32nd week of 2022 patent applcation highlights part 50 |
Patent application number | Title | Published |
20220253503 | GENERATING INTERACTIVE SCREENSHOT BASED ON A STATIC SCREENSHOT - Aspects of the disclosure provide for mechanisms for generating interactive screenshot based on a static screenshot. A method of the disclosure includes extracting application markers within a screenshot, determining, based on the application markers, an application in the screenshot, extracting content markers within the application of the screenshot based on the application, obtaining a Uniform Resource Locator (URL) associated with each of the extracted content markers, generating an interactive element based on each of the extracted content markers and corresponding URL, and updating each of the extracted content markers with a corresponding generated interactive element. | 2022-08-11 |
20220253504 | SOLVING INTEGER LINEAR PROGRAMMING PROBLEMS ON OPTIMIZATION SOLVER MACHINES - According to an aspect of an embodiment, operations include receiving an Integer Linear Programming (ILP) problem including an objective function and a set of constraints on integer variables of the objective function. The operations may further include determining a lower bound vector for the integer variables and determining an upper bound vector for the integer variables. The operations further include obtaining a binary variable representation of each of the integer variables and updating the received ILP problem based on the obtained binary variable representation. The operations further include generating a Quadratic Unconstrained Binary Optimization (QUBO) formulation of the updated ILP problem and submitting the generated QUBO formulation to a first optimization solver machine. The operations further include receiving a solution of the submitted QUBO formulation and determining an integral solution of the received ILP problem. | 2022-08-11 |
20220253505 | FEEDBACK APPARATUS AND FFT/IFFT PROCESSOR - A feedback apparatus and an FFT/IFFT processor. The apparatus comprises a radix-4 cascading operation module; radix-4 cascading operation module comprises: a twiddle factor generating unit, a complex multiplier, a delay switching unit, a butterfly operation unit, and an output switching unit; delay switching unit connects to the butterfly operation unit, complex multiplier, and output switching unit, respectively; and output switching unit connects to butterfly operation unit and delay switching unit. In present invention, on basis of the complex multiplier being fully utilized, and by using a dual-delay feedback structure circuit and designing a data delay buffer channel, the use efficiency of complex adders/subtractors is more effectively improved, the number of complex adders/subtractors required is evidently reduced, and circuit efficiency is significantly improved, thus effectively solving the problem in which radix-4SDF and radix-4SDC structures occupy a relatively large number of complex adders/subtractors. | 2022-08-11 |
20220253506 | IMPLEMENTING DILATED CONVOLUTION IN HARDWARE - A method and data processing system implement dilated convolution operations in hardware. Embodiments provide various ways to implement a dilated convolution based on a number of constituent convolutions, by either splitting the kernel to construct a set of constituent convolutions with smaller kernels, or dividing the input data into multiple parts and applying a convolution to each part separately. The constituent convolutions are evaluated in hardware and their results are combined to produce the result of the dilated convolution. | 2022-08-11 |
20220253507 | INFORMATION PROCESSING APPARATUS - A first transforming unit divides a sparse matrix into a first submatrix including a row in which the number of non-zero elements is a predetermined number or more and a second submatrix including a row other than the row, and transforms the first submatrix into a row-major order dense matrix format. A second transforming unit divides the second submatrix into a third submatrix including a column in which the number of non-zero elements is a predetermined number or more and a fourth submatrix including a column other than the column, and transforms the third submatrix into a column-major order dense matrix format. A third transforming unit divides the fourth submatrix into a fifth submatrix and a sixth submatrix, and transforms the fifth submatrix into a row-major order sparse matrix compression format. A fourth transforming unit transforms the sixth submatrix into a column-major order sparse matrix compression format. | 2022-08-11 |
20220253508 | CONSECUTIVE APPROXIMATION CALCULATION METHOD, CONSECUTIVE APPROXIMATION CALCULATION DEVICE, AND PROGRAM - A computer calculates interference fringe phase estimated value data ( | 2022-08-11 |
20220253509 | NETWORK-BASED CUSTOMIZED BROWSING NOTIFICATIONS - A method may include accessing, using a web browsing application, content from a URL; categorizing, using a plugin to the web browsing application, the content from the URL; retrieving an impact score with respect to a data set of a user based on the categorization; determining that the impact score is above a threshold value; and presenting by the plugin, an impact user interface in response to the determining, the impact user interface comprising an indication of a potential impact to the data set of the user based on the impact score | 2022-08-11 |
20220253510 | Web Browser Extension Script Obfuscation System - A computing device comprising a web browser processes instructions to load, by the web browser, first executable code of a browser extension. The first executable code causes the web browser to load a file, wherein the file comprises file content and metadata. The web browser decodes second executable code from the metadata and processes the second executable code to extract obfuscated information embedded in the file content. The web browser extracts third executable code from the extracted obfuscated information and provides, to a user of the computing device, first browser extension functionality by processing the first executable code and second browser extension functionality by executing the third executable code. | 2022-08-11 |
20220253511 | Systems and Methods for Using Typing Characteristics for Authentication - Disclosed herein are methods, devices, and systems for provide a new two-factor or user authentication procedure. In a scenario in which a user is enrolled in the verification system, a method can include receiving, at a network-based server, a unique identifier associated with a user that desires to access a service from an application or a website, identifying a typing profile associated with the unique identifier and presenting a reference text on a user device of the user. The method can include receiving a typing pattern of the user and determining whether there is a match between the typing pattern and one or more previously recorded typing patterns for the user. When the determination indicates that the user is verified, the method includes presenting a one-time password on a display of the user device. The user enters the one-time password into an input field and validating, via the network-based server, the one-time password. | 2022-08-11 |
20220253512 | AUTHENTICATING AND VERIFYING USERS WITH UNIQUE IDENTIFICATION NUMBERS AND FINGER VEIN PATTERNS - Techniques for executing authenticated and verified transactions using a finger vein pattern in combination with a Unique Identification Number (UIN) is disclosed. The techniques may be used to process one or more payment transactions between a registered customer and a registered merchant. The UIN and the finger vein pattern of the customer authorize payment to a merchant once a match is authenticated and verified based on the UIN and finger vein pattern. | 2022-08-11 |
20220253513 | BIOMETRIC-BASED GRADED AUTHENTICATION SYSTEMS AND METHODS - Biometric-based graded authentication provides a passive, graded authentication system, which uses face authentication to provide users access to their devices without requiring manual interaction with the lock screen. Biometric-based graded authentication permits users to categorize applications into various security bins based on their sensitivity. By doing so biometric-based graded authentication method grants access to different sensitivity applications, based on varying degrees of confidence in user authentication. Thus, allowing the device to be used even in adverse lighting conditions without hampering user experience. While the use of face authentication is used to discuss the system, biometric-based graded authentication as disclosed herein may be used with any confidence-based biometric system. | 2022-08-11 |
20220253514 | Method and system for seamless biometric system self-enrollment - Disclosed herein are methods, apparatus, and systems for seamless biometric self-enrollment. The method including automatically: capturing, by a biometric capture device, biometric modality data for a user in response to a presentation of a user trusted credential for logical access or access to an object during an enrollment process, determining, by an enrollment system, whether biometric modalities for the user are stable, generating a biometric modality template for each unstable biometric modality, replacing a matched stored biometric modality template with the biometric modality template when the biometric modality template is qualitatively better than the matched stored biometric modality template, performing stability accounting when the matched stored biometric modality template is at least qualitatively equal to the biometric modality template, and initiating access processing when at least all biometric modalities are stable and verified. | 2022-08-11 |
20220253515 | FINGERPRINT AUTHENTICATION METHOD AND FINGERPRINT AUTHENTICATION DEVICE - Various example embodiments are directed to a fingerprint authentication method and a fingerprint authentication device. The fingerprint authentication method includes acquiring target fingerprint data of a user using at least one fingerprint sensor, determining a preliminary authentication result of the target fingerprint data based on at least one historical fingerprint data stored in memory, performing a matching check on the preliminary authentication result, and determining a final authentication result of the target fingerprint data based on results of the matching check. | 2022-08-11 |
20220253516 | DEVICE AND METHOD FOR AUTHENTICATING USER AND OBTAINING USER SIGNATURE USING USER'S BIOMETRICS - The present invention relates to a device and method for authenticating users and obtaining user signatures, which can be provided in business services using networks and various user information devices including information devices equipped with touch displays such as smartphones, or desktop PCs, laptops, tablet PCs, CCTVs, IoT, self-driving cars, drones, etc. and, more specifically, to a device and method for authenticating users and obtaining user digital signatures which, as an encryption key/password generation and verification system for user authentication to be provided in various web-based businesses in which various information devices are serviced in a client-server or peer-to-peer model network environment and in app-based businesses running on a specific platform, is simpler and ensures confidentiality and security. | 2022-08-11 |
20220253517 | COMPOSITE DEVICE AND PROGRAM - A composite device with a high security level is provided. A composite device capable of inhibiting unauthorized use favorably is provided. The composite device includes a control portion, a detection portion, an authentication portion, and a memory portion. The detection portion has a function of detecting a touch and a function of obtaining first fingerprint data of a finger touching the detection portion. The authentication portion has a function of executing user authentication processing. The memory portion has a function of retaining second fingerprint data registered in advance. The control portion has a function of bringing a system into an unlocked state when the authentication portion authenticates a user and a function of comparing the first fingerprint data obtained by the detection portion and the second fingerprint data when the detection portion detects a touch, and bringing the system into a locked state in the case where those data do not match. | 2022-08-11 |
20220253518 | APPROVAL SYSTEM - According to one embodiment, an approval system includes an information processing apparatus and a biometric authentication device. The information processing apparatus includes a first interface and a first processor. The first processor is configured to: receive a sensor signal; when a state satisfying a predetermined condition related to data indicated by the sensor signal occurs, transmit an approval request signal to the biometric authentication device; and perform the countermeasure processing when an approval response signal is received from the biometric authentication device. The biometric authentication device includes a second interface, a storage unit, a biometric sensor, a second processor. The second processor is configured to: cause the biometric sensor to acquire the biometric information when the approval request signal is received; and transmit the approval response signal when the biometric information acquired by the biometric sensor and the biometric information stored in the storage unit are identified with each other. | 2022-08-11 |
20220253519 | FACE AUTHENTICATION SYSTEM AND ELECTRONIC APPARATUS - A face authentication system of the present disclosure includes: a surface-emitting light source that irradiates a subject with light, and enables control of light emission/non-light emission in pixel units; an event detection sensor including an event detector that detects, as an event, that a change in luminance of a pixel that photoelectrically converts entering light from the subject exceeds a predetermined threshold, and a pixel signal generator that generates a pixel signal of a gray-scale voltage generated by photoelectric conversion; and a signal processor that performs authentication of a face that is the subject on the basis of a detection result of the event detection sensor and the pixel signal generated by the pixel signal generator. In addition, an electronic apparatus of the present disclosure includes a face authentication system having a configuration described above. | 2022-08-11 |
20220253520 | METHODS AND SYSTEMS FOR VERIFYING APPLICATIONS - An application installed on a user device (e.g., a mobile device, a smart device, a communication device, a computing device, etc.) may be used to validate, authenticate, and/or authorize another application installed on and/or associated with the user device. | 2022-08-11 |
20220253521 | IMAGE FORMING APPARATUS CAPABLE OF EXECUTING APPLICATION PROGRAMS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An image forming apparatus which is capable of effectively preventing leakage of confidential information from an application program while reducing effects on the performance of the image forming apparatus. The application program includes a plurality of control codes and a plurality of data. Each of the control codes is loaded so as to be executed. The control codes include encrypted control codes and unencrypted control codes. In a loading process, it is determined whether or not key information for use in decryption in a case where the control code to be loaded is encrypted has integrity, and it is determined whether or not the control codes including the control code to be loaded have integrity. When it is not determined that the control codes have integrity, the encrypted code to be loaded is not loaded or decrypted even if it is determined that the key information has integrity. | 2022-08-11 |
20220253522 | CONTINUES INTEGRATION AND CONTINUES DEPLOYMENT PIPELINE SECURITY - A computer-implemented method for Continues Integration and Continues Deployment (CICD) pipeline security check is provided according to embodiments of the present disclosure. In the method, a plurality of events is executed sequentially to create a CICD pipeline. The plurality of events is monitored. Moreover, a security status of the CICD pipeline is determined based on the monitored events and a model for predicting the security status of the CICD pipeline. | 2022-08-11 |
20220253523 | ONBOARD INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY RECORDING MEDIUM - A processor is configured to determine whether or not target data, this being data that a first application is attempting to access, is permitted data based on a correspondence relationship list, and to permit the first application to access the target data in cases in which the processor has determined the target data to be the permitted data, and not to permit the first application to access the target data in cases in which the processor has determined the target data not to be the permitted data. | 2022-08-11 |
20220253524 | Malware Detection System - A behavioral monitor executing in user space generates a plurality of filters corresponding to a plurality of processes executing in the user space. A first process transmits a system call to a corresponding filter of the plurality of filters in kernel space. The first process receives a signal from the corresponding filter. The first process analyzes the arguments submitted in the system call. The first process determines that the arguments may be associated with malicious activity. The first process generates an event and transmitting the event to the behavioral monitor. The behavioral monitor analyzes the event to determine whether the event is associated with malicious activity. The behavioral monitor causes a process group associated with the first process to cease executing and restores a previous version of the at least one file modified by the process group. | 2022-08-11 |
20220253525 | Method, System and Apparatus for Error Correction Coding Embedded in Physically Unclonable Function Arrays - The disclosure generally provides methods, systems and apparatus for an improved a Physically Unclonable Function (PUF). In one embodiment, the disclosure relates to a method to provide data from a Physically Unclonable Function (PUF) circuit array. The method includes storing a plurality of first data bits into a respective ones of a plurality of first bitcells of the PUF array to form a first dataset; storing a plurality of second data bits into a respective ones of a plurality of second bitcells of the PUF array, the plurality of second data bits defining a helper dataset; reading the first dataset from the plurality of first bitcells to provide a fist read dataset; applying an error correction factor to the first read data dataset to form a security key dataset; and outputting the security key dataset from the PUF circuit array. | 2022-08-11 |
20220253526 | INCREMENTAL UPDATES TO MALWARE DETECTION MODELS - A machine learning model is sequentially fine-tuned with new training data as the training data becomes available. By using a suitable mix of old and new data, and weighting samples in the training data by age, the model can be efficiently updated to maintain accuracy against a changing malware landscape without manual modifications of the network layers or the computational expense of full retraining. | 2022-08-11 |
20220253527 | SCANNING OF PARTIAL DOWNLOADS - There is disclosed in one example a hardware computing platform, including: a processor; a memory; a network interface; and a security module, including instructions to cause the processor to: receive a request to download a file via the network interface; download a first portion of the file into a buffer of the memory; analyze the first portion for malware characteristics; assign a security classification to the file according to the analysis of the first portion; and act on the security classification. | 2022-08-11 |
20220253528 | SYSTEM AND METHOD OF FILELESS MALWARE DETECTION AND NON-TRANSITORY COMPUTER READABLE MEDIUM - The present disclosure provides a system and a method of fileless malware detection, and the method of the fileless malware detection includes steps as follows. The execution of the writable section in the memory is intercepted; the executable code corresponding to the execution is extracted from the writable section; whether the executable code is malicious is analyzed. | 2022-08-11 |
20220253529 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An attribute selection section ( | 2022-08-11 |
20220253530 | MOBILE COMMUNICATION PERIPHERAL, SYSTEM FOR PROTECTING A MOBILE TERMINAL AND COMMUNICATION METHOD - The portable peripheral ( | 2022-08-11 |
20220253531 | DETECTION AND TRAIL-CONTINUATION FOR ATTACKS THROUGH REMOTE PROCESS EXECUTION LATERAL MOVEMENT - Infrastructure attacks are identified by monitoring system level activities using software agents deployed on respective operating systems and constructing, based on the system level activities, an execution graph comprising a plurality of execution trails. A connection to a remote server executing on a first one of the operating systems is identified, where the connection is initiated by a remote execution function executing on a second one of the operating systems. A connection is formed between the first operating system and the second operating system in a global execution trail in the execution graph. A new process created on the first operating system is determined to be associated with a logon session resulting from the connection, and behavior exhibited from the logon session is attributed to the global execution trail in the execution graph. | 2022-08-11 |
20220253532 | ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS - Systems, computer program products, and methods are described herein for dynamically generating linked security tests. The present invention may be configured to perform security tests on an application, generate, based on the results of the security tests, security test sequences that include at least one security test that the application failed, perform the security test sequences on the application, and, iteratively and until the application passes each security test sequence in an iteration, generate additional security test sequences. The present invention may be further configured to provide results of the security tests and security test sequences to one or more machine learning models to generate supplementary security test sequences and determine probabilities of the application failing the supplementary security test sequences. | 2022-08-11 |
20220253533 | METHOD, DEVICE, AND COMPUTER READABLE MEDIUM FOR DETECTING VULNERABILITY IN SOURCE CODE - Provided is a method including: obtaining source code; extracting value assignment lines by parsing the source code; detecting first lines based on keywords among the value assignment lines; detecting second lines based on credential patterns among the value assignment lines; determining third lines from among the first lines, based on the number of lines that satisfy a certain condition among the first lines; and outputting vulnerabilities in the second and third lines. | 2022-08-11 |
20220253534 | TESTING CLOUD APPLICATION INTEGRATIONS, DATA, AND PROTOCOLS - Provided are systems, methods, and computer-readable medium for a simulation platform that can generate simulated activity data for testing a security monitoring and control system. In various examples, the simulation platform can parse the activity data from a cloud service to generate a template, where each entry in the template describes an action and the fields associated with the action. The simulation platform can further generate a configuration that describes a test scenario. The simulation platform can use the configuration and the template to generate the particular action, including randomizing some or all of the fields of the action. When input into the security monitoring and control system, the system can operate on the simulated activity data in the same way as when the system ingests live activity data. | 2022-08-11 |
20220253535 | IOT DEVICE RISK ASSESSMENT - A first device governs operation of a second device based on a network security risk posed by the second device. The second device is disposed locally to the first device and in local network communication with the first device. The first device is in network communication with a cloud-based computational service. | 2022-08-11 |
20220253536 | MEMORY CONTROLLER FOR IMPROVING DATA INTEGRITY AND PROVIDING DATA SECURITY AND A METHOD OF OPERATING THEREOF - A memory controller for improving data integrity and providing data security. The memory controller including a transmit data path to transmit write data to a memory device, the transmit data path comprising a scrambling component, wherein the scrambling component includes a scrambling logic and an exclusive OR logic, wherein the write data is divided into a first portion and a second portion, wherein input of the scrambling logic comprises the first portion of the write data and an address associated with the write data to generate a pseudo-random output, and wherein input of the exclusive OR logic comprises the second portion of the write data, the pseudo-random output and a fixed seed corresponding to the first portion of the write data to generate a scrambled data. | 2022-08-11 |
20220253537 | SECURE DATA BACKUP METHOD, SECURE DATA RESTORATION METHOD, AND ELECTRONIC DEVICE - This application provides a data encryption method, a data decryption method, a secure data backup method, a secure data restoration method, and an electronic device. Different types of data packets in the card data are separately encrypted by using a secure element SE and a trusted execution environment TEE. In the encryption process, a user and a third-party card data provider are introduced, and are separately responsible for generation, storage, and delivery of one of key factors. Then, a real backup key is generated with reference to a key factor provided by a mobile phone party. After being encrypted in the SE and the TEE by using the backup key, the card data is uploaded to a cloud server for backup. The application can ensures data backup security in the SE and the TEE. | 2022-08-11 |
20220253538 | METHOD AND SYSTEM FOR DATA SECURITY, VALIDATION, VERIFICATION AND PROVENANCE WITHIN INDEPENDENT COMPUTER SYSTEMS AND DIGITAL NETWORKS - A system and method for reliably and securely recording and storing all attributes of data, such as for the identification and authorization of individual identity as well as attributes relating to it and personal data including but not limited to individual's physical description, bank details, travel history, etc. (the “Personally Identifiable Information “PII”). PII can be difficult to manage in networks where correlation between data sources is required. Thus, in some embodiments, the system combines a distributed database to create a framework for a robust security. The system manages the distributed database to associate transactions, or actions, using data, digital signatures, and/or cryptographic keys, which can be unique to an individual. | 2022-08-11 |
20220253539 | SYSTEM AND METHOD FOR ROUTING DATA TO AUTHORIZED USERS BASED ON SECURITY CLASSIFICATION OF DATA - A system for classifying a data item to communicate to authorized users extracts features from the data item, where the features comprise a responsibility feature and a sensitivity feature. The responsibility feature indicates a job responsibility associated with the data item. The sensitivity feature indicates a sensitivity level of the data item. The system determines, based on the responsibility feature, that the data item belongs to a particular responsibility class. The system determines, based on the sensitivity feature, that the data item belongs to a particular sensitivity class. The system determines whether a user to whom the data item is directed belongs to the particular responsibility class and sensitivity class to which the data item belongs. The system sends the data item to the user, if is it determined that the user belongs to the particular responsibility class and sensitivity class to which the data item belongs. | 2022-08-11 |
20220253540 | SECURE STORAGE AND PROCESSING OF DATA FOR GENERATING TRAINING DATA - Techniques for securely storing and processing data for training data generation are provided. In one technique, multiple encrypted records are retrieved from a first persistent storage. For each encrypted record, that record is decrypted in memory to generate a decrypted record that comprises multiple attribute values. Then, based on the attribute values and a definition of multiple features of a machine-learned model, multiple feature values are generated and stored, along with a label, in a training instance, which is then stored in a second persistent storage. One or more machine learning techniques are used to train the machine-learned model based on training data that includes the training instances that are stored in the second persistent storage. | 2022-08-11 |
20220253541 | SYSTEM FOR ELECTRONIC DATA OBFUSCATION THROUGH ALTERATION OF DATA FORMAT - Embodiments of the present invention provide a system for performing obfuscation of electronic data through alteration of data formats. The system is configured for extracting data from one or more data sources associated with an entity, determining data format associated with the data extracted from the one or more data sources, calculating, via a central decisioning engine, an exposure score associated with the data based on one or more factors, determining, via the central decisioning engine, an obfuscation algorithm from one or more obfuscation algorithms for obfuscating the data based on the exposure score and the data format associated with the data, and obfuscating the data using the obfuscation algorithm. | 2022-08-11 |
20220253542 | ORCHESTRATION OF ADMINISTRATIVE UNIT MANAGEMENT - Methods, systems, and computer program products for implementing an administrative unit management process. An object membership request that includes a membership access change for an object for one or more administrative units of a plurality of administrative units is received at a management service from a client device. Membership evaluation information associated with the object is obtained from a directory service for the plurality of administrative units. A membership change action is determined based on the membership evaluation information. Instructions are provided to at least one administrative unit of the plurality of administrative units to implement the membership change action. A membership change notification is sent to the client device. | 2022-08-11 |
20220253543 | Financial data secure sharing method, device and system based on cloud server - A financial data secure sharing method, a device and a system based on a cloud server include steps of: logging-in with a terminal through a data access sharing interface provided by the cloud server to obtain a financial data sharing authority for a financial data sharing party; filling-in and uploading financial data according to a data sharing upload format provided by the cloud server; performing a unified format conversion on the financial data, so as to generate unified-format financial data; selecting an encryption method for the unified-format financial data; processing the unified-format financial data with encryption authentication, and obtaining an encryption authentication result; and storing the encryption authentication result in a memory of the cloud server based on a preset storage structure, and providing data sharing to a corresponding user through the data access sharing interface. The financial data can be shared according to the user identity authority. | 2022-08-11 |
20220253544 | SYSTEM FOR SECURE OBFUSCATION OF ELECTRONIC DATA WITH DATA FORMAT PRESERVATION - Embodiments of the invention are directed to systems, methods, and computer program products for utilizing machine learning to identify data which is to be obfuscated in a format-preserving manner, which allows the obfuscated or masked data to appear as though it is original data. Because this type of obfuscation technique may require a higher degree of computational power than other techniques, there is a need to be able to dynamically choose when to implement format preservation based on a variety of factors. By using machine learning techniques, the present invention provides the functional benefit of analyzing both the data to be obfuscated, as well as available computational resources, to determine when it is appropriate to apply a format-preserving masking algorithm to the data. Accordingly, the present invention may ensure that organizational data is appropriately masked while preventing the resource strain associated with preserving the format of all original data. | 2022-08-11 |
20220253545 | SYSTEM FOR IMPLEMENTING MULTI-DIMENSIONAL DATA OBFUSCATION - Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database. | 2022-08-11 |
20220253546 | SYSTEM AND METHOD FOR REPRESENTING AND VERIFYING A DATA SET USING A TREE-BASED DATA STRUCTURE - Embodiments described herein are directed to generating a tree-based data structure representative of a data set and the verification thereof. As each data item of a data set is updated, a leaf node is generated that stores a hash value therefor. For every even leaf node generated, a parent node storing a hash value based on the hash values of its child nodes is generated. For each level of the tree, the hash value of the last odd node generated therefor is maintained. The foregoing process is performed recursively at each level of the tree. During verification, a new root hash value is determined for a new tree-based data structure generated for the data set to be verified. The old and new root hash values are compared. If the hash values do not match, a remediation is performed to restore the data set. | 2022-08-11 |
20220253547 | ROW-LEVEL SECURITY - Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression. | 2022-08-11 |
20220253548 | METHOD AND SYSTEM FOR A DISTRIBUTED COMPUTING SYSTEM - There is provided a method for synchronization of node databases in a database system, said database system comprising a plurality of validation nodes each comprising a node database, and, optionally one or more client nodes, where one of the validation nodes is a primary validation node, the primary validation node having received at least one transaction message from another validation node or a client, the transaction message comprising instructions to modify the node databases, where each of the nodes stores, in its node database, a chain of data blocks, where each data block in the block chain comprises at least a cryptographically unambiguous identifier of the previous data block. | 2022-08-11 |
20220253549 | METHODS AND SYSTEMS FOR AUTOMATICALLY PRESERVING A USER SESSION ON A PUBLIC ACCESS SHARED COMPUTER - A computer-implemented method may include: receiving, from at least one camera, image data associated with a first user at a public access user computing device; detecting, based on the received image data, by employing a machine learning model trained using a dataset of actions collected from a plurality of previous users, that the first user has moved away from the public access user computing device; automatically encrypting, based upon the detection, a user session associated with the first user, wherein the encrypted user session is configured to be subsequently activated by the first user; and initiating a new generic user session on the public access user computing device for a second user. | 2022-08-11 |
20220253550 | Systems And Methods For Ensuring Privacy In An Autonomous Vehicle - Systems and methods for protecting privacy for safety, comfort, and infotainment of one or more occupants of an autonomous vehicle are disclosed. For example, the system may capture image data indicative of an interior of the autonomous vehicle via one or more cameras integrated with the autonomous vehicle. The captured image data is then transformed to remove personal identification information of the one or more occupants, and the transformed image data may be analyzed to identify a concern, e.g., an occupant safety concern or a vehicle safety concern. The level of concern may be determined, and a mitigation strategy may be deployed based on the safety concern identified. | 2022-08-11 |
20220253551 | SYSTEM AND METHOD FOR PREVENTING SENSITIVE INFORMATION FROM BEING RECORDED - A system and method for concealing sensitive information may include receiving a screenshot, determining a part of the screenshot includes sensitive information, concealing the sensitive information to thus generate a modified screenshot, and recording the modified screenshot. | 2022-08-11 |
20220253552 | MEDICAL DATA ACCESS RIGHTS CONSTRAINT ENFORCEMENT AND PRESENTATION SYSTEM - Systems and methods for medical data access rights constraint enforcement and presentation. One of the methods includes obtaining a plurality of agreements, the agreements including indications of data access rights to portions of medical data; determining, based on the agreements, data access rights for a plurality of patients, the data access rights constraining access to portions of medical associated with the patients, and the data access rights requiring authorization of one or more entities generating, for at least one patient, a data access table representing a graphical depiction of data access rights of the at least one patient; and causing presentation of the data access table. | 2022-08-11 |
20220253553 | CONTEXT-BASED ACCESS CONTROL AND REVOCATION FOR DATA GOVERNANCE AND LOSS MITIGATION - Systems, methods, and computer program products for controlling use of sensitive data. A heartbeat signal conveying a context identifier is transmitted into areas where access to sensitive data is granted to authorized users. In response to receiving a request to access the sensitive data, access may be granted if the context identifier in the request matches the context identifier in the heartbeat and denied otherwise. If the requestor has exceeded an access threshold, access may be granted at a reduced rate. This reduced rate may be achieved by reducing a rate at which encryption keys are provided to the requestor. An access control layer positioned between an application layer and a communication layer allows the application layer to use plaintext of the sensitive data while protecting the sensitive data as ciphertext in the communication layer. | 2022-08-11 |
20220253554 | TRAINING ANONYMIZED MACHINE LEARNING MODELS VIA GENERALIZED DATA GENERATED USING RECEIVED TRAINED MACHINE LEARNING MODELS - An example system includes a processor to receive training data and predictions on the training data of a trained machine learning model to be anonymized. The processor is to generate generalized data from training data based on the predictions of the trained machine learning model on the training data. The processor is to train an anonymized machine learning model using the generalized data. | 2022-08-11 |
20220253555 | PRIVACY SAFE ANONYMIZED IDENTITY MATCHING - An example computer-implemented system maintains user profiles and displays external content. Method and system are provided for performing attribution of conversions with respect to the external content in a privacy safe manner by anonymizing personally identifiable information utilizing cryptographic salt. | 2022-08-11 |
20220253556 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing device includes a processor configured to anonymize classification information associated with data and used to classify the data in a case where the data is transferred to another storage location. | 2022-08-11 |
20220253557 | SYSTEMS AND METHODS FOR PRESERVING DEVICE PRIVACY - The present disclosure provides systems and methods for client-side anonymized content selections. The method includes collecting a plurality of identifications of content selection lists, each content selection list associated with the first device and at least one other device. The method includes selecting a first subset of the content selection lists, responsive to a total number of unique device associated with a plurality of content selection lists of the first subset exceeding a threshold. The method includes transmitting a request for an item of content, the request comprising identifications of the content selection lists of the selected first subset. The method includes receiving a first item of content selected by the content server based on the content selection lists of the selected first subset. | 2022-08-11 |
20220253558 | DATA PROCESSING SYSTEMS AND METHODS FOR ANONYMIZING DATA SAMPLES IN CLASSIFICATION ANALYSIS - In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for mapping the existence of target data within computing systems in a manner that does not expose the target data to potential data-related incidents. In accordance with various aspects, a method is provided that comprises: receiving a source dataset that comprises a label assigned to a data element used by a data source in handling target data that identifies a type of target data and data samples gathered for the data element; determining, based on the label, that the data samples are to be anonymized; generating supplemental anonymizing data samples associated with the label that comprise fictitious occurrences of the type of the target data; generating a review dataset comprising the supplemental anonymizing data samples intermingled with the data samples; and sending the review dataset to a review computing system. | 2022-08-11 |
20220253559 | SMART DE-IDENTIFICATION USING DATE JITTERING - System and method to produce an anonymized cohort having less than a predetermined risk of re-identification. The method includes receiving a data query of requested traits for the anonymized cohort, querying a data source to find records that possess at least some of the traits, forming a dataset from at least some of the records, and grouping the dataset in time into a first boundary group, a second boundary group, and one or more non-boundary groups temporally between the first boundary group and second boundary group. For each non-boundary group, calculating maximum time limits the non-boundary group can be time-shifted without overlapping an adjacent group, calculating a group jitter amount, capping the group jitter amount by the maximum time limits and by respective predetermined jitter limits, and jittering said non-boundary group by the capped group jitter amount to produce an anonymized dataset. Return the anonymized dataset. | 2022-08-11 |
20220253560 | SYSTEM AND METHOD FOR IDENTIFYING AND CONTROLLING DISTRIBUTION OF PERSONAL DATA - A computerized system and method identifies user identifiable information by receiving a request to identify user identifiable information pertaining to one or more identified users. For a selected one of the one or more identified users, one or more devices, in a group of devices, is scanned to identify a set of accessed servers, located remotely from the one or more processors, that have been accessed by way of the one or more devices. An accessed server identifier is generated to uniquely identify each of the accessed servers. A request is generated for each accessed server of the set of accessed servers to perform one or more of, identifying user identifiable information collected by the accessed server, and deleting user identifiable information collected by the accessed server. The request is transmitted to each accessed server of the set of accessed servers together with an identifier to identify the selected one of the one or more identified users. One or more responses to the request and is received and the response is provided to the one or more identified users. | 2022-08-11 |
20220253561 | SYSTEMS AND METHODS FOR REDUCTION OF PRIVACY RISK IN DATA - A method, system and computer program product are configured to access data, the data including a plurality of attributes, classify each of the attributes into one of a plurality of classifications, receive a privacy objective and a utility objective, determine a data transformation to achieve the privacy objective and the utility objective, apply the data transformation to the data, wherein the data transformation is applied to at least one of the attributes of the data based on the classifications to produce selectively modified data, iteratively refine data transformations through adjustment of utility objectives, and present the data for disclosure. | 2022-08-11 |
20220253562 | INTELLIGENT SYSTEM FOR AUTHENTICATION OF HANDMADE CARPET - The invention “Intelligent system for authentication of handmade carpet”, is a system which integrates digital technologies including the Internet of Things (IoT) image processing, steganography, blockchain, asymmetric encryption and mobile technology to issue an irrevocable and immutable digital certificate for a handmade carpet and store it on the blockchain. This invention is intended to generate the fingerprint for a handmade carpet and share unique features, and journeys of this product among potential customers with data-backed evidence in a method that is accessible, trustworthy, and secure. The aim is to verify the provenance and crackdown and report counterfeit(s). This invention is very appealing for new carpets and creates substantial values for carpets which are about to be woven. | 2022-08-11 |
20220253563 | STEGANOGRAPHY OF HARDWARE INTELLECTUAL PROPERTY - In general, embodiments of the present disclosure provide methods, apparatus, systems, computer program products, computing devices, and computing entities for modifying a design of a hardware IP. According to one embodiment, a method is provided, the method including generating a control and data flow graph (CDFG) representation for portions of the design. The method further includes partitioning the CDFG representation into a set of partitioned sub-graphs. The method further includes, for each partitioned sub-graph, generating a merged sub-graph to form a set of merged sub-graphs. Generating the merged sub-graph for each partitioned sub-graph involves generating a container sub-graph and merging the container sub-graph with the partitioned sub-graph to form the merged sub-graph. The container sub-graph may be a modification of the partitioned sub-graph with respect to an identified feature, in some examples. The method further includes synthesizing a modified design of the hardware IP including the set of merged sub-graphs. | 2022-08-11 |
20220253564 | Mechanism to Support Writing Files into a File System Mounted in a Secure Memory Device - A system, method and apparatus to record a file in a file system that is mounted in a secure section of a memory device. The memory device authenticates a requester to write data into secure section based on whether the requester is in possession of a cryptographic key. Nonprivileged modules of the operation system can write into a nonsecure section of the memory device. Requests to write or change a file can be recorded by nonprivileged modules into the nonsecure section for subsequent committing into the file system. In response to a request to commit the file, a security manager having the cryptographic key is called to identify, based on the records in the nonsecure section, data eligible to be written into the secure section. The security manager can generate commands, signed using the cryptographic key, to write the content of the file into the secure memory section. | 2022-08-11 |
20220253565 | TERMINAL ANTI-TAMPER DETECTION METHOD AND APPARATUS - A terminal anti-tamper detection method and an apparatus, in the field of information security. The method comprises: a security processing system generating a dynamic signal, outputting the dynamic signal via a self-destruct line output terminal, and receiving a signal via a self-destruct line input terminal (Step S1); the security processing system performing comparison of the signal received via the self-destruct line input terminal and the dynamic signal output via the self-destruct line output terminal, obtaining a comparison result (Step S2); the security processing system determining whether the comparison result meets a self-destruct trigger condition, the self-destruct line being triggered if so, and if not, the self-destruct line not being triggered (Step S3). The present method, by means of using dynamic MESH line anti-tamper technology, can accurately detect a triggering situation, making sure that a protected product immediately acts when unauthorized tampering occurs, ensuring that sensitive information of an individual is not leaked. | 2022-08-11 |
20220253566 | Systems and Methods For Generating Textiles With Repeating Patterns - Systems and methods generating textiles with repeating design elements based at least in part on Voronoi diagrams are provided. In one example implementation, the method can include generating a plurality of seed points in a graphic area. The seed points are utilized to create a Voronoi diagram. A Voronoi diagram is thereafter propagated within the graphic area based upon the seed points. The method also includes receiving a first user input defining a design area. The design area includes a plurality of boundaries within the graphic area. The design area is then correlated to a textile segment and a textile design is generated by replicating the cells in the design area. The cells that intersect the boundaries of the design area are replicated with identical instances placed at the adjacent sides of the design area and the corners of the design area. | 2022-08-11 |
20220253567 | Method for Suggesting Mates for a User Selected Modeled Component - A method for mating a user selected first component of a computer aided drafting application assembly to a second component detects a user drag of the first component. A user pause of the drag for a predetermined interval is detected at a pause location. A plurality of first component surfaces and a plurality of second component surfaces are identified. The first component surfaces are compared with the second component surfaces, and a mating is suggested between a first component surface and a second component surface. | 2022-08-11 |
20220253568 | SYSTEM AND METHOD FOR AUTOMATED PRODUCTION OF PREFABRICATED BUILDINGS AND BUILDING COMPONENTS - An automated manufacturing system and method is provided. The system includes a software system and a production system. The software system includes a design module, an engineering module, and a manufacturing module for the design, engineering, and subsequent production of a prefabricated building product. The production system includes a matrix of cells and a plurality of robotic production units configurable with a plurality of production tools. The matrix includes a number of columns and a number of rows, each column representing a product to be worked on and each row representing a type of work to be performed on each product. The system processes a building model and configures each cell to perform specific work with one or more robotic production units and one or more production tools. A prefabricated building product is built in stages as it moves from cell to cell. | 2022-08-11 |
20220253569 | RECOMBINATION OF NUMERICAL ANALYSIS FOR IMPACT SIMULATION - Computational numerical analysis for passenger seating assemblies can be performed by generating a combined computer numerical simulation based on two or more partial numerical simulations of different assemblies and/or virtual passengers or anthropomorphic test dummies (ATDs). The partial numerical simulations may be run for a common, nonzero period of time, after which first simulation data from the first numerical simulation and second simulation data from the second numerical simulation can be captured and used for generating the combined numerical simulation. The combined numerical simulation can simulate a collision between the different assemblies and/or virtual ATDs by assembling the first and second partial simulation data such that the modeled assemblies collide in the combined computer numerical simulation. Any suitable number of combined numerical simulations in a variety of specific variations may be regenerated using the first and second partial simulation data. | 2022-08-11 |
20220253570 | PERFORMANCE IMPACT DETECTION USING QUEUING CURVE ANALYSIS - An apparatus comprises a processing device configured to obtain performance data for a plurality of workloads, to select a subset of the performance data corresponding to a subset of the plurality of workloads having a given workload type, and to generate a model characterizing an expected performance of the given workload type by analyzing the selected subset of the performance data to estimate a queuing curve characterizing the expected performance of the given workload type. The processing device is also configured, responsive to determining that a quality of the generated model is above a designated threshold quality level, to utilize the generated model to identify performance impacting events for a given workload of the given workload type and to modify provisioning of compute, storage and network resources allocated to the given workload responsive to identifying performance impacting events for the given workload of the given workload type. | 2022-08-11 |
20220253571 | METHOD AND SYSTEM FOR ESTIMATING HYDRAULIC STATE OF STEAM HEATING NETWORK DURING DYNAMIC OPERATION - A method for estimating a hydraulic state of a steam heating network during dynamic operation, the method comprising acquiring parameters, the parameters including steam flow G, steam flow velocity ν, steam density ρ, steam pressure p, pipeline inner diameter D, pipeline inclination angle α, a number of nodes N, and a number of branches M of each pipeline; inputting the parameters into a state estimation model constructed; and determining a hydraulic state by the state estimation model according to the parameters. The method and system for estimating a hydraulic state of a steam heating network during dynamic operation provided herein can adapt to dynamic working conditions of a steam network at project site, precisely estimate a hydraulic operation state of a steam network, and improve collection quality of hydraulic operation data so as to ensure that the network is in a safe operation state. | 2022-08-11 |
20220253572 | COMBINATORIAL SOLUTION DETERMINATION SYSTEM - A combinatorial solution determination system includes a candidate solution generation unit that generates candidate combinatorial solutions, a simulation unit, an evaluation index calculation unit, a solution determination unit, and a necessary-series-data extraction unit. The simulation unit calculates simulation data using information related to the candidate combinatorial solutions, and series data to evaluate a combinatorial solution. The evaluation index calculation unit calculates evaluation indices based on the simulation data. The solution determination unit determines a combinatorial solution having high evaluation from the candidate combinatorial solutions based on the evaluation indices each calculated by the evaluation index calculation unit from a corresponding one of the candidate combinatorial solutions. The necessary-series-data extraction unit extracts second and third series data from the first series data, and combines the second and third series data and acquire the second and third series data as necessary series data. | 2022-08-11 |
20220253573 | PEOPLE FLOW ESTIMATION DEVICE, PEOPLE FLOW ESTIMATION METHOD, AND PEOPLE FLOW ESTIMATION PROGRAM - The parameter estimation section | 2022-08-11 |
20220253574 | METHOD AND SYSTEM FOR LOG BASED PREDICTIVE ANALYTICS - A method for providing predictive analytics based on structured log data is disclosed. The method includes retrieving, via a network interface, raw log data from a data storage component, the raw log data including application information; parsing the raw log data to discover a key token, the key token corresponding to an application; identifying a predetermined label that corresponds to the key token; generating structured log data based on the key token and the predetermined label; retrieving incident data corresponding to the application; and predicting, by using a model, a potential incident based on the structured log data and the incident data. | 2022-08-11 |
20220253575 | Node Grouping Method, Apparatus and Electronic Device - This disclosure provides a node grouping method and apparatus and an electronic device, and relates to the field of evolutionary computing in quantum computing. The method includes: obtaining a graph of to-be-grouped nodes, wherein the graph of to-be-grouped nodes includes M first nodes; constructing a QAOA (quantum approximate optimization algorithm) node circuit graph based on the graph of to-be-grouped nodes, the node circuit graph including K nodes which including the M first nodes; generating a quantum entangled state of the node circuit graph that includes target quantum states of the K nodes in the node circuit graph; performing a group measurement on each of the K nodes sequentially based on the target quantum states of the K nodes to obtain a target group measurement result of the M first nodes; determining a grouping output result of the M first nodes based on the target group measurement result. | 2022-08-11 |
20220253576 | OBJECT DESIGN PROCESSING USING COARSE GEOMETRIC ELEMENTS AND HIGH-RESOLUTION LATTICE ELEMENTS - A computing system may include a design access engine and a design processing engine. The design access engine may be configured to access an object design to be constructed through additive manufacturing. The design processing engine may be configured to represent the object design as a combination of coarse geometric elements and high-resolution lattice elements and process the object design based on both the coarse geometric elements and the high-resolution lattice elements. Processing of the object design may include generation of lattice infills, lattice simulations, or a combination of both. | 2022-08-11 |
20220253577 | SYSTEM AND METHOD FOR IMPLEMENTING MACHINE LEARNING FOR 3D GEO-MODELING OF PETROLEUM RESERVOIRS - Some implementations provide a method including: accessing measurement data that characterize one or more features of a reservoir, wherein the measurement data are from more than well locations of the reservoir and from a range of depths inside the reservoir; detecting portions of the measurement data that characterize the one or more features with a statistical metric that is below a pre-determined threshold; based on removing the portions of the measurement data, identifying a plurality of layers along the range of depths of the reservoir; within each layer of the plurality of layers, grouping the measurements data among a plurality of clusters, each corresponding to a flow unit (FU) and determined by a machine learning algorithm; generating a three-dimensional (3D) permeability model of the reservoir based on the FU of each layer and a saturation height function; and simulating a performance of the reservoir based on the 3D permeability model. | 2022-08-11 |
20220253578 | CONVERTING IMPLICIT DYNAMIC MODELS INTO EXPLICIT DYNAMIC MODELS - A nonlimiting example method for converting implicit dynamic models into explicit dynamic models comprises: performing a block lower triangular (BLT) transformation on equations of an implicit dynamic differential algebraic equation (DAE) model to yield a BLT representation of the implicit dynamic DAE model; performing a nonlinear block extraction for a diagonal of the BLT representation of the implicit dynamic DAE model to yield one or more nonlinear blocks and one or more linear blocks; constructing a surrogate causal model for each of the one or more nonlinear blocks; training the surrogate causal model for each of the one or more nonlinear blocks; and constructing an explicit dynamic ordinary differential equation (ODE) model that corresponds to the implicit dynamic DAE model based on the linear blocks and the surrogate causal model. The explicit ODE model may be useful for controlling operations, diagnosing issues, and prognosticating conditions within a physical system. | 2022-08-11 |
20220253579 | Hardware and Software Product Development Using Supervised Learning - A method of electronic hardware development includes training a machine-learning model to replicate behavior of a hardware system under development, using output of a first model of the hardware system. The machine-learning model is distinct from the first model. The method also includes providing first test data as inputs to the machine-learning model, receiving results for the first test data from the machine-learning model, and analyzing the results for the first test data to identify any errors. | 2022-08-11 |
20220253580 | ADAPTATION OF THE ADVANCED PENG ROBINSON EQUATION OF STATE BASED ON A MOLECULAR STRUCTURE BASIS FOR MODELING THE ASPHALTENE PRECIPITATION OF PETROLEUM FLUIDS - Fluid modeling methods and systems are provided for predicting phase behavior of petroleum fluids using a computational model that employs pseudo-components of varying carbon numbers that represent asphaltenes, asphaltene-like hydrocarbon, and non-asphaltene hydrocarbons. The computational model models the phase equilibria of the mixture of components with mixing rules that employ binary interaction parameters determined from correlations that involve certain properties or parameters associated with respective pseudo-component pairs as input variables. The binary interaction parameters are tuned by adjusting at least one parameter of the respective correlations based on matching at least one measured property of one or more petroleum fluids to a corresponding property predicted by the computational model for the one or more petroleum fluids. The tuned values for the binary interaction parameters can be stored as part of the computational model for subsequent fluid modeling. In embodiments, the computational model is based on the Advanced Peng Robinson equation of state. | 2022-08-11 |
20220253581 | Prediction Of Pipeline Column Separations - An example operation may include one or more of acquiring real-time parameter data from a pipeline, selecting relevant real-time parameters from the real-time parameter data, executing a plurality of equations using the selected real-time parameters as an in input, generating a model configured to simulate the pipeline in real-time based on an output of the plurality of the equations, and predicting at least one location of a column separation in the pipeline based on the model. | 2022-08-11 |
20220253582 | VERIFICATION PROCESSING DEVICE, VERIFICATION METHOD, AND PROGRAM - A verification processing device includes: an inspection processing unit which extracts elements of which states change in a process leading to an insecure event by means of a model inspection for a model to be inspected; a refinement processing unit which determines, for each of the extracted elements, whether the element contributes to the occurrence of the insecure event and refines a cause element which is an element of a cause of the insecure event; and a receiving unit which receives, from an operator, a selection of at least one cause element from among a plurality of the cause elements, wherein the inspection processing unit performs the model inspection once again on an improved model to be inspected which is a new model to be inspected in which a prescribed measure is executed for the selected cause element. | 2022-08-11 |
20220253583 | MESSAGE PASSING MULTI PROCESSOR NETWORK FOR SIMULATION VECTOR PROCESSING - This disclosure describes an apparatus and method for simulating circuit designs. An apparatus for simulating circuit designs includes a first simulation vector processor (SVP) and a second SVP communicatively coupled to the first SVP. The first SVP simulates a first portion of a circuit design under test. The second SVP simulates the first portion of the circuit design under test at least partially while the first SVP simulates the first portion of the circuit design and asynchronously with the first SVP and transmits data to the first SVP while simulating the first portion of the circuit design, wherein the first SVP uses the data while simulating the first portion of the circuit design. | 2022-08-11 |
20220253584 | OVER-THE-AIR HARDWARE UPDATE - Described is an apparatus for supporting Over-The-Air Hardware Updates comprising a first circuitry, a second circuitry, and a third circuitry. The first circuitry may be operable to be fastened and electrically coupled in one or more regions to one or more respectively corresponding semiconductor dies. The second circuitry may be operable to configure the one or more regions of the first circuitry. The third circuitry may be operable to provide a set of wirelessly-received configuration instructions to the second circuitry. | 2022-08-11 |
20220253585 | EXCITATION SOURCE PLANNING METHOD FOR ELECTRICAL SIMULATION AND SYSTEM THEREOF - An excitation source planning method for an electrical stimulation is proposed to plan an excitation source. A layout importing step is performed to drive a processing unit to import a PCB layout to an electromagnetic simulation software module. A port establishing step is performed to set the excitation source to be vertically disposed between a signal layer and a main ground layer. A model generating step is performed to perform the electrical simulation according to the excitation source to generate a three-dimensional simulation model corresponding to the PCB layout. When the signal layer is not electrically connected to the main ground layer, the electromagnetic simulation software module executes an extending step. The extending step is performed to provide a first metal unit to be connected to the signal layer, and reset the excitation source to be vertically disposed between the first metal unit and the main ground layer. | 2022-08-11 |
20220253586 | STANDARD CELL TEMPLATE AND SEMICONDUCTOR STRUCTURE - The present disclosure provides a standard cell template and a semiconductor structure. The standard cell template includes a first well region and a second well region, arranged along a first direction; a first gate pattern, located in the first well region and extending along the first direction, for defining a first gate; a second gate pattern, located in the second well region and extending along the first direction, for defining a second gate; and a gate electrical connection pattern, located between the first gate pattern and the second gate pattern, for defining a gate electrical connection structure; where the gate electrical connection structure is arranged on the same layer as the first gate and the second gate to electrically connect the first gate and/or the second gate. | 2022-08-11 |
20220253587 | PROCESS FOR HIGHLIGHTING TEXT WITH VARIED ORIENTATION - A computer-implemented method and apparatus for highlighting text in an image disposed in a markup language document are disclosed. Location data identifying a location, size and orientation of a text element in the image may be obtained, where the text element is oriented in a direction that is non-orthogonal to vertical and horizontal axes of the image. A context for a canvas element in the document may be obtained and rotated to align the context to the orientation of the text element using the location data. The context may also be translated to the location of the text element using the location data, and a text highlighting element that at least partially overlays the text element may be generated. | 2022-08-11 |
20220253588 | PAGE PROCESSING METHOD AND RELATED APPARATUS - Embodiments of this application provide a page processing method and related apparatus. The method includes previewing a target page in an application program; obtaining a page structure of the previewed target page, the page structure of the target page identifying a layout of page elements of the target page in the target page; obtaining a page structure of a skeleton screen corresponding to the target page based on the page structure of the target page, the page structure of the skeleton screen identifying a layout of placeholder elements of the skeleton screen on the skeleton screen, the placeholder elements being obtained by processing the page elements; and generating a view file of the skeleton screen according to the page structure of the skeleton screen, the skeleton screen being displayed before the target page is loaded. | 2022-08-11 |
20220253589 | Remote Creation of a Playback Queue for an Event - Example embodiments involve remote creation of a playback queue for an event. An example implementation involves a computing device receiving, via a control interface, input data representing a request to create a playlist for an event at a particular future time and date and a designation of multiple invitees to the event and sending, via a network interface to a cloud computing system, instructions representing the request. The instructions cause the cloud server(s) to send, to multiple second mobile devices corresponding to the multiple invitees, one or more respective invitations to the event. Each invitation indicates: (i) a future time and date for the event and (ii) a link to a web interface including user interface controls to add audio tracks to the playlist for the event. During the event, the computing device causes the playlist to be queued in a queue of a media playback system for playback. | 2022-08-11 |
20220253590 | Document Transformation Between Program Formats and Templates System and Method - A system and method are presented for interoperability of computer software applications. Subdocuments are located within slots of a main document along with a fully-qualified file identifier. Subdocuments can be saved in the main document in an intermediate format. Editing a slot triggers the opening of the original document in its native application. An intermediate format file is then created and reimported into its original slot. A document containing subdocuments can be exported in its entirety from one program to another. An auxiliary program identifies a target template format and converts the original document to the target template in its native application using the original subdocuments. Page image exports are used to transfer all content in the original application document to a destination document in a different format. | 2022-08-11 |
20220253591 | STRUCTURED TEXT PROCESSING APPARATUS, STRUCTURED TEXT PROCESSING METHOD AND PROGRAM - A structured text processing apparatus includes one or more computers each including a memory and a processor configured to analyze a tree structure of a structured text; specify, for each leaf node in the tree structure, a path from the leaf node to a root node; and generate a converted text including text data in which strings associated with respective nodes from the root node to the leaf node of each path are connected to each other. | 2022-08-11 |
20220253592 | SYSTEM WITH REPORT ANALYSIS AND METHODS FOR USE THEREWITH - A method includes receiving a medical report created by a medical professional at a creation time. Prior to elapsing of a fixed-length time frame starting at the creation time, report analysis data for the medical report is automatically generated via performance of a report processing function. Correction requirement notification data is generated based on the report analysis data indicating at least one correction requirement. Communication of the correction requirement notification data to the medical professional is facilitated. | 2022-08-11 |
20220253593 | SUMMARY CREATION METHOD, SUMMARY CREATION SYSTEM, AND SUMMARY CREATION PROGRAM | 2022-08-11 |
20220253594 | METHODS, APPARATUS AND SYSTEMS FOR ANNOTATION OF TEXT DOCUMENTS - Methods and apparatus to facilitate annotation projects to extract structured information from free-form text using NLP techniques. Annotators explore text documents via automated preannotation functions, flexibly formulate annotation schemes and guidelines, annotate text, and adjust annotation labels, schemes and guidelines in real-time as a project evolves. NLP models are readily trained on iterative annotations of sample documents by domain experts in an active learning workflow. Trained models are then employed to automatically annotate a larger body of documents in a project dataset. Experts in a variety of domains can readily develop an annotation project for a specific use-case or business question. In one example, documents relating to the health care domain are effectively annotated and employed to train sophisticated NLP models that provide valuable insights regarding many facets of health care. In another example, annotation methods are enhanced by utilizing domain-specific information derived from a novel knowledge graph architecture. | 2022-08-11 |
20220253595 | SYSTEM AND METHOD FOR COMPLETING MULTIPLE ELECTRONIC FORMS - A system and method for completing fillable electronic forms. One exemplary technique involves automatically importing one or more fillable electronic forms from a database, receiving, at a user interface component via a network, a request to select the one or more fillable electronic forms, presenting a set of selectable fillable form fields from the one or more fillable electronic forms, presenting the one or more fillable electronic forms, receiving a user response for populating one or more fillable form fields from the set of selectable fillable form fields, and automatically deploying the user response in a second and subsequent fillable electronic form from the one or more fillable electronic forms, the second fillable electronic form having one or more fillable form fields shared in common with the one or more fillable form fields from the set of selectable fillable form fields. | 2022-08-11 |
20220253596 | METHOD FOR PROVIDING ELECTRIC DOCUMENT USING CHATBOT, APPARATUS AND METHOD FOR WRITING ELECTRIC DOCUMENT USING CHATBOT - Provided are a method for providing an electronic document using a chatbot and a method and apparatus for writing an electronic document using a chatbot. The electronic document providing method using a chatbot includes receiving a chatting input associated with an electronic document from a user terminal, generating an electronic document based on the chatting input, and providing the generated electronic document to the user terminal. | 2022-08-11 |
20220253597 | PROVENANCE AWARE EDITING FOR SPREADSHEETS - A system for provenance aware editing for propagating edits back to spreadsheets is provided. The system receives an indication of an operation to be performed at an output location. The operation indicates one or more input locations on a spreadsheet that each provides an input value. The input values are accessed and tagged with their corresponding input location on the spreadsheet. Based on the operation and the input value from each of the one or more input locations, the system derives and displays the result at the output location. A user edit to the result is received at the output location, which causes transmission of a propagation request to change the input value at one or more of the tagged input locations. Using where-provenance associated with the tagged input locations, the system propagates the user edit to one or more of the tagged input locations. | 2022-08-11 |
20220253598 | SYSTEM AND METHOD FOR MEASURING USER EXPERIENCE OF INFORMATION VISUALIZATIONS - The quality of user experience (UX) of an information visualization depends on multiple diverse aspects. These include qualitative, quantitative, and contextual parameters that are unmeasurable and incomparable. Hence, measuring the UX of a visualization is challenging. The disclosure herein relates to a system and method that collects, processes, and analyzes a multiple diverse parameters to measure and profile the UX of a visualization. To accomplish this, the system collects data regarding the usage, effectiveness, and user perception of the visualization. The system creates a quantitative and comparable version of all these parameters to measure holistically the UX of the visualization. This involves quantifying qualitative values, considering context by objectively computing the complexity of charts, complexity based benchmarking, summarizing individual parameters into hedonic and pragmatic scores, plotting the visualization on a scatter chart, dividing the scatter chart based on low-high hedonic and pragmatic scores, labeling each section and labeling the visualization. | 2022-08-11 |
20220253599 | ANSWER CLASSIFIER AND REPRESENTATION GENERATOR FOR QUESTION-ANSWERING SYSTEM, AND COMPUTER PROGRAM FOR TRAINING THE REPRESENTATION GENERATOR - A program for training a representation generator generating a representation representing an answer part included in a passage to classify whether the passage is related to an answer or not. The program causes a computer to operate as: a fake representation generator responsive to a question and a passage for outputting a fake representation representing an answer part of the passage; a real representation generator for outputting, for the question and a core answer, a real representation representing the core answer, in the same format as fake representation; a discriminator for discriminating whether fake representation and real representation are a real or fake representation; and a generative adversarial network unit training the discriminator and fake representation generator through generative adversarial network such that error determination of fake representation is maximized and error determination of real representation is minimized. | 2022-08-11 |
20220253600 | Method and System for Extracting Valuable Words and Forming Valuable Word Net - Method and system for extracting valuable words and forming a valuable word net, wherein a server is employed to collect contents of articles from internet sources, EDM texts (email direct marketing), product descriptions and other texts, and extract valuable words by machine learning. Each valuable word performs connection weight based on the number of times the text has been read, the number of times the text has been clicked, the number of times the text has been cited, the correlation of external sites, the conversion of expert knowledge, the probability space, the Shannon entropy, the spatial distribution and other values and their conversion by machine learning; then the linked valuable words are integrated to form a valuable word net. When the valuable words are needed to be used, the valuable words and the valuable word net can be retrieved from the database for subsequent applications. | 2022-08-11 |
20220253601 | Language-based content recommendations using closed captions - Systems, apparatuses, and methods are described herein for providing language-level content recommendations to users based on an analysis of closed captions of content viewed by the users and other data. Language-level analysis of content viewed by a user may be performed to generate metrics that are associated with the user. The metrics may be used to provide recommendations for content, which may include advertising, that is closely aligned with the user's interests. | 2022-08-11 |
20220253602 | SYSTEMS AND METHODS FOR INCREASING ACCURACY IN CATEGORIZING CHARACTERS IN TEXT STRING - Disclosed embodiments may include a method that includes setting an influence level for each index that a neural network can accept in one sample to a same level for a neural network, receiving a training corpus including training input samples and a corresponding correct training prediction samples, generating, using the neural network, prediction samples, identifying an accuracy for each index by comparing the prediction samples with the corresponding correct training prediction samples, adjusting the influence level for each index based on the accuracy for each index, identifying one or more poorly accurate indexes for the neural network, receiving a first input sample including one or more characters, generating one or more normalized first input samples by applying one or more buffers to the one or more poorly accurate indexes, and generating, using the neural network, a categorization of each character in the one or more normalized first input samples. | 2022-08-11 |