems and methods are provided for facilitating account login, wherein the method is implemented by a first server that is associated with a first account. In some embodiments, the method comprises receiving, from a terminal device, a request to log into a second account associated with a second server, wherein the request includes a first identifier associated with the first account and a second identifier associated with the second server. The method further comprises generating account information to be transmitted to the second server based on the first identifier; and transmitting the account information to the second server based on the second identifier; wherein the transmission of the account information enables the second account to be automatically logged into at the second server. | 2022-07-07 |
20220215083 | HEARING DEVICE SYSTEM, DEVICES AND METHOD OF CREATING A TRUSTED BOND BETWEEN A HEARING DEVICE AND A USER APPLICATION - Methods and devices are disclosed. A method, performed in a user application, of creating a trusted bond between a hearing device and the user application is disclosed, wherein the method comprises obtaining first authentication material; transmitting a first authentication request comprising a first authentication type identifier and first authentication data to the hearing device; receiving an authentication response comprising an authentication key identifier; storing an authentication key and the authentication key identifier, wherein the authentication key is based on the first authentication material; and connecting the user application to the hearing device using the authentication key and the authentication key identifier. | 2022-07-07 |
20220215084 | SECURE TOKEN-BASED COMMUNICATIONS BETWEEN A HOST DEVICE AND A STORAGE SYSTEM - An apparatus comprises at least one processing device that is configured to control delivery of input-output operations from a host device to a storage system over selected ones of a plurality of paths through a network. The at least one processing device is further configured to generate a plurality of authentication tokens over time utilizing seed information of the host device, and for each of one or more of the input-output operations, to incorporate a particular one of the authentication tokens into the input-output operation, to send the input-output operation to the storage system, and to receive an indication from the storage system, responsive to the input-output operation sent to the storage system, as to whether or not the authentication token incorporated into the input-output operation matches a corresponding authentication token generated by the storage system. The at least one processing device illustratively comprises at least a portion of the host device. | 2022-07-07 |
20220215085 | JOURNALING SYSTEM WITH SEGREGATED DATA ACCESS - A journaling system provides access to subsets of user information in a segregated fashion. This permits its users to define access settings for their user information thereby limiting which other users may access the user information. In one or more embodiments, the journaling system may include a server or other computing device and one or more storage devices used to store the user information, associated access settings, or both. The access settings may define particular criteria which must be met before a subset of user information may be accessed, and may identify particular users that may access the subset of user information. | 2022-07-07 |
20220215086 | DELEGATED BIOMETRIC AUTHENTICATION - A delegated biometric authentication system and related methods are disclosed. Using the system, a user can securely delegate biometric authentication to a public device from his communication device. This public device may be an Internet of things device that is not owned by the user, such as a computer, smart TV. tablet, etc. The public device may operate in a public place, such as a hotel or library. The communication device may be the users own smartphone or tablet, etc. A fuzzy vault process can be used to store the user's biometric template in the system Embodiments preserver the user's privacy without compromising authentication security and user convenience. | 2022-07-07 |
20220215087 | DYNAMIC PASSWORD GENERATION - Systems, methods and apparatus are provided for altering a static password between entry and authentication using a dynamic logic. A client application may receive entry of a user password and record an amount of pressure associated with the entry. The client application may dynamically select a virtual contact surface material and generate audio files corresponding to writing or typing the password characters on the selected surface material with the recorded amount of pressure. The client application may compress the audio files by embedding them within the same digital space according to a time-based logic. The dynamic password files may be routed to a central server. Data packet fragmentation may further improve security during transmission. The central server may reconstruct the password for authentication using the time-based logic. | 2022-07-07 |
20220215088 | AUTOMATIC DEPLOYMENT OF APPLICATION SECURITY POLICY USING APPLICATION MANIFEST AND DYNAMIC PROCESS ANALYSIS IN A CONTAINERIZATION ENVIRONMENT - A policy interpreter detects that an application container has been added in a container system, and opens a stored manifest for the application container. The policy interpreter retrieves running services information regarding the application container, and generates a security policy for the application container. The security policy defines a set of actions for which the application container can perform, and the set of actions are determined using the manifest and the running service information associated with the application container. The policy interpreter loads the security policy at a security container. The security container blocks an action performed by the application container in response to determining that the action performed by the application container does not match any action in the set of actions defined in the security policy. The policy interpreter transmits the security policy to a graphical user interface container for presentation to a user via a display device. | 2022-07-07 |
20220215089 | Processor with In-Band Fault-Injection Detection - An apparatus for protecting a processor includes an input interface and protection circuitry. The input interface is configured to monitor code instructions that are processed by the processor, one or more of which code instructions including one or more error-detection bits. The protection circuitry is configured to detect an error in the program code using the error-detection bits, and to initiate a responsive action in response to detecting the error. | 2022-07-07 |
20220215090 | Detecting Stack Pivots Using Stack Artifact Verification - Examples of the present disclosure describe systems and methods for detecting and mitigating stack pivoting using stack artifact verification. In aspects, function hooks may be added to one or more functions. When a hooked function executes, artifacts relating to the hooked function may be left on the stack memory (“stack”). The location of the artifacts on the stack may be stored in a local storage area. Each time a hook in a hooked function is subsequently executed, protection may be executed to determine whether an artifact remains in the location stored in the local storage area. If the artifact is no longer in the same location, a stack pivot may be detected and one or more remedial actions may be automatically performed. | 2022-07-07 |
20220215091 | METHOD AND SYSTEM FOR DETECTING COORDINATED ATTACKS AGAINST COMPUTING RESOURCES USING STATISTICAL ANALYSES - Certain embodiments of the present disclosure provide techniques for identifying and blocking anomalous transactions within a computing system. An example method generally includes selecting a set of accounts for analysis. For each respective account, an anomaly score is calculated based on an account number associated with the respective account and transaction amounts associated with the respective account. An aggregated anomaly score is generated for each respective account provider of a plurality of account providers based on the anomaly score associated with each respective account. The aggregated anomaly score for each respective account provider is normalized based on a historical minimum and historical maximum anomaly score for the respective account provider. One or more account providers that are potential targets of anomalous activity are identified. One or more actions are taken to block completion of transactions requested by one or more accounts associated with the identified one or more account providers. | 2022-07-07 |
20220215092 | Method of Training a Module and Method of Preventing Capture of an AI Module - An AI system includes an input interface configured to receive input data from at least one user, and a blocker module configured (i) to detect the received input data is an attack input data, (ii) to manipulate output data of the blocker module, and (iii) to send the output data from the blocker module to the at least one user. The AI system further includes an AI module configured to process the input data received by the blocker module and to generate output data corresponding to the input data. The AI system also includes a blocker notification module configured to transmit a notification to the owner of the AI system on detecting an attack input data, and an output interface configured to send the generated output data to the at least one user. | 2022-07-07 |
20220215093 | Event Monitoring - A computing device may detect events such as a break-in, fire, flood, movement of people between different areas or zones within a defined area, cyberattacks, movement of devices away from the defined area, etc. If an event is detected, the computing device may take action to protect devices, data on the devices, and/or accounts accessible by the devices. The devices may encrypt, backup data, and/or delete data. The computing device may communicate with other computing devices about events that have been detected. | 2022-07-07 |
20220215094 | Protecting Against Memory Deserialization Attacks - Embodiments protect computer applications from memory deserialization attacks. An example embodiment receives a data object at a server hosting a software application. In turn, an aspect of the received data object is compared with a representation of an expected data object. If the comparison identifies a difference between the aspect of the received data object and the representation of the expected data object, a protection action is executed to limit a property of the received data object, thus protecting the software application from a memory deserialization attack. | 2022-07-07 |
20220215095 | Detecting and Preventing Installation and Execution of Malicious Browser Extensions - Aspects of the disclosure relate to detecting and preventing malicious browser extensions. A computing platform may send rule information to a master browser extension on a computing device including a set of rules defining reportable behavior associated with one or more other browser extensions. Subsequently, the computing platform may receive report information from the master browser extension on the computing device identifying an other browser extension of the one or more other browser extensions that exhibit the reportable behavior defined by at least one rule of the set of rules in the rule information. Based on receiving the report information, the computing platform may determine that the identified other browser extension is a malicious extension. Then, the computing platform may send one or more commands to the master browser extension on the computing device directing the master browser extension to disable or remove the identified other browser extension. | 2022-07-07 |
20220215096 | DATA PROTECTION AUTOMATIC OPTIMIZATION SYSTEM AND METHOD - A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository. | 2022-07-07 |
20220215097 | ENHANCED SECURITY APPARATUS FOR MEDIATION BETWEEN CONSOLE PERIPHERAL DEVICES AND HOSTS - A secure mediator for coupling between one or more hosts and one or more consoles comprising one or more peripheral devices. the secure mediator comprises host side ports, each host side port is configured to be connected to a corresponding host, and console side ports, each console side port is configured to be connected to a corresponding peripheral device. The secure mediator comprises: a triggering circuitry; a timing/control circuitry; a setup circuitry; a switching circuitry; and the rest of the mediator circuitries, wherein the triggering circuitry, timing/control circuitry, setup circuitry, and switching circuitry are non-programable circuitries. The mediator has at least two stages: a security setup stage and a normal operation stage. The triggering circuitry is configured to monitor events and to signal these events to the timing/control circuitry in order to trigger a transfer between the security setup stage and the normal operation stage. The timing/control circuitry controls the execution of the security setup stage and transfers the mediator between the security setup stage and the normal operation stage. The setup circuitry performs one or more security functions in the security setup stage to enhance the cyber security of mediator. The switching circuitry, conditioned upon control from the timing/control circuitry, switches between the coupling of: (1) at least one of the host side ports with at least two of any one of (a) the setup circuitry; (b) the rest of the mediator circuitries; (c) one of the console side ports; (d) a null port, and (2) at least one of the console side ports with at least two of any one of (a) the setup circuitry; (b) the rest of the mediator circuitries; (c) one of the host side ports; (d) a null port. | 2022-07-07 |
20220215098 | PROGRAM VERIFICATION METHOD AND APPARATUS, PLATFORM, USER TERMINAL, AND ONLINE SERVICE SYSTEM - The present disclosure relates to a program verification method and apparatus, a platform, a user terminal, and an online service system, includes: acquiring a root evidence of a server-side program from a blockchain network, and acquiring a verification evidence of the server-side program from a server side, where the root evidence is written into the blockchain network after server-side program review succeeds, and the success of the server-side program review indicates a data processing method of the server-side program satisfies a preset data processing rule; verifying whether the root evidence and the verification evidence are matched, where the root evidence and the verification evidence being matched indicates the server-side program is a program that is operated in a TEE of a computer and is not modified after the root evidence is written into the blockchain network; and determining to connect a user-side program to the server-side program. | 2022-07-07 |
20220215099 | METHOD, SYSTEM AND APPARATUS TO PREVENT DENIAL OF SERVICE ATTACKS ON PCIe BASED COMPUTING DEVICES - The disclosure generally relates method, system and apparatus to prevent denial of service (DOS) attacks on PCIe based computing devices. In an exemplary embodiment, an independent register is used in combination with a filter driver and additional logic to form an integrity check for power down instructions. An exemplary system includes a register circuitry corresponding to the IP device, the register circuitry having a designated storage bit to indicate an unlocked state of the register; a filter driver to receive a first power state transition request when the IP device is idle after a predetermined period, the power state transition request defining a timeout period; a controller to change the power state of the IP device to the unlock state; a decision logic to receive and authenticate a second power state transition request in response to validation of register circuitry being unlocked. | 2022-07-07 |
20220215100 | SYSTEMS AND METHODS FOR PREDICTING CYBERSECURITY VULNERABILITIES - Systems and methods are disclosed that predict whether a configuration item of a service provider cloud infrastructure client instance has a vulnerability, prior to scanning for the client instance for the vulnerability. In particular, operating system and/or application information of the vulnerability may be compared to that of the configuration item, operating system and/or application information of past vulnerabilities may be compared to that of the vulnerability, additional vulnerabilities that are solved by solutions that remedy the vulnerability may be compared to the configuration, and/or a machine-learning model may be trained to determine how similar past vulnerabilities of the configuration item are to the vulnerability. Based on one or more of these comparisons, a predicted vulnerable item may be generated that indicates that the configuration item is subject to the vulnerability. | 2022-07-07 |
20220215101 | DYNAMICALLY GENERATING MONITORING TOOLS FOR SOFTWARE APPLICATIONS - Dynamically generating monitoring tools for software applications, including: inspecting, using static code analysis, a non-executable representation of the application to identify one or more points in an application for monitoring; and for each of the one or more points in the application: generating a monitoring program; and inserting, into an executable representation of the application, the monitoring program at a location in the executable representation of the application that corresponds to the identified point in the application. | 2022-07-07 |
20220215102 | SYSTEM AND METHOD FOR CALCULATING AND UNDERSTANDING AGGREGATION RISK AND SYSTEMIC RISK ACROSS A POPULATION OF ORGANIZATIONS WITH RESPECT TO CYBERSECURITY FOR PURPOSES OF DAMAGE COVERAGE, CONSEQUENCE MANAGEMENT, AND DISASTER AVOIDANCE - Embodiments of a computer-implemented system and methods for predicting and/or determining a probability of a cyber-related attack and associated costs are disclosed. | 2022-07-07 |
20220215103 | DATA PROCESSING SYSTEM AND METHOD FOR PROTECTING DATA IN THE DATA PROCESSING SYSTEM - A data processing system has a processor and a system memory. The system memory may be a dynamic random-access memory (DRAM). The processor includes an embedded memory. The system memory is coupled to the processor and is organized in a plurality of pages. A portion of the code or data stored in the plurality of memory pages is selected for permutation. A permutation order is generated and the memory pages containing the portion of code or data is permuted using a permutation order. The permutation order and/or a reverse permutation order to recover the original order may be stored in the embedded memory. Permuting the memory pages with a permutation order stored in the embedded memory prevents the code or data from being read during a freeze attack on the system memory in a way that is useful to an attacker. | 2022-07-07 |
20220215104 | METHODS OF PROVIDING DATA PRIVACY FOR NEURAL NETWORK BASED INFERENCE - Methods and systems that provide data privacy for implementing a neural network-based inference are described. A method includes injecting stochasticity into the data to produce perturbed data, wherein the injected stochasticity satisfies an ε-differential privacy criterion and transmitting the perturbed data to a neural network or to a partition of the neural network for inference. | 2022-07-07 |
20220215105 | INFORMATION PROTECTION APPARATUS, INFORMATION PROTECTION METHOD AND PROGRAM - An information protection device includes a reception unit that receives an image of a screen displayed on a terminal connected to a certain network; an extraction unit that extracts input information for the screen from the image; a determination unit that determines whether or not the input information matches predetermined information; and a control unit that performs, when the input information is determined to be matched with the predetermined information, a control for preventing the input information from being transmitted from the network. | 2022-07-07 |
20220215106 | RESTRICTING ACCESS TO APPLICATION FUNCTIONALITY BASED UPON WORKING STATUS - Examples for determining access to restricted features of an application are disclosed. A current working status of a user account and an access policy can be analyzed to determine whether access to the restricted feature should be granted or denied. The functionality can be provided by a library bundled within an application. | 2022-07-07 |
20220215107 | SYSTEM AND METHODS TO PERFORM ROW LEVEL FIELD MASKING LEVERAGING ATTRIBUTE BASED ACCESS CONTROL IN A MULTI TENANT ENVIRONMENT - A computer implemented masking manager provides a method for access controls. The method includes receiving a request for an object in a database, retrieving the object from the database, applying masking rules to a field of the object to determine whether the requestor has access to the field, determining a replacement value for the field based on requestor access to the field, and returning the object to the requestor with the replacement value in the field of the object. | 2022-07-07 |
20220215108 | CRYPTOGRAPHICALLY SECURE DYNAMIC THIRD PARTY RESOURCES - A system for providing updatable secure content resource. A content server may pay a content resource on the content author for an access by a requester. The content server receives a session request call from the requester prior to accessing the content resource. In response to the session request, the content server generates a session for the requester. The content server generates a payload that includes a location identifying the content resource on the content author and embeds the embedded cryptographic content. The content server transmits the generated payload to the requester. A resource server may receive an authentication access request in response to the embedded cryptographic content. In response to authenticating the authentication access request, the resource server provides the access to the requester. | 2022-07-07 |
20220215109 | NEW INTERNET VIRTUAL DATA CENTER SYSTEM AND METHOD FOR CONSTRUCTING THE SAME - The present disclosure provides a new Internet virtual data center system and a method for constructing the same. The new Internet virtual data center system includes: an Internet data explorer to sample and estimate Internet data to generate a data resource distribution map, the data resource distribution map reflects attribute information of Internet data; an Internet virtual resource library to store data resource distribution map and sample data collected by the Internet data explorer; a data resource distribution map management module to manage data resource distribution map; and a data resource guidance service module to generate and provide guidance service for data collection and mining of a data demander according to data resource distribution map. The present disclosure overcomes the blindness and disorder of the big data collection and development of the existing data centers, and avoids waste of resources and energy. | 2022-07-07 |
20220215110 | SYSTEMS AND METHODS FOR MULTI-TENANT DATA PROTECTION APPLICATION - A system for providing a multi-tenant data protection application includes a server shared by all tenants for access to the provided multi-tenant data protection application. The system further includes business logic for managing tenants of the multi-tenant data protection application, tenant resource allocation and isolation of tenant operating environments. The system additionally includes a database server for creating, managing and maintaining databases, including a master database used to store configuration and monitoring data which is used for tenant management and monitoring, and a plurality of private tenant databases, each used to store tenant-specific configuration, tenant-specific data and associated tenant resources. The system includes one or more data protection engines configured to store a copy of protected data at tenant redundant data stores. | 2022-07-07 |
20220215111 | Data Protection For Container Storage - Data protection for container storage, including: assigning, to a container storage volume of a storage system, a volume-level access policy; and determining whether to allow access to the container storage volume based on the volume-level access policy and one or more attributes of a request for the access, including allowing the access responsive to the one or more attributes meeting the volume-level access policy or denying the access responsive to the one or more attributes failing to meet the volume-level access policy. | 2022-07-07 |
20220215112 | System of Enclaves - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment. | 2022-07-07 |
20220215113 | SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATA - The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user interface that is configured execute function requests. Upon receipt of a function request, a computer can access a predetermined portion of the organization's data, generate an output by executing the requested function based on the predetermined portion of the organization's data, and transmit the output to the user device. | 2022-07-07 |
20220215114 | SYSTEM FOR ENHANCED DATA SECURITY USING VERSIONED ENCRYPTION - Systems, computer program products, and methods are described herein for enhanced data security using versioned encryption. The present invention is configured to electronically receive, from a computing device of a user, a confidential data entry at a first server; encrypt the confidential data entry using a public key at the first server to generate an encrypted confidential data entry; transmit the encrypted confidential data entry to a second server, wherein the encrypted confidential data entry comprises a hash value, wherein the hash value indicates a numbered version of the public key used to encrypt the confidential data entry; and store the encrypted confidential data entry in a database associated with the second server. | 2022-07-07 |
20220215115 | SYSTEMS AND METHODS USING EMULATION FOR END TO END ENCRYPTION - Methods and system implement solutions for integrating encryption and emulation into native database formats and/or architectures. “Native” database is used to describe a database that has not been designed for end to end encryption, an off the shelf database deployment, and/or a commercially available database. According to some embodiments, various encryption systems and methods employ emulation operations to enable a native database and native database functions to leverage full encryption primitives. Various aspects integrate emulation operations into standard database implementations, where the emulation enables native database functions to operate on entirely encrypted data. | 2022-07-07 |
20220215116 | UTILITY OPTIMIZED DIFFERENTIAL PRIVACY SYSTEM - A method, system and apparatus are disclosed. In one or more embodiments, a differential privacy, DP, node is provided. The DP node includes processing circuitry configured to: receive a query request; receive a first input corresponding to a utility parameter; receive a second input corresponding to a privacy parameter; select a baseline DP mechanism type based at least on a query request type of the query request, the first input and the second input, where the baseline DP mechanism type includes at least a noise parameter; generate a noise distribution based on the baseline DP mechanism type using a first value of the noise parameter; and determine a DP query result based on applying the noise distribution to the query request applied on a data set. | 2022-07-07 |
20220215117 | INSTRUCTION EXECUTION THAT BROADCASTS AND MASKS DATA VALUES AT DIFFERENT LEVELS OF GRANULARITY - An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure. The execution unit also includes masking logic circuitry to mask the first replication data structure at a first granularity and mask the second replication data structure at a second granularity. The second granularity is twice as fine as the first granularity. | 2022-07-07 |
20220215118 | LEVERAGING ENTITY DARK WEB CHATTER USING VENDOR POPULATION AS A SEARCH PROXY - A method for reducing a level of private data exposure associated with a selected third party data custodian is provided. The third party data custodian may be associated with a pre-determined entity. The method may be performed on dark web users communications within a dark web portion of the internet. The method may include searching, periodically, the dark web users communications, for retrieving communications that may include text identifying the selected third party data custodian. The method may include identifying one or more communications including the identifying text, and for each identifying text, increasing by one digit a total name count occurrence counter for the selected third party data custodian. when the total name count escalates to a pre-determined magnitude, the method may include, locking the private data residing within a network of the selected third party data custodian from external access. | 2022-07-07 |
20220215119 | PROVIDING AN INPUT DATASET INTO AN INPUT SLOT OF A COMPUTATIONAL STEP OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215120 | PROVIDING A COMPUTATIONAL SCRIPT INTO AN INPUT SLOT OF A COMPUTATIONAL STEP OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215121 | INTERFACES FOR SPECIFYING INPUT DATASETS, COMPUTATIONAL STEPS, AND OUTPUTS OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215122 | SPECIFYING A NEW COMPUTATIONAL STEP OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215123 | SPECIFYING CHARACTERISTICS OF AN OUTPUT DATASET OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215124 | SPECIFYING CHARACTERISTICS OF A PERMISSIBLE QUERY ON AN OUTPUT OF A DATA PIPELINE - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215125 | VIEWING, SELECTING, AND TRIGGERING A DATA PIPELINE TO DERIVE A COLLABORATIVE DATASET - Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or otherwise configure a data privacy pipeline by selecting, composing, and arranging any number of input datasets, computational steps, and contract outputs. (e.g., output datasets, permissible named queries on collaborative data). The interface may allow a contributing party to use one or more unspecified “placeholder” elements, such as placeholder datasets or placeholder computations, as building blocks in a pipeline under development. Parameterized access control may authorize designated participants to access, view, and/or contribute to designated portions of a contact or pipeline. Authorized participants may indicate their approval, and the pipeline may be deployed in the data trustee environment pursuant to the agreed upon parameters. | 2022-07-07 |
20220215126 | DISTANCE PRESERVING HASH METHOD - A computer-implemented method of preparing an anonymised dataset for use in data analytics. The method includes the steps of: (a) labelling elements of a dataset to be analysed according to a labelling scheme; (b) selecting one or more labelled elements of the dataset to be replaced with a distance preserving hash; and for each selected element: (c) partitioning a data plane including the selected element into a plurality of channels, each channel covering a different distance space of the data plane; (d) hashing, using a cryptographic hash, data associated with the channel of the data plane in which the selected element resides, to form the distance preserving hash; and (e) replacing the selected element with the distance preserving hash. | 2022-07-07 |
20220215127 | DATA ANONYMIZATION VIEWS - Systems and methods for anonymizing data are provided herein. A network node can receive privacy constraints from a data owner and utility requirements from at least one data processor. An anonymization mechanism can be selected for each data attribute in a data set, based on its specified privacy constraint and/or utility requirement, from the available anonymization mechanism(s) appropriate for its associated attribute type. | 2022-07-07 |
20220215128 | DE-IDENTIFICATION METHOD FOR BIG DATA - Provided is a de-identification method for big data, for anonymizing the big data so that the big data may be freely distributed to an external system without concern about personal information leakage and enabling a statistical value calculated from the distributed data to be maximally close to a statistical value of original data to thereby secure the reliability of statistical analysis. Records in which values of abstraction reference fields are all the same and the number thereof is less than or equal to N are separately grouped without being excluded from being abstracted, and a connection-type attribute value including an occurrence rate value of a corresponding category attribute value in a group is allocated as an attribute value of an abstracted record to minimize abstraction missing data, so that the statistical value calculated from the distributed data becomes maximally close to the statistical value of the original data. | 2022-07-07 |
20220215129 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - With respect to an information processing device which anonymizes data composed of records including one or more items through statistical processing, the information processing device includes a memory, and a processor configured to acquire a data set to be integrated with the data from a server connected to the information processing device via a communication network, calculate an index value regarding merged data obtained by integrating the data and the data set for each of masking target items indicating items to be masked among the items, and display the index value as a UI for each of the masking target items. | 2022-07-07 |
20220215130 | LEVERAGING ENTITY DARK WEB CHATTER USING SLOPE OF VENDOR IDENTIFIER APPEARANCES AS A SEARCH PROXY - A method for reducing a level of secure data exposure associated with a third party data custodian associated with a pre-determined entity. The method being performed on dark web users electronic communications. The method may include searching the communications that may include text identifying the selected third party data custodian. Simultaneous to the searching, the method may include running a time clock. The method may further include identifying one or more communications including the identifying text and for each identifying text, increasing a total name count by one digit for the selected third party data custodian and assigning a time-stamp of a time of identification of each identifying text. When a rate per unit of time of identification of each identifying text is equal to or greater than a pre-determined rate per unit of time, increasing a monitoring for communications including text identifying the selected third party data custodian. | 2022-07-07 |
20220215131 | ARITHMETIC DEVICE - An arithmetic device includes a first core, a second core, and one or more other cores that perform arithmetic processing. The first core includes a first verification unit that performs a first verification process on a message received from outside of the arithmetic device. The second core includes a verification destination determination processing unit that determines whether or not the second core executes the second verification process on the message based on identification information included in the message. | 2022-07-07 |
20220215132 | METHODS AND SYSTEMS FOR USING DIGITAL SIGNATURES TO CREATE TRUSTED DIGITAL ASSET TRANSFERS - A method and system are provided for transferring digital assets in a digital asset network. Network users can be centrally enrolled and screened for compliance. Standardized transfer processes and unique identifiers can provide a transparent and direct transfer process. Digital assets can include sufficient information for ensuring that a value will be provided, including one or more digital signatures, such that value can be made immediately available to recipients. | 2022-07-07 |
20220215133 | DIGITAL BUILD PACKAGE FOR MANUFACTURING A PRODUCT DESIGN - Techniques regarding manufacturing a desired product from a digital product design are provided. For example, one or more embodiments described herein can regard a system, which can comprise a memory that stores computer executable components. The system can also comprise a processor, operably coupled to the memory, and that executes the computer executable components stored in the memory. The computer executable components can comprise a build package component that canonicalizes manufacturing inputs regarding a product design into a digital build package that enables portability of manufacturing the product design within a network of manufacturing facilities, wherein the digital build package delineates how the product design is to be manufactured and references a computer-aided design file that characterizes the product design. | 2022-07-07 |
20220215134 | ESTIMATING GENERATION CAPABILITY ASSOCIATED WITH A BUILDING DESIGN USING DIGITAL REPLICAS - Methods, computer program products, and/or systems are provided that perform the following operations: obtaining initial design data associated with a building; obtaining geolocation data associated with the building; obtaining environmental data associated with a location based on the geolocation data; simulating the building in an environment using one or more digital replica models, wherein the simulating of the building is based, at least in part, on the initial design data, the geolocation data, and the environmental data; and generating estimates for power generation capability associated with the building based in part on the simulation of the building in the environment. | 2022-07-07 |
20220215135 | Systems And Methods For Training Modelers In Journey-Working - A novel method for training a user of a construction modeling system includes presenting a model file to the user, receiving a request for assistance from the user, processing the request to identify training materials corresponding to the request, presenting indicia of the identified training materials to the user, receiving selection input from the user, and facilitating the modification of the model file by the user based on the presented training material. The request includes information related to a particular portion of a model file of the construction modeling system and information identifying a particular craft. The selection input indicates the selection of at least one of the training materials as a selected training material. In a particular embodiment, the method is carried out in a building information modeling (BIM) application. In another particular embodiment, the method is carried out in BIM application Add-in. | 2022-07-07 |
20220215136 | SYSTEM AND METHOD FOR MULTI-USER SPATIAL IMPACT ANALYSIS AND MANAGEMENT - Methods for CAD operations and corresponding systems and computer-readable mediums are disclosed herein. A method includes accessing ( | 2022-07-07 |
20220215137 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM - An information processing method for causing a computer to perform multi-objective optimization, the information processing method includes: obtaining, by a multi-objective optimization method, a Pareto solution set from a model generated based on data for each of a plurality of objective functions regarding the multi-objective optimization; and updating the model by using a Pareto solution from among the obtained Pareto solution set, the Pareto solution being a solution that has a relatively large variance of values of the objective function in the model. | 2022-07-07 |
20220215138 | Method for Validating System Parameters of an Energy System, Method for Operating an Energy System, and Energy Management System for an Energy System - Various embodiments include a computer-aided method for validating system parameters ascertained by measurement data and serving for a model function η of a component of an energy system, wherein the model function η characterizes a dependence of an output variable of the component on an input variable of the component taking into account the system parameters. The methods include: calculating a standard deviation of the system parameters; calculating a confidence bound based at least in part on the calculated standard deviation; and defining the system parameters as valid if the ratio of confidence bound to the model function is less than or equal to a defined threshold within a value range defined for the input variable. | 2022-07-07 |
20220215139 | DYNAMIC SIMULATION MODELS CONSTANTLY ADAPTING TO THE CHANGES OF COMPLEX SYSTEMS - This invention relates generally to a method for maintaining a correct simulation of a system using simulation models. | 2022-07-07 |
20220215140 | PROCESS FOR DETERMINING REAL TIME RISK, RELIABILITY AND LOSS MITIGATION POTENTIAL FOR ULTRA DEEPWATER WELL CONTROL EQUIPMENT USED FOR OFFSHORE DRILLING OPERATIONS - A risk/reliability assessment tool for ultra-deepwater well control equipment used for offshore drilling operations is disclosed. Embodiments take into consideration all of the processes required for competent risk/reliability assessment for loss mitigation. In an illustrative embodiment, the system provides a simulation tool which evaluates equipment components and simulates the various failure modes for each component and the effect on the other components in the equipment being evaluated. An automated reporting tool quickly identifies components, failure modes for components, and troubleshooting information. | 2022-07-07 |
20220215141 | Generation of Synthetic Data using Agent-Based Simulations - A system, method, and computer-readable medium for generating factual and/or counterfactual data are described. This may have the effect of improving the complexity of data available for training machine learning models. The models may include, but not limited to, a probabilistic graphical model (PGM) and/or an agent-based model (ABM). Further aspects may provide for scrubbing actual data to create a data model that does not reveal the content of the underlying source data. Yet further aspects may provide for validating a data model. | 2022-07-07 |
20220215142 | Extensible Agents in Agent-Based Generative Models - A system, method, and computer-readable medium for generating factual and/or counterfactual data are described. This may have the effect of improving the complexity of data available for training machine learning models. The models may include agent-based models (ABMs) in which the agent definitions are decoupled from the simulation. In one or more aspects, some agents may have attributes and associated behaviors that permit them to be reused in different ABMs to simulate different systems. | 2022-07-07 |
20220215143 | MACHINE LEARNING BASED FASTENER DESIGN - A method includes obtaining an initial set of fastener parameter values for a fastener, executing a neural network model using features extracted at least from the initial set of fastener parameter values to query a fastener description repository, obtaining, from the fastener description repository, a set of possible matching fasteners, and presenting a matching fastener when the matching fastener is in the set of possible matching fasteners. | 2022-07-07 |
20220215144 | Learning Apparatus, Learning Method and Learning Program - A learning device includes: a storage device configured to store input data that contains a plurality of data sets relating to a first event and a plurality of data sets relating to a second event, the number of the data sets relating to the second event being smaller than the number of the data sets relating to the first event; a copula function estimation unit configured to estimate a copula function and a parameter for use in the copula function, based on the data sets relating to the second event; a simulation unit configured to generate a data set relating to the second event through simulation using the copula function and the parameter; and a learning unit configured to learn an estimation model for distinguishing the first event and the second event from each other, with reference to the input data, and the data set relating to the second event generated by the simulation unit. | 2022-07-07 |
20220215145 | MACHINE LEARNING FOR RAPID AUTOMATIC COMPUTER-AIDED ENGINEERING MODELING - A memory stores a representation of geometric features of an object, a machine learning model configured to identify one or more feature families of features of the representation, and feature-specific parameters defining how to mesh the one or more feature families. A processor recognizes and classifies features of the representation into the feature families utilizing the machine learning model, applies feature-specific mesh parameters to the recognized and classified features of the representation, and generates a mesh of the representation in accordance with the feature-specific parameters. | 2022-07-07 |
20220215146 | METHOD FOR RECOGNIZING ANALOG CIRCUIT STRUCTURE - A method for recognizing various analog circuit structures is proposed, which is executed by a computer, the method comprising using the computer to perform the following: performing a feature extraction of a training circuit to extract all sub-circuits for generating multiple training samples; classifying multiple training samples by a classifier to obtain classified building blocks; performing a feature extraction of each schematic of a target circuit to convert as a feature graph and encoding feature graph as a feature matrix; classifying feature matrix by the classifier to generate multiple groups of classified devices; and clustering multiple groups of classified devices to acquire identified sub-circuits. | 2022-07-07 |
20220215147 | Temperature Control Systems And Methods For Integrated Circuits - An integrated circuit system includes a temperature sensor circuit that generates an output indicative of a temperature in an integrated circuit. The integrated circuit system also includes a temperature management controller circuit that compares the temperature indicated by the output of the temperature sensor circuit to a temperature threshold. The integrated circuit system further includes temperature reduction circuitry and/or design compilation techniques and partial or full reconfiguration that controls the temperature in the integrated circuit system. The temperature management controller circuit causes the temperature reduction circuitry to reduce the temperature in response to the temperature indicated by the output of the temperature sensor circuit exceeding the temperature threshold. The temperature sensor circuit, the temperature management controller circuit, and the temperature reduction circuitry may be implemented by soft logic circuits, hard logic circuits, or any combination thereof. | 2022-07-07 |
20220215148 | METHOD AND APPARATUS FOR ELECTROMIGRATION EVALUATION - The present disclosure provides a method and an apparatus for testing a semiconductor device. The method includes providing an active area in an integrated circuit design layout; grouping the active area into a first region and a second region; calculating a first self-heating temperature of the first region of the active area; calculating a second self-heating temperature of the second region of the active area; and determining an Electromigration (EM) evaluation based on the first self-heating temperature and the second self-heating temperature. | 2022-07-07 |
20220215149 | Hard-to-Fix (HTF) Design Rule Check (DRC) Violations Prediction - A method includes: training a machine learning model with a plurality of electronic circuit placement layouts; predicting, by the machine learning model, fix rates of design rule check (DRC) violations of a new electronic circuit placement layout; identifying hard-to-fix (HTF) DRC violations among the DRC violations based on the fix rates of the DRC violations of the new electronic circuit placement layout; and fixing, by an engineering change order (ECO) tool, the DRC violations. | 2022-07-07 |
20220215150 | METHOD AND SYSTEM FOR COMPREHENSIVELY EVALUATING RELIABILITY OF MULTI-CHIP PARALLEL IGBT MODULE - A method and a system for comprehensively evaluating reliability of a multi-chip parallel IGBT module are provided. The method includes: establishing a gate-emitter voltage reliability model of the multi-chip parallel IGBT module, performing a chip fatigue failure test, and selecting a gate-emitter voltage as a failure characteristic quantity; establishing a transconductance reliability model of the multi-chip parallel IGBT module, performing a bonding wire shedding failure test, and selecting a transmission characteristic curve of the module as a failure characteristic quantity; using a Pearson correlation coefficient to characterize a degree of health of the IGBT module, and respectively calculating degrees of health PPMCC | 2022-07-07 |
20220215151 | ELECTROMIGRATION EVALUATION METHODOLOGY WITH CONSIDERATION OF BOTH SELF-HEATING AND HEAT SINK THERMAL EFFECTS - An electromigration (EM) sign-off methodology that analyzes an integrated circuit design layout to identify heat sensitive structures, self-heating effects, heat generating structures, and heat dissipating structures. The EM sign-off methodology includes adjustments of an evaluation temperature for a heat sensitive structure by calculating the effects of self-heating within the temperature sensitive structure as well as additional heating and/or cooling as a function of thermal coupling to surrounding heat generating structures and/or heat sink elements located within a defined thermal coupling volume or range. | 2022-07-07 |
20220215152 | GENERATION OF LAYOUT INCLUDING POWER DELIVERY NETWORK - A method is disclosed including: generating, based on design information for an integrated circuit, a circuit design that includes an initial power delivery network (PDN) for the integrated circuit; performing a pre-layout simulation to the circuit design that includes the initial power delivery network, to determine whether the circuit design meets a predetermined specification; generating a circuit layout of the integrated circuit when the circuit design meets the predetermined specification; and adding at least one additional conductive pillar or at least one additional power rail in the initial power delivery network according to a relationship of a pillar density of the initial power delivery network and a maximum pillar density when the circuit design does not meet the predetermined specification. | 2022-07-07 |
20220215153 | SEMICONDUCTOR DEVICE AND METHOD OF FABRICATING THE SAME - Disclosed are a semiconductor device and a method of fabricating the same. The semiconductor device includes an area-oriented region and a performance-oriented region, standard cells disposed on each of the area-oriented region and the performance-oriented region, and a routing metal layer on the standard cells. The routing metal layer includes first routing lines on the area-oriented region and second routing lines on the performance-oriented region. The smallest line width of the first routing lines is a first width, the smallest line width of the second routing lines is a second width greater than the first width, a pitch between the first routing lines is a first pitch, and a pitch between the second routing lines is a second pitch greater than the first pitch. | 2022-07-07 |
20220215154 | PORTABLE BRAILLE TRANSLATION DEVICE AND METHOD - Devices and methods use a processor, a scanner, and a display screen. The processor is used to recognize Braille characters within the field of view of the scanner. The processor is used to convert the Braille characters into text, and the display screen is used to display the text visibly. | 2022-07-07 |
20220215155 | DATA LINKING WITH VISUAL INFORMATION - Provided are embodiments for performing data linking with visual information. Embodiments include receiving a form including at least one or more entities, determining a visual location information of the at least one or more entities in the forms, and identifying one or more attributes in the form. Embodiments also include linking the at least one entity with one or more attributes using the visual location information of the at least one entity, and providing structured data linking the at least one entity with the one or more attributes. | 2022-07-07 |
20220215156 | METHODS FOR SHUT-IN PRESSURE ESCALATION ANALYSIS - Methods for using shut-in pressures to determine uncertainties in a hydraulic fracturing process in a shale reservoir are described. Data commonly collected during multistage fracturing is used to calculate propped fracture height and induced stresses, as well as other variables, in the presence of horizontal stress anisotropy. These variables can then be incorporated into reservoir simulations to improve the fracturing monitoring, forecast hydrocarbon recoveries, or modify fracturing plans. | 2022-07-07 |
20220215157 | INDEPENDENT RENDERING ENGINE FOR A USER INTERFACE INTERNATIONALIZATION - Methods and systems are disclosed for an independent internationalization (“i18n”) engine for loading language content into a Domestic Object Model (“DOM”). An application can receive a markup file. The markup file can include language markers and an object map. The object map can map the language markers to language content in a language library. The application can construct a DOM from the markup file. An i18n engine of the application can retrieve language content from the language library using the object map. The i18n engine can insert the language content into objects in the DOM according to their corresponding language markers. The application can display the markup file using the DOM with the included language content. | 2022-07-07 |
20220215158 | EDITING PARAMETERS - In some embodiments, a method is provided for updating an editing parameter for a model for automatically suggesting revisions to text data. The method may include displaying, on a graphical user interface (GUI) of a user device, one or more interactive input elements, wherein each of the one or more input elements is associated with an editing parameter for a model for automatically suggesting revisions to text data. The method may include receiving, via the GUI, an input from a selected input element of the one or more input elements, wherein the input comprises an indication of a value for a selected editing parameter associated with the selected input element. The method may include updating the selected editing parameter for the model based on the value. The method may include using the model with the updated selected editing parameter to apply an edit operation to an obtained text-under-analysis. | 2022-07-07 |
20220215159 | SENTENCE PARAPHRASE METHOD AND APPARATUS, AND METHOD AND APPARATUS FOR TRAINING SENTENCE PARAPHRASE MODEL - This disclosure relates to a natural language processing technology, and provides a sentence paraphrase method and apparatus. The method includes: paraphrasing an input sentence by using a sentence paraphrase model, to generate a plurality of candidate paraphrased sentences; and determining a similarity between each of the plurality of candidate paraphrased sentences and the input sentence, to obtain an output sentence whose similarity to the input sentence is greater than or equal to a preset threshold, where each of a plurality of paraphrased sentence generators in the sentence paraphrase model includes one neural network, the plurality of paraphrased sentence generators are trained by using source information and similarity information as a first reward, and the paraphrased sentence is obtained by paraphrasing the training sentence by using the plurality of paraphrased sentence generators. In the sentence paraphrase method, diversity of a paraphrased sentence and quality of the paraphrased sentence can be improved. | 2022-07-07 |
20220215160 | ACTIVELY ADAPTED KNOWLEDGE BASE, CONTENT CALIBRATION, AND CONTENT RECOGNITION - Systems for automatic document generation automatic content recognition may comprise a storage medium and a processor coupled to the storage medium. The processor may generate and/or process a document template and receive client data. In some embodiments, the processor may automatically determine whether the client data is compliant with at least one content control standard based on a comparison between the client data and at least one text variant and, if so, may automatically generate a processed document using the client data and the document template. In some embodiments, the processor may establish at least one normative form for the document template, automatically compare the client data with the normative form content, automatically recognize that the client data corresponds to the document template based on the comparing, and automatically generate a processed document using the client data and the document template. | 2022-07-07 |
20220215161 | Customized User Prompts for Autofilling Applications - An example method includes determining a subset of content displayed by an application on a user interface (UI) of a user device, wherein the subset excludes user-specific information. The method further includes transmitting a request to a remote provider for at least one template for use with the application, wherein the request comprises the subset of content displayed on the UI. The method also includes receiving a response to the request from the remote provider, wherein the response comprises the at least one template indicating how to process user input data in one or more text input fields displayed by the application on the UI. The method further includes generating a prompt to authorize transmission of the one or more user input values to the remote provider for future use in autofill, wherein the prompt is customized by processing the one or more user input values using the at least one template. | 2022-07-07 |
20220215162 | PROCESSING METHOD FOR PRESENTING INDICATOR HIERARCHY AND CLASSIFICATION OF DATA IN SPREADSHEET - The present disclosure provides a processing method for presenting an indicator hierarchy and classification of data in a spreadsheet. In this method, an indicator index structure S is constructed and a spreadsheet is used to present information based on user selections. The information includes an indicator and a hierarchy of the indicator, an indicator classification description and a hierarchy of the indicator classification description, an application scenario between an indicator and an indicator classification description, and other implicit attributes. This way, indicator descriptions can be neater and more readable. Data in a two-dimensional spreadsheet can be accurately presented and the spreadsheet is more comprehensible. In addition, indicators and indicator classification descriptions can be flexibly combined to present data in a more diversified, flexible, and personalized manner. | 2022-07-07 |
20220215163 | ELECTRONIC APPARATUS FOR PROVIDING INFORMATION AND DATA PROVIDING METHOD THEREOF - According to the present disclosure, provided is a method of an electronic apparatus for providing information related to a fulfillment center, wherein the method includes confirming data request information for requesting data related to the fulfillment center, acquiring first data corresponding to the data request information from at least one other apparatus connected to the electronic apparatus, and generating second data by processing the first data based on template information corresponding to the data request information. | 2022-07-07 |
20220215164 | SYSTEMS AND METHODS FOR GUIDED NATURAL LANGUAGE TEXT GENERATION - The presently disclosed embodiments may include a computer readable medium including instructions that when executed by one or more processing devices cause the one or more processing devices to perform a method. The method may include: analyzing an electronic document text; identifying in the electronic document text a first drafted text element to be modified; causing the first drafted text element to be highlighted to a user on a display; generating at least one text output option that conveys a meaning associated with the first drafted text element but includes one or more changes relative to the first drafted text element; and causing the at least one text output option to be shown to the user via the display. | 2022-07-07 |
20220215165 | Systems and Methods for Constructing Textual Output Options - The presently disclosed embodiments may include a computer readable medium including instructions that when executed by one or more processing devices cause the one or more processing devices to perform a method. The method may include: analyzing an electronic document text; identifying in the electronic document text a first drafted text element to be modified; causing the first drafted text element to be highlighted to a user on a display; generating at least one text output option that conveys a meaning associated with the first drafted text element but includes one or more changes relative to the first drafted text element; and causing the at least one text output option to be shown to the user via the display. | 2022-07-07 |
20220215166 | SYSTEMS AND METHODS FOR CONSTRUCTING TEXTUAL OUTPUT OPTIONS - The presently disclosed embodiments may include a computer readable medium including instructions that when executed by one or more processing devices cause the one or more processing devices to perform a method, The method may include: analyzing an electronic document text; identifying in the electronic document text a first drafted text element to be modified; causing the first drafted text element to be highlighted to a user on a display; generating at least one text output option that conveys a meaning associated with the first drafted text element but includes one or more changes relative to the first drafted text element, and causing the at least one text output option to be shown to the user via the display. | 2022-07-07 |
20220215167 | DEEP LEARNING BASED AUTOMATIC ONTOLOGY EXTRACTION TO DETECT NEW DOMAIN KNOWLEDGE - A system processes unstructured data to identify a plurality of subsets of text in a set of text in the unstructured data and determines, for a subset from the plurality of subsets, probabilities based on a position of the subset in the set of text, a part of speech (POS) of each word in the subset, and POSs of one or more words on left and right hand sides of the subset, a number of the one or more words being selected based on a length of the set of text. The system generates a feature vector for the subset, the feature vector including the probabilities and additional features of the subset; and classifies, using a classifier, the subset into one of a plurality of classes based on the feature vector for the subset, the plurality of classes representing an ontology of a domain of knowledge. | 2022-07-07 |
20220215168 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM - The occurrence cost of unknown words that are not registered in a morphological analysis dictionary is calculated by applying an occurrence cost regression model, which is a learning model. An information processing device includes a notation feature amount extraction unit that extracts a notation feature amount of a character string, a part-of-speech feature amount extraction unit that extracts a part-of-speech feature amount of the character string, and an occurrence cost estimation unit that receives the notation feature amount and the part-of-speech feature amount and calculates an occurrence cost of the character string by applying an occurrence cost regression model. The occurrence cost regression model is a learning model that estimates the occurrence cost from the notation feature amount and the part-of speech feature amount of a character string, generated by a learning process using registration data of an existing morphological analysis dictionary as teacher data. | 2022-07-07 |
20220215169 | COMBINING MULTIPLE MESSAGES FROM A MESSAGE QUEUE IN ORDER TO PROCESS FOR EMOJI RESPONSES - Disclosed herein are system, method, and computer program product embodiments for providing an untrained machine learning model with a combined message and an appropriate emoji reaction icon. An embodiment operates by receiving a first and second user message. The first and second user comprises a first and second user text or a first and second user-inserted emoji reaction icon, respectively. The first or second user text is associated with a first or second system-specified emoji reaction icon, respectively. Thereafter, the first user message is determined to be associated with the second user message, the combined message is created based on the first and second messages, and the appropriate emoji reaction is identified as associated with the combined message. The combined message and associated appropriate emoji reaction icon are then sent to an untrained machine learning model configured to for training. | 2022-07-07 |
20220215170 | FRAMEWORK FOR CHINESE TEXT ERROR IDENTIFICATION AND CORRECTION - A method, computer program, and computer system is provided for text error identification and correction. A text input having a phonetic component and a glyphic component is received. Information corresponding to the phonetic component and the glyphic component is coded as a fixed-length sequence. One or more candidate replacement words corresponding to the fixed-length sequence are identified. At least a portion of the text input is replaced with a candidate replacement word from among the one or more candidate replacement words. | 2022-07-07 |
20220215171 | PATENT DOCUMENT CREATING DEVICE, METHOD, COMPUTER PROGRAM, COMPUTER-READABLE RECORDING MEDIUM, SERVER AND SYSTEM - The present invention relates to a patent document creating device, method, computer program, computer-readable recording medium, server and system. The patent document creating device, according to one embodiment of the present invention, may comprise: a constituent element management unit for managing information on a constituent element which may be included in the content of a patent document; an autocomplete list generation unit for generating a data set on the basis of the information on the constituent element managed by the constituent element management unit, and generating an autocomplete list on the basis of a result extracted from the data set by having text, inputted by a user, as a keyword; and a text input element management unit for managing a text input element capable of receiving, as input, text from the user, extracting, as autocomplete keywords, some of the text inputted in the text input element and transferring same to the autocomplete list generation unit, outputting, on a screen, an autocomplete list generated on the basis of the autocomplete keywords, and when the user selects any one item included in the autocomplete list, replacing the autocomplete keywords with the selected item and outputting same in the text input element. | 2022-07-07 |