33rd week of 2021 patent applcation highlights part 50 |
Patent application number | Title | Published |
20210256036 | CONTEXT-BASED KEYWORD GROUPING - Techniques for context-based keyword grouping for business rule mining are described herein. An aspect includes determining, based on a first corpus, a first list of keywords. Another aspect includes constructing a co-occurrence matrix based on the first list of keywords. Another aspect includes applying a clustering algorithm to the co-occurrence matrix to determine a first plurality of keyword groups. Another aspect includes presenting the first plurality of keyword groups to a user via a user interface. | 2021-08-19 |
20210256037 | METHOD FOR REAL-TIME COHORT CREATION BASED ON ENTITY ATTRIBUTES DERIVED FROM PARTIALLY OBSERVABLE LOCATION DATA - A system for real time cohort creation of entities based on entity attributes derived from partially observable location data is provided. The system (i) obtains, in real time, one or more data streams from one or more independently controlled entity sources that include a unique entity identifier, entity attributes, time-stamp data, location indexed data (ii) de-duplicates the one or more data streams associated with an entity by analyzing the entity attributes associated with the unique entity identifier, (iii) classifies a unified entity event from the one or more data streams along with dynamic entity attributes retrieved from a memory store, and storing the dynamic attributes in an entity attribute document of the entity (iv) reverse searches, to match the entity attribute document with at least one query (v) generates entity cohorts based on the matched entity attribute document of the entities with at least one cohort labels and communicates a target media content to the entity cohorts over a network. | 2021-08-19 |
20210256038 | METHOD AND APPARATUS FOR RECOGNIZING ENTITY WORD, AND STORAGE MEDIUM - The disclosure discloses a method and an apparatus for recognizing an entity word. The method includes: obtaining an entity word category and a document to be recognized; generating an entity word question based on the entity word category; segmenting the document to be recognized to generate a plurality of candidate sentences; inputting the entity word question and the plurality of candidate sentences into a question-answer model trained in advance to obtain an entity word recognizing result; and obtaining an entity word set corresponding to the entity word question based on the entity word recognizing result. | 2021-08-19 |
20210256039 | Systems and Methods for Visualizing Object Models of Database Tables - A method visualizes object models for data sources. The device displays, in an object model visualization region, a first visualization of a tree of data object icons, each data object icon representing a logical combination of one or more tables. The device also displays recommendations for one or more data sources to add objects to the tree. While displaying the first visualization in the object model visualization region, the device detects a first input on a first data object icon of the tree of data object icons. In response to detecting the first input on the first data object icon, the device displays a second visualization of the tree of the data object icons in a first portion of the object model visualization region and displays a third visualization of information related to the first data object icon in a second portion of the object model visualization region. | 2021-08-19 |
20210256040 | SYSTEMS AND METHODS FOR LOCATION PROCESSING AND GEOCODING OPTIMIZATION - A device may obtain a location. The device may process the location to form a processed address. The device may obtain, from a plurality of geocoders, a plurality of sets of geographic coordinate candidates for the processed address. The device may obtain confidence information regarding the plurality of sets of geographic coordinate candidates. The device may determine a set of geographic coordinates for the processed address based on the plurality of sets of geographic coordinate candidates and the confidence information regarding the plurality of sets of geographic coordinate candidates. The device may assign a key to the processed address and the set of geographic coordinates for the processed address. The device may store, in a storage device, the key in association with the processed address and the set of geographic coordinates to facilitate access to the processed address or the set of geographic coordinates for the processed address. | 2021-08-19 |
20210256041 | PREDICTING PERFORMANCE OF CONTENT AND ELECTRONIC MESSAGES AMONG A SYSTEM OF NETWORKED COMPUTING DEVICES - Various embodiments relate generally to data science and data analysis, computer software and systems, and control systems to provide a platform to facilitate implementation of an interface, and, more specifically, to a computing and data storage platform that implements specialized logic to predict effectiveness of content in electronic messages as a function, for example, modifiable portions of the content. In some examples, a method may include receiving data signals to cause formation of an electronic message, determining a component of the electronic message, identifying one or more message performance criteria, characterizing the component to identify a component attribute, predicting the component attribute matches at least one of the message performance criteria, and transmitting the electronic message. | 2021-08-19 |
20210256042 | ITEM MATCHING - Methods and system for item matching are described. In one embodiment, compatibility-based text for an item may be accessed. A compatibility identifier may be identified based on the compatibility-based text. The compatibility identifier may be associated with an item cluster. The compatibility identifier may be used to identify a plurality of matching items. A result may be provided based on identification of the plurality of matching items. Additional methods and systems are disclosed. | 2021-08-19 |
20210256043 | PREDICTIVE QUERY PROCESSING FOR COMPLEX SYSTEM LIFECYCLE MANAGEMENT - Techniques for identifying relevant, natural language documents within a data repository. An electronic document specifying natural language text describing an issue with a complex system is received. One or more portions are removed from the electronic document. The portions are determined to satisfy predefined filtering rules. A first set of terms are determined using a data dictionary structure, and a second set of terms are determined, where at least one term in the second set of terms satisfies at least one predefined pattern matching rule. A third set of terms are determined by processing the electronic document as an input to a machine learning model trained to recognize relevant terms within the electronic document. A synthesized electronic document is generated from the first, second and third sets of terms, and the synthesized electronic document is used to identify a set of relevant documents within the data repository. | 2021-08-19 |
20210256044 | METHOD AND APPARATUS FOR PROCESSING CONSULTATION INFORMATION - Embodiments of the present disclosure provide a method and apparatus for processing consultation information. A specific implementation of the method includes: pushing, in response to receiving consultation information of a first user, a questionnaire corresponding to the consultation information to the first user; acquiring a questionnaire result corresponding to the questionnaire and submitted by the first user; inputting the questionnaire result into a preset consultation model, to obtain a first consultation result; pushing the questionnaire result and the first consultation result to a second user; and in response to receiving a second consultation result provided by the second user based on the questionnaire result and the first consultation result, pushing the second consultation result to the first user. | 2021-08-19 |
20210256045 | METHOD FOR GENERATING QUESTION ANSWERING ROBOT AND COMPUTER DEVICE - The present disclosure discloses a method for generating a question answering robot, relates to the field of robotics. The specific implementation includes: obtaining field information input by a user, obtaining a field-specific robot from a robot library based on the field information; obtaining a template list corresponding to the field-specific robot, providing the template list to the user, the template list including a plurality of templates; receiving the plurality of templates filled in by the user, the templates filled in by the user including at least one question and an answer corresponding to the at least one question; expanding the at least one question filled in by the user based on a question semantic database to form a combination of questions corresponding to the answer, the answer and the combination of questions forming a question-answer pair; and generating a question answering robot based on the question-answer pair. | 2021-08-19 |
20210256046 | APPARATUS, SYSTEMS AND METHODS FOR PROVIDING CONVERSATIONAL ASSISTANCE - Conversation support systems and methods are operable to assist a user to more fully participate in an ongoing conversation. An exemplary embodiment receives a conversation map comprising a serially arranged plurality of conversation segments of audio information each associated with one of a plurality of conversation participants, and that includes dialogue of the ongoing conversation being spoken by the associated conversation participant; determining subject matter of a current portion of the ongoing conversation based on the dialogue; selects conversation support information that pertains to the current conversation subject; and generating a conversation queue that includes information that corresponds to the selected conversation support information, wherein the conversation queue is communicated from the conversational support system to at least one conversation queue output device that presents the conversation support information to the user. | 2021-08-19 |
20210256047 | SYSTEM AND METHOD FOR PROVIDING TECHNOLOGY ASSISTED DATA REVIEW WITH OPTIMIZING FEATURES - Embodiments may provide a document system that receives a responsiveness call from a user through the task/queue framework regarding a machine call document. Theses responsiveness calls may be used to refining the scoring algorithm used by the document system of to generate a desired confidence score for the document system. | 2021-08-19 |
20210256048 | EVALUATION DEVICE, METHOD, AND PROGRAM - To appropriately evaluate an evaluation target based on posts related to an evaluation target from a user. An acquisition unit | 2021-08-19 |
20210256049 | Descriptor Uniqueness for Entity Clustering - A mechanism is provided in a data processing system to implement a cognitive natural language processing (NLP) system with descriptor uniqueness identification to support named entity mention clustering. The mechanism annotates a set of documents from a corpus of documents for entity types and mentions, collects descriptor usages from all documents in the corpus of documents, analyzes the descriptor usages to classify the descriptors as base terms or modifier terms, generates compatibility scores for the descriptors, and performs entity merging of entity clusters based on the compatibility scores. | 2021-08-19 |
20210256050 | SYSTEM AND METHOD FOR AUTOMATIC SYNCHRONIZATION OF VIDEO WITH MUSIC, AND GAMING APPLICATIONS RELATED THERETO - A computer system including a server having a processor and a memory, the memory having a video database and a music database, the video database storing at least one video file having a plurality of video file markers, and the music database storing at least one music file having a plurality of music file markers, wherein the server receives and decodes encoded data from computer readable code, identifies and retrieves from the music database a music file based on the decoded data, synchronizes the retrieved music file with one of the video files by aligning the video file markers of the video file with the music file markers for the retrieved music file to produce a synchronized video-music file, and transmits the synchronized video-music file to a display, wherein the video file markers are generated for each video file and the music file markers are generated for each music file. | 2021-08-19 |
20210256051 | THEME CLASSIFICATION METHOD BASED ON MULTIMODALITY, DEVICE, AND STORAGE MEDIUM - A theme classification method based on multimodality is related to a field of a knowledge map. The method includes obtaining text information and non-text information of an object to be classified. The non-text information includes at least one of visual information and audio information. The method also includes determining an entity set of the text information based on a pre-established knowledge base, and then extracting a text feature of the object based on the text information and the entity set. The method also includes determining a theme classification of the object based on the text feature and a non-text feature of the object. | 2021-08-19 |
20210256052 | IMAGE SEARCH METHOD, APPARATUS, AND DEVICE - Embodiments of the specification provide an image search method, an apparatus, and a device. The method includes: obtaining an input image associated with an image search, wherein the input image includes a plurality of first text blocks; selecting a to-be-processed image from a target database, wherein the to-be-processed image includes a plurality of second text blocks; and generating a first graph structural feature based on the plurality of first text blocks; generating a second graph structural feature based on the plurality of second text blocks; determining that the first graph structural feature and the second graph structural feature satisfy a condition; and in response to determining that the first graph structural feature and the second graph structural feature satisfy the condition, outputting the to-be-processed image as a search result. | 2021-08-19 |
20210256053 | METHOD AND SYSTEM FOR PERFORMING AN OPTIMIZED IMAGE SEARCH - The disclosure relates to method and system for performing optimized image search. The method includes receiving an input image and user requirements with respect to an image search, identifying a sub-section from various sub-sections of the input image based on semantic parameters corresponding to each sub-section and the user requirements, and determining an optimal resolution of the sub-section based on a pixel density of various image formats derived for the sub-section. The method further includes identifying an optimal set of layers from a plurality of layers of an Artificial Neural Network (ANN) based image search model for performing the image search based on the semantic parameters for the sub-section, the optimal resolution of the sub-section, and historical data, and performing the image search to identify a set of output images similar to the sub-section based on a modified ANN based image search model comprising the optimal set of layers. | 2021-08-19 |
20210256054 | TEXTUAL AND IMAGE BASED SEARCH - Described is a system and method for enabling visual search for information. With each selection of an object included in an image, additional images that include visually similar objects are determined and presented to the user. | 2021-08-19 |
20210256055 | METHODS, SYSTEMS, AND MEDIA FOR GENERATING SEARCH RESULTS BASED ON CONTEXTUAL INFORMATION - Methods, systems, and media for generating search results based on contextual information are provided. In some implementations, a method for presenting search results is provided, the method comprising: receiving, using a hardware processor, a query related to media that is currently being presented; identifying a program that is currently being presented; identifying a plurality of keywords associated with the identified program; determining one or more of the plurality of keywords that are contextually relevant to the query; obtaining a plurality of search results based on the query and the one or more contextually relevant keywords; and causing at least one of the plurality of search results to be presented to the user. | 2021-08-19 |
20210256056 | Automatically Predicting Relevant Contexts For Media Items - The present technology pertains to automatically context labeling media items with relevant contexts, and further for algorithmically generating high quality playlists built around a context that are personalized to a profile of an account. This is accomplished by combining data from observed playlists, and data representing intrinsic properties of media items to predict contexts for media items. | 2021-08-19 |
20210256057 | METHOD FOR PLAYING AUDIO, DEVICE, TERMINAL, SERVER AND STORAGE MEDIUM - The disclosure provides a method for playing audio, device, terminal, server and storage medium. The method for playing audio applied to the terminal includes sending, in response to detecting a voice input, a response request corresponding to the voice input to a server. The method includes receiving a response audio clip carrying position information sent by the server, the position information indicating a position of the response audio clip in a response audio corresponding to the response request. The method includes synthesizing, based on the position information carried by respective received response audio clips, adjacent response audio clip s into a response audio packet. The method includes playing the synthesized response audio packet, until finishing playing the response audio. | 2021-08-19 |
20210256058 | IDENTIFYING AND RETRIEVING VIDEO METADATA WITH PERCEPTUAL FRAME HASHING - Shoppable video enables a viewer to identify and buy items appearing in a video. To retrieve information about the items in a frame of the video, the playback device generates a perceptual hash of that frame and uses that hash to query a first database storing perceptual hashes of different version of the video. The database query returns an identifier for the frame, which is then used to query a second database that store the item information. The results of this query are returned to the playback device, which shows them to the user, enabling the viewer to learn more about and possibly purchase the item. Using queries based on perceptual hashes of different versions of the video increases the likelihood of returning a match, despite formatting differences. And using separate hash and metadata databases makes it possible to update the metadata without changing the hashes. | 2021-08-19 |
20210256059 | GRAPH CONVOLUTIONAL NETWORKS FOR VIDEO GROUNDING - Method and apparatus that includes receiving a query describing an aspect in a video, the video including a plurality of frames, identifying multiple proposals that potentially correspond to the query where each of the proposals includes a subset of the plurality of frames, ranking the proposals using a graph convolution network that identifies relationships between the proposals, and selecting, based on the ranking, one of the proposals as a video segment that correlates to the query. | 2021-08-19 |
20210256060 | SYSTEMS AND METHODS FOR SEARCHING FOR EVENTS WITHIN VIDEO CONTENT - A video management system (VMS) may search for one or more events in a plurality of video streams captured and stored at a plurality of remote sites. The VMS may generate time-stamped metadata for each video stream captured at the remote site. The time-stamped metadata for each video stream may identify one or more objects and/or events occurring in the corresponding video stream as well as an identifier that uniquely identifies the corresponding video stream. Each of the plurality of remote sites may send the time-stamped metadata to a central hub, wherein the time-stamped metadata may be stored in a data lake, and a user may enter a query into a video query engine, wherein the video query engine may be operatively coupled to the central hub. | 2021-08-19 |
20210256061 | SYSTEMS AND METHODS FOR IDENTIFYING EVENTS WITHIN VIDEO CONTENT USING INTELLIGENT SEARCH QUERY - A video management system (VMS) may search for one or more objects and/or events in one or more video streams, and may receive time-stamped metadata that may identify one or more objects and/or events occurring in the corresponding video stream as well as an identifier that uniquely identifies the corresponding video stream. A user may enter a query into a video query engine, wherein the video query engine includes one or more cognitive models. The VMS may apply the search query to the time-stamped metadata via the video query engine to search for one or more objects and/or events in the one or more video streams that match the search query, and returning a search result to the user. | 2021-08-19 |
20210256062 | Performing Computations During Idle Periods at the Storage Edge - A controller, for use in a storage device of a data processing system, includes a host interface, a memory interface and one or more processors. The host interface is configured to communicate over a computer network with one or more remote hosts of a data processing system. The memory interface is configured to communicate locally with a non-volatile memory of the storage device. The one or more processors are configured to manage local storage or retrieval of media objects at the non-volatile memory, and to perform additional tasks that are not associated with management of storage or retrieval of the objects. | 2021-08-19 |
20210256063 | AD-HOC GRAPH DEFINITION - A method, a system, and a computer program product for generating graphs using a stored procedure. One or more graph data tables are generated. A procedure having a predetermined name is generated. One or more inputs to the generated procedure includes the generated one or more graph data tables. The generated procedure includes one or more graph objects. The graph data tables are configured to be input to the graph objects. The generated procedure is stored. The stored generated procedure is executed using one or more graph data stored in a graph database. | 2021-08-19 |
20210256064 | TECHNIQUES FOR FACILITATING COMMUNICATIONS BETWEEN ISOLATED PROCESSES EXECUTING WITHIN A WEB BROWSER - Disclosed herein is a technique for enabling isolated processes executing within a web browser to distribute information to one another. The method can be implemented by a first process executing within the web browser, and include the steps of (1) receiving, from a child process executing within the web browser, a first request to subscribe to a topic, (2) in response to identifying that the child process is not subscribed to the topic: updating a topic map to indicate that the child process is subscribed to the topic, and (3) in response to identifying that the first process is associated with the parent process: issuing, to the parent process, a second request for the first process to subscribe to the topic. Also disclosed herein is a method for enabling a first process executing within a web browser to access services provided by other processes executing within the web browser. | 2021-08-19 |
20210256065 | AUTOMATED DATABASE QUERY FILTERING FOR SPATIAL JOINS - A method, system, and program product for implementing an automated query filtering process for spatial data is provided. The method includes selecting a set of common depth levels for geohash structures. Data indicating results of the selection is stored and a specified depth level of the set of common geohash depth levels is selected. The selected geohash depth level is associated with a spatial column for spatial data to determine a set of geohash depth levels required to generate geohash values. A filter table or index associated with the spatial column is generated based on the selected subset of common geohash depth levels and a relationship between the spatial column, the specified geohash depth level and the filter table is stored within a database. Geohash values for the filter table are generated and a query of the database is executed with respect to the specified geohash depth level, the filter entries, and the filter table. | 2021-08-19 |
20210256066 | Consumption Unit Estimation Analytics for Prescribing Cloud Computing Resources Utilization - A multi-layer consumption unit estimation (CUE) stack may generate a consumption preview for prescribing cloud computing resource utilization. An input layer of the CUE stack may obtain computing resource utilization tracking data, consumption metric data, application execution tracking data, and computing resource reservation data for a set of computing resources. A configuration layer of the CUE stack may determine a CUE interval and determine consumption metric modifiers for a selected identity associated with the set of computing resources. A CUE engine layer may generate a consumption preview by advancing a dynamic consumption credit input/output flow analysis and executing a direct utilization consumption determination. The pre-prescriptive analysis layer may apply a filter metric to mark the preservable computing resource and the correctable computing resource for exclusion from prescriptive utilization processing and initiate the prescriptive utilization processing on the set of computing resources without computing resources marked for exclusion. | 2021-08-19 |
20210256067 | DATABASE ENGINE FOR AMORPHOUS DATA SETS - Systems and methods for a database engine (“dbe”) that handles amorphous data. In one example, a dbe includes processors coupled to non-transitory computer storage mediums the processors configured to execute the processor-executable instructions to operate a database engine to configure the one or more computer memory components to (1) store information in a database, the database including a Database Version Information String, “next entry” number and a plurality of entries, each entry structure including components of the entry, each of the components including information comprising (i) a component name, (ii) a component type, and (iii) data of the component, wherein each component is contained in only one entry, and each component being of one type of a numeric data type, a text data type, a date data type, or a connection data type, and (2) perform a transaction to store, retrieve and/or change information stored in the database. | 2021-08-19 |
20210256068 | CROSS-MODAL SEARCH SYSTEMS AND METHODS - A training system includes: a training dataset including first objects of a first modality and second objects of a second modality that are associated with the first objects, respectively; a first matrix including first relevance values indicative of relevance between the first objects and the second objects, respectively; a second matrix including second relevance values indicative of relevance between the second objects and the first objects, respectively; and a training module configured to: based on similarities between ones of the second objects, generate a third matrix by selectively adding first additional relevance values to the first matrix; based on the similarities between the ones of the second objects, generate a fourth matrix by selectively adding second additional relevance values to the second matrix; and store the third and fourth matrices in memory of a search module for cross-modal retrieval in response to receipt of search queries. | 2021-08-19 |
20210256069 | LATENT QUESTION REFORMULATION AND INFORMATION ACCUMULATION FOR MULTI-HOP MACHINE READING - A question answering system includes: a first encoder module configured to receive a question, the question including a first plurality of words, and encode the question into a first vector representation; a second encoder module configured to encode a document into a second vector representation, the document including a second plurality of words; a first reading module configured to generate a third vector representation based on the first and second vector representations; a first reformulation module configured to generate a first reformulated vector representation based on the first vector representation; a second reading module configured to generate a fifth vector representation based on the second vector representation and the first reformulated vector representation; a second reformulation module configured to generate a second reformulated vector representation based on first reformulated vector representation; and an answer module configured to determine an answer to the question based on the second reformulated vector representation. | 2021-08-19 |
20210256070 | NON-FUNGIBLE TOKEN (NFT) - A device to securely access a digital asset with an asset blockchain address on a blockchain, including a processor in the mobile body and associated with a processor blockchain address, and a sensor coupled to the body to authenticate a user, wherein selected user events are placed on the blockchain, wherein the processor sends an access request to the digital asset upon authentication based on the blockchain address and events on the blockchain, wherein the digital asset contractual details, access right, and ownership rights are stored on a decentralized ledger, and wherein the processor uses the ledger to record or manage property right for the digital asset. | 2021-08-19 |
20210256071 | SYSTEMS AND METHODS FOR RECEIVING AND PROPAGATING EFFICIENT SEARCH UPDATES IN REAL TIME - A system for receiving and propagating efficient search updates includes one or more processors configured to receive, from a first external system via a network, a first entity change request to modify data in an entity associated with the first external system. The first entity change request is saved in an entity store. The received entity change request is pushed from the entity store to an event publisher for forwarding to a streaming service. The first entity change request is classified and forwarded, from the streaming service, to a search index database. The search index is then updated based on the classified entity change request. | 2021-08-19 |
20210256072 | LOW LATENCY MULTI-CONSTRAINT RANKING OF CONTENT ITEMS - Methods and systems for low-latency multi-constraint ranking of content items. One of the methods includes receiving a request to rank a plurality of content items for presentation to a user to maximize a primary objective subject to a plurality of constraints; initializing a dual variable vector; updating the dual variable vector, comprising: determining an overall objective score for the dual variable vector; identifying a plurality of candidate dual variable vectors that includes one or more neighboring node dual variable vectors; determining respective overall objective scores for each of the one or more candidate dual variable vectors; identifying the candidate with the best overall objective score; and determining whether to update the dual variable vector based on whether the identified candidate has a better overall objective score than the dual variable vector; and determining a final ranking for the content items based on the dual variable vector. | 2021-08-19 |
20210256073 | EDGE SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - A response depth control unit ( | 2021-08-19 |
20210256074 | System and Method for Segmenting Mobile Entities based on Mobile Device Signals - The present disclosure provides novel techniques to derive characteristic of mobile entities based signals from mobile devices associated with these mobile entities. In certain embodiments, a data file is built for each mobile entity to transform originally extremely high dimensional raw data derived from mobile devices communicating with a network into structured data characterizing associated mobile entities. The data file are structured for filtering and searching with respect to location and non-location features. A plurality of filters for a behavioral segment are applied to the data files of a large number of mobile entities. The plurality of filters including a preset hard constraint (HC) filter, a preset soft constraint (SC) filter, and an extended constraint (EC) filter built using location features in data files that have passed through the HC filter and/or the SC filter. In further embodiments, a search index and a search query for a search engine are generated for the behavioral segment based on the filtered data files, and the search query is run against the search index through the data files that have passed the HC filter to search for more data files to add to the segment. | 2021-08-19 |
20210256075 | CONCEPT NETWORKS AND SYSTEMS AND METHODS FOR THE CREATION, UPDATE AND USE OF SAME IN ARTIFICIAL INTELLIGENCE SYSTEMS - Systems and methods for concept based searching or recommendation based on a concept networks are disclosed. More particularly, embodiments of a concept based approach to the search and analysis of data, including the creation, update or use of concept networks in searching and analyzing data are disclosed, including embodiments of the usage of such concept networks in artificial intelligence systems that are capable of utilizing concepts expressed by users to return or evaluate associated entities or content. | 2021-08-19 |
20210256076 | INTEGRATED BROWSER EXPERIENCE FOR LEARNING AND AUTOMATING TASKS - In non-limiting examples of the present disclosure, systems, methods and devices for automating web browser task actions are presented. An indication to record a new action may be received. One or more steps associated with the action may be performed during the recording. Each step may comprise interaction with a different webpage element corresponding to an HTML node. The HTML node, and one or more additional HTML nodes may be extracted and/or tagged, and a machine learning model may be applied to the extracted/tagged nodes. The machine learning model may have been trained to create templates for identifying interacted-with web elements. The automated action may be performed by applying the machine learning model to one or more websites. The machine learning model may identify the correct web elements to interact with and move through the action steps in an automated manner to perform the action. | 2021-08-19 |
20210256077 | METHODS, DEVICES AND COMPUTER-READABLE STORAGE MEDIA FOR PROCESSING A HOSTED APPLICATION - A method, a device and a computer readable storage medium for processing a hosted application. The method obtains a user's user operation which is based on a first application, and in turn obtains application function identification information of a hosted application on a second application according to the user operation, and to invoke the second application to run the hosted application to implement application functions according to the application function identification information of the hosted application. | 2021-08-19 |
20210256078 | INFORMATION PROCESSING METHOD AND DEVICE - Provided is a method, performed by an information processing device, of processing information by using an Internet of things (IoT) device, the method including: receiving, from a user, a web search query; fetching context information of at least one IoT device related to the web search query; automatically generating a synthetic web search query including the web search query and the context information of the at least one IoT device; and determining a control to be applied to the at least one IoT device by using a search result regarding the synthetic web search query. | 2021-08-19 |
20210256079 | ADAPTING DATABASE QUERIES FOR DATA VIRTUALIZATION OVER COMBINED DATABASE STORES - Adapting database queries from a common interface into conditions specific to database storage formats, optimization of a data model, and virtualization of query results from combined databases. | 2021-08-19 |
20210256080 | INTELLIGENT SELECTION AND PRESENTATION OF PEOPLE HIGHLIGHTS ON A COMPUTING DEVICE - Technology is disclosed for selecting at least one people highlight, with respect to a person of interest, to be shown on one or more user devices. The user device is monitored to determine a user interest in a person of interest. A set of possible people highlights, with respect to the person of interest is determined. A determination is made as to whether any of the possible people highlights should be suppressed and not presented to the user on the user device. Any people highlights that were determined to be people highlights that should be suppressed and not presented are removed to create a remaining set of possible people highlights. At least one of the remaining set of possible people highlights are presented on the user device. | 2021-08-19 |
20210256081 | CLUSTERING AND CORANKING OF MULTI-SOURCE LOCATION DATA - A method, computer program product, and apparatus for determining improved data objects are provided. An example method receives a request for a renderable data object from a location source device associated with a user profile including instant location data. The method queries an explicit locations database and an implicit locations database and coranks this multisource locations data. The method compares the coranked locations with one or more object redemption locations of each renderable data object. The method determines a proximity score for each renderable data object and ranks each renderable data object based upon proximity score. The method then identifies a proximate data object having a minimum proximity score and transmits the proximate data object to the location source device. | 2021-08-19 |
20210256082 | DYNAMIC LANGUAGE TRANSLATION OF WEB SITE CONTENT - Methods, systems, and computer readable medium for providing translated web content with translated URLs. A request is received content in a second language translated from content in a first language. The content in the first language is obtained from the first Internet source. One or more links are identified from the content in the first language. Each original URL is divided into one or more translatable URL components in the first language. Whether the one or more translatable URL components in each original URL have been previously translated into the second language and stored as translated URL components is determined. If there is at least one translatable URL component previously translated and stored as a corresponding translated URL component, a translated URL in the second language for each original URL is generated. The content in the second language with translated URLs is created. | 2021-08-19 |
20210256083 | UPDATING A SEARCH PAGE UPON RETURN OF USER FOCUS - A “while away” canvas is described herein. A client computing device detects that a page that comprises search results is displayed on a display of the client computing device, wherein the search results were identified based upon a query received from the client computing device. The client computing device subsequently, detects that focus of the user has left the page. Upon detecting that focus of the user has returned to the page, the client computing device updates the page to include the “while away” canvas, which identifies additional search results (based upon the query) that were published after the page that comprises the search results was initially displayed. | 2021-08-19 |
20210256084 | INFORMATION PLATFORM SYSTEMS AND METHODS - Various aspects describe an information platform for consistently integrating and/or quantifying the underlying principles of ESG into financial analyses, analytical tools, metrics, and/or available information on reviewed companies, business entities, etc., and further provide integration of analysis with community-based insight, contextual information and tools for readily understanding both. Various embodiments implement machine learning tools for curating data sources and incorporating the data sources into the knowledge platform. The incorporation of AI moderated information sources enables succinct views of often massive information pools, and further provides for transitions between types of information (e.g., qualitative, quantitative, and interactive data source (e.g., engagements, collaborative information, etc.)). The platform facilitates user understanding and can eliminate the need to design and execute complicate queries by allowing users to transition between data types and view to develop better understanding and context of various information sources. | 2021-08-19 |
20210256085 | METHODS AND DEVICES FOR SEARCHING FOR A HOSTED APPLICATION - A method for searching for a hosted application is described. The method includes establishing or updating a hosted application index information library for a plurality of hosted applications, and hosted applications are stored or registered at the first network device. The hosted application index information library includes hosted application records, and each of the hosted application records corresponds to one of the hosted applications and includes hosted application information and an index field of the hosted application, receiving a hosted application search request transmitted by a user equipment, searching for a match in the hosted application index information library according to the hosted application search request to obtain information on one or more target hosted applications which match the hosted application search request, and returning information on at least one of the one or more target hosted applications to the user equipment. | 2021-08-19 |
20210256086 | REFACTORING OF STATIC MACHINE-READABLE CODES - Methods, devices and systems for computing interactive customized content in response to a scan of a machine-readable label are provided. Illustrative methods may include receiving, from a user, a scan of a machine-readable optical label captured using a camera of a mobile device. Methods may include determining, based on the scan, a redirect Uniform Resource Locator (URL). Methods may include generating, based on a user profile and a redirect service that is accessed using the redirect URL, comprising the customized content associated with the scan. Methods may include redirecting the user to a target landing page URL, and providing, to the user through a browser on the mobile device, a target landing page that includes the customized content. | 2021-08-19 |
20210256087 | SPEEDING UP DOCUMENT LOADING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for speeding up document loading. In some implementations, a resource of a document is requested from a first source, and metadata for the document is requested from a second source that is different from the first source. The requested metadata is received from the second source, and the requested resource is received from the first source. A first representation of the document based on the received metadata is provided for display. After providing the first representation, a second representation of the document that combines portions of the first representation with additional portions of the document is generated, and the second representation is provided for display. | 2021-08-19 |
20210256088 | METHOD, APPARATUS, COMPUTER DEVICE AND STORAGE MEDIUM OF PAGE DISPLAYING - A method of page displaying includes: obtaining page data of a current page of an application; the page data includes a screenshot and view identifiers and view names of a plurality of views; adding the plurality of view identifiers to a plurality of arrays having different levels according to a preset rule; building a multi-fork tree corresponding to the current page of the application using the array; generating hierarchical paths corresponding to the plurality of views according to the multi-fork tree, adding corresponding burial point frames to the corresponding views according to the hierarchical path, and transmitting the screenshot provided with burial point frames to the preset terminal, so that the preset terminal displays the screenshot with burial point frames. | 2021-08-19 |
20210256089 | IDENTIFYING AND MONITORING RELEVANT ENTERPRISE DATA STORED IN SOFTWARE DEVELOPMENT REPOSITORIES - One example operation may include selecting one or more terms to query one or more software repositories, querying the one or more of the software repositories for instances of the one or more query terms, identifying one or more domain names included in the one or more software repositories based on the query, and determining one or more relevancy scores corresponding to the one or more public software repositories based on a quantity of identified terms instances and domain names. | 2021-08-19 |
20210256090 | OPTIMIZATION APPARATUS AND OPTIMIZATION METHOD - An optimization apparatus includes: Ising machines that each search for a solution of a subproblem among subproblems obtained by dividing a problem represented by an Ising model, each of the Ising machines including: a memory configured to store values of a state variable set corresponding to a subproblem to be calculated for a plurality of groups; a processor configured to: perform processing of calculating a second solution candidate for each of the plurality of groups based on first solution candidates of subproblems calculated by other Ising machines by changing a group to be processed for every unit period such that the second solution candidate is calculated for the state variable set of a group different from groups processed by the other Ising machines in a same unit period; and a communication circuit configured to transmit the second solution candidate to the other Ising machines every time the unit period ends. | 2021-08-19 |
20210256091 | MULTI-DIMENSIONAL DATA ANALYSIS AND DATABASE GENERATION - Described herein are systems and methods for multi-dimensional analysis of complex data sets to generate multi-factorial overlap intervals used in lookup tables to classify input data. Also disclosed are systems and methods for provisioning searchable databases comprising the multi-factorial overlap intervals through a distributed network for remote access. | 2021-08-19 |
20210256092 | APPLICATION PROGRAMMING INTERFACE TO ACCELERATE MATRIX OPERATIONS - Apparatuses, systems, and techniques to determine a matrix multiplication algorithm for a matrix multiplication operation. In at least one embodiment, a matrix multiplication operation is analyzed to determine an appropriate matrix multiplication algorithm to perform the matrix multiplication algorithm. | 2021-08-19 |
20210256093 | MATRIX FACTORIZATION WITH TWO-STAGE DATA BLOCK DISPATCH ASSOCIATED WITH GRAPHICS PROCESSING UNITS - Techniques that facilitate matrix factorization associated with graphics processing units are provided. In one example, a system includes a first graphics processing unit, a second graphics processing unit and a central processing unit. The first graphics processing unit processes a first data block of a data matrix associated with a matrix factorization system to generate first information for the matrix factorization system. The second graphics processing unit processes a first portion of a second data block of the data matrix separate from a second portion of the second data block to generate second information for the matrix factorization system. The central processing unit processes a machine learning model for the matrix factorization system based on at least the first information provided by the first graphics processing unit and the second information provided by the second graphics processing unit. | 2021-08-19 |
20210256094 | SYSTEMS AND METHODS FOR DOCUMENT MANAGEMENT CLASSIFICATION, CAPTURE AND SEARCH - Systems and methods for document management classification, capture and search are disclosed. In one embodiment, a system for document management may include a document taxonomy library comprising a plurality of document taxonomies; a document create module comprising a document metadata repository and a document template/clause repository; a document capture module comprising a metadata repository, an image repository, and a document capture workflow; and a document communicate module comprising an extracted metadata repository. In one embodiment, the document create module creates a document using a document taxonomy from the document taxonomy library, the document metadata repository, and the template clause/repository; the document capture module captures metadata from the document based on a document taxonomy associated with the document; and the document communicate module stores extracted metadata from the document in the extracted metadata repository. | 2021-08-19 |
20210256095 | Federated Digital Rights Management Scheme Including Trusted Systems - Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory. | 2021-08-19 |
20210256096 | SPLIT LEDGER SOFTWARE LICENSE PLATFORM - Aspects of the subject disclosure may include, for example, a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including requesting a license for software from first equipment of a license holder; receiving a passed ledger associated with the license from the first equipment of the license holder, wherein the passed ledger comprises a latest block; receiving a hash value for the latest block from a software vendor of the software; calculating a hash value for the latest block; and responsive to the hash value provided by second equipment of the software vendor matching the hash value calculated for the latest block: executing the software. Other embodiments are disclosed. | 2021-08-19 |
20210256097 | DETERMINATION OF INTERMEDIATE REPRESENTATIONS OF DISCOVERED DOCUMENT STRUCTURES - A document is received. The document is analyzed to discover text and structures of content included in the document. A result of the analysis is used to determine intermediate text representations of segments of the content included in the document, wherein at least one of the intermediate text representations includes an added text encoding the discovered structure of the corresponding content segment within a structural layout of the document. The intermediate text representations are used as an input to a machine learning model to extract information of interest in the document. One or more structured records of the extracted information of interest are created. | 2021-08-19 |
20210256098 | SECURE DRM-AGNOSTIC KEY ROTATION - Systems and methods for managing provisioning of keys prior to a key rotation are provided. A license server generates a license that is associated with a renewal time. The renewal time is a time that is prior to a key rotation time, and triggers a receiver device to send a renewal request prior to the key rotation time. The renewal time may be a randomized time prior to the key rotation time that differs for different receiver devices. The license is transmitted to the receiver device. The license server then receives a renewal request from the receiver device that is triggered at the renewal time. The license server generates a next license that comprises a next key, whereby the next key is a decryption key for decrypting the encrypted signal after the key rotation time. The next license is transmitted to the receiver device prior to the key rotation time. | 2021-08-19 |
20210256099 | INFORMATION PROCESSING METHOD - An information processing method includes acquiring image information imaged in such a manner that identification information for identifying a user and a scene related to the user are associated with each other (step S | 2021-08-19 |
20210256100 | AUTHENTICATION-BASED ON HANDHOLDING INFORMATION - An apparatus may include a processor that may be caused to access handholding information indicating a hand configuration in which the apparatus is being held and compare the handholding information with previously-stored handholding authentication data of an authentic user. The previously-stored handholding authentication data may represent an authentic configuration in which the apparatus is held by the authentic user. The processor may be caused to determine that the apparatus is being held by the authentic user based on the comparison and cause an authenticated action to occur based on the determination. | 2021-08-19 |
20210256101 | UNLOCKING PROCESSING METHOD AND DEVICE, AND COMPUTER STORAGE MEDIUM - An unlocking processing method can be applied to a terminal, and include: in response to detecting a touch operation on a hot zone for a spot of the terminal, determining a direction of a signal generated by the touch operation among a plurality of directions; determining a threshold according to the direction, wherein at least two of the plurality of directions each corresponds to a respective different threshold; and reporting a request for lighting up the spot in the hot zone, in response to that a coverage of the signal exceeds the threshold. | 2021-08-19 |
20210256102 | REMOTE BIOMETRIC IDENTIFICATION - The present invention provides a method of operating a device to perform a biometric authentication, the device comprising a biometric authentication unit and a secure element, the method comprising establishing a first secure connection between the biometric authentication unit of the device and the secure element; causing the biometric authentication unit to obtain biometric data from a user of the device and to authenticate said biometric data; transmitting a message from the biometric authentication unit to the secure element containing a result of the authentication over the secure connection; and transmitting the result of the authentication from the secure element to a remote entity over a second secure connection. | 2021-08-19 |
20210256103 | HANDHELD MULTI-SENSOR BIOMETRIC IMAGING DEVICE AND PROCESSING PIPELINE - A handheld biometric imaging device having an array of cameras configured to simultaneously capture face, iris and fingerprint biometrics of a subject. The device includes a plurality of visible-light cameras and a plurality of infrared-light cameras capable of being triggered simultaneously to obtain a plurality of images from which a 3D image of the light field can be constructed. The device includes a plurality of visible-light illuminators and a plurality of infrared-light illuminators that allow images of a subject to be captured under different lighting profiles. The device may include an onboard control system that is capable of reconstructing a face region, an iris region and a fingerprint region from the 3D light-field image, and then extract a corresponding face template, an iris template, and a fingerprint template from the respective reconstructed regions. The extracted face, iris, and fingerprint templates may be used for enrollment and/or comparison against a biometric-template database associated with one or more watchlists. | 2021-08-19 |
20210256104 | INFORMATION PROCESSING APPARATUS, USER AUTHENTICATION NETWORK SYSTEM, AND USER AUTHENTICATION METHOD - An information processing apparatus includes a voice input processing unit, a memory, and a controller. The voice input processing unit takes in voice of a user of the information processing apparatus to convert the voice into a first voice signal. The controller extracts a first voice feature from the first voice signal to compare it with voice features registered in the memory. When the first voice feature is not matched with any voice features, the controller executes a process for storing the first voice feature in the memory to be associated with the registration target user, a process for generating a voice password based on the first voice feature, and a process for storing the voice password in the memory. The controller executes user authentication processing for an authentication target user by using the voice password in the memory by the user registering process. | 2021-08-19 |
20210256105 | TRUSTED COMPUTING METHOD, AND SERVER - A trusted computing method applicable in a computer device, a computer device, and a storage medium are provided. The method comprises: during a startup process of the computer device including first and second trusted computing chips, the first trusted computing chip performing a static measurement on the computer device to obtain a static measurement result, and sending the static measurement result to a verification center; and during operations of the computer device after startup of the computer device, the second trusted computing chip performing a dynamic measurement on the computer device to obtain a dynamic measurement result, and sending the dynamic measurement result and association evidence to the verification center, wherein the association evidence indicates that the first and the second trusted computing chips are disposed in the same computer device, and the verification center associates the two measurement results and verifies the integrity of a software system of the computer device. | 2021-08-19 |
20210256106 | GENERATING SENSOR-BASED IDENTIFIER - Examples of creating a device identifier that are based upon hardware components of a client device are discussed. An inaudible or high frequency reference audio sample is played. Audio capture is initiated using the microphone system. A sensor-based device identifier can be generated from the captured audio due the manufacturing variances in the hardware components used for the speaker and microphone systems. | 2021-08-19 |
20210256107 | SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATION - A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a user-defined cognitive signature pathway through multiple graphical zones of a graphical user interface. The signature pathway enables authorized user access to an otherwise secured location. Subsequent entries of the signature pathway entered via the graphical user interface are then validated. For all valid entries of the signature pathway, user access is allowed to the secured location. | 2021-08-19 |
20210256108 | USE OF STEGANOGRAPHY TO AUTHENTICATE PROVIDER OF PACKAGE, DEVICE, OR DEVICE COMPONENT - In one aspect, the present application relates to a package or computer-related component that may indicate steganographic data that indicates a provider of the device. The present application also relates to using other electronic devices to identify and authenticate that the package or computer-related component is from the provider. | 2021-08-19 |
20210256109 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING SYSTEM - An information processing device includes a first communication unit, a second communication unit, an information processing unit, and a switching unit. The first communication unit is configured to communicate with a terminal device. The second communication unit is configured to communicate with a device connected to a network. | 2021-08-19 |
20210256110 | Two-Factor Artificial-Intelligence-Based Authentication - A computer device may receive multiple images of instances of a label and timestamps or identifiers of the images, where the instances of the label are associated with a printer. Then, the computer may divide the images into subgroups based at least in part on the timestamps or the identifiers and/or differences between the images, and may train a predictive model using the subgroups and information specifying the printer. For a given subgroup, the predictive model may be associated with a predictive signature. Moreover, the predictive model may have a given image of a given instance of the label as an input, and may provide an identity or an identifier of the given subgroup associated with the given image and the printer as an output. Note that the predictive model may be used to activate and/or authenticate another instance of the label. | 2021-08-19 |
20210256111 | SYSTEMS AND METHODS FOR PASSWORD MANAGERS - An authentication system comprises a browser extension and a password manager application. The browser extension can be configured for execution on a first user device. The browser extension can be configured to display a response code and receive a login credential from a server. The response code can comprise a unique session identifier identifying the browser extension and a user browsing session. The password manager application can be configured for execution on a second user device. The second user device can have a scanner configured to scan the response code. The password manager application can be configured to extract the unique session identifier, parse the unique session identifier into session identifier content, send a portion of the session identifier content to the server, receive an approval from a user of the second user device, and send a notification to the server. | 2021-08-19 |
20210256112 | SYSTEMS AND METHODS FOR GENERATING AND VALIDATING CERTIFIED ELECTRONIC CREDENTIALS - Systems and methods for generating and validating certified electronic credentials are disclosed. A publisher may receive a certified electronic credential order from a credentialer and prepare a plurality of certified electronic credentials. The publisher may associate each credential with authentication information and a credential record, and retain a database of associated authentication information and credential records. The publisher may provide validation services, receiving a validation request through a credentialer's validation portal, and provide a response through the credentialer's portal indicative of the validity, additional information about the credential and/or the credential holder. The credential holder may assign a personal access key to control or limit the validation of a credential. A validating entity may receive credential validation through the credentialer with a heightened degree of confidence in the validation and lack of forgery. | 2021-08-19 |
20210256113 | Blockchain Validation of Software - Aspects of the disclosure relate to validation of software by private and public blockchains. Hashes for known software are stored in a private blockchain. Hashes for unknown software are compared against the known hashes to determine if the software is known, malware free, and/or an authorized copy. Hashes for known good software and/or malware-containing software can be pre-seeded to the blockchains. Unknown software can be tested in sandboxes. Comparison results are stored in new blocks in the private chain and can be propagated out to the public chain anonymously without company attribution or software name disclosure. Validation servers can control the integrity of the blockchains. Updating blockchains may be controlled by requiring agreement of a majority of validation servers. Third parties can access the public chain to evaluate unknown software that they receive to determine if the software is malware free and/or an authorized copy. | 2021-08-19 |
20210256114 | Over-The-Air Upgrade Method and Related Apparatus - An over-the-air (OTA) upgrade method includes obtaining, by a server, a new version of encrypted data and an old version of encrypted data of system software applied to a mobile terminal, decrypting, by the server, the new version of encrypted data to obtain a new version of original data, decrypting, by the server, the old version of encrypted data to obtain an old version of original data, performing, by the server, differentiation on the new version of original data and the old version of original data to obtain differential data, generating, by the server, OTA data based on the differential data, and sending, by the first server, the OTA data to the mobile terminal. | 2021-08-19 |
20210256115 | METHOD AND ELECTRONIC DEVICE FOR GENERATING SEMANTIC REPRESENTATION OF DOCUMENT TO DETERMINE DATA SECURITY RISK - A method and an electronic device ( | 2021-08-19 |
20210256116 | SECURING INDUSTRIAL PRODUCTION FROM SOPHISTICATED ATTACKS - A manufacturing system is disclosed herein. The manufacturing system includes one or more stations, a monitoring platform, and a control module. Each station of the one or more stations is configured to perform at least one step in a multi-step manufacturing process for a component. The monitoring platform is configured to monitor progression of the component throughout the multi-step manufacturing process. The control module is configured to detect a cyberattack to the manufacturing system. The control module is configured to perform operations. The operations include receiving control values for a first station of the one or more stations. The operations further include determining that there is a cyberattack based on the control values for the first station using one or more machine learning algorithms. The operations further include generating an alert to cease processing of the component. In some embodiments, the operations further include correcting errors caused by the cyberattack. | 2021-08-19 |
20210256117 | PREVENTING RANSOMWARE FROM ENCRYPTING FILES ON A TARGET MACHINE - Techniques for preventing ransomware from encrypting files on a target machine are disclosed. In some embodiments, a system/process/computer program product for preventing ransomware from encrypting files on a target machine includes monitoring file system activities on a computing device; detecting an unauthorized activity associated with a honeypot file or honeypot folder; and performing an action based on a policy in response to the unauthorized activity associated with the honeypot file or honeypot folder. | 2021-08-19 |
20210256118 | MEASURING INTEGRITY OF COMPUTING SYSTEM USING JUMP TABLE - Examples disclosed herein relate to integrity monitoring of a computing system using a kernel that can update its own code. Trust of state information is verified. Kernel code and module code are loaded into memory that is accessible to a device separate from a processor that loads the kernel code and module code. A measurement module is verified and loaded into memory. The state information can correspond to multiple symbols. The measurement module can measure the state information corresponding to each of the respective symbols to generate a set of initial measurements. The set of initial measurements can be provided to a device for integrity monitoring. The device is to compare a current measurement with an initial measurement to determine if a potential violation occurred. The device is to use a representation of a jump table to determine whether the potential violation is a violation. | 2021-08-19 |
20210256119 | Digital Fault Injection Detector - A secure Integrated Circuit (IC) includes functional circuitry, and protection circuitry configured to protect the functional circuitry against fault-injection attacks. The protection circuitry includes a plurality of digital detection cells, and protection logic. The detection cells have respective inputs and outputs and are connected output-to-input in at least a chain. In response to a fault-injection attack, a given detection cell in the chain is configured to toggle an output that drives an input of a subsequent detection cell in the chain, thereby causing a pulse to propagate along the chain. The protection logic is configured to receive the pulse from the chain and initiate a responsive action. | 2021-08-19 |
20210256120 | UTILIZATION OF DECEPTIVE DECOY ELEMENTS TO IDENTIFY DATA LEAKAGE PROCESSES INVOKED BY SUSPICIOUS ENTITIES - A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder. | 2021-08-19 |
20210256121 | SYSTEM AND METHOD TO BUILD ROBUST CLASSIFIERS AGAINST EVASION ATTACKS - Provided are embodiments for building a robust classifier against evasion attacks. The embodiments include receiving an application, identifying one or more features of the application, and determining a first confidence score for a first version of the application including a first set of features and determining a second confidence score for a second version of the application including a second set of features, wherein the first set of features is different than the second set of features. The embodiments also include determining a difference between the first confidence score and the second confidence score, and comparing the difference with a convergence threshold. The embodiments include based on the comparison, determining whether the first confidence score exceeds a confidence score threshold, and generating a report based on determining the first confidence score exceeds the confidence score threshold. | 2021-08-19 |
20210256122 | SYSTEM AND METHOD FOR DETECTING SOURCE CODE ANOMALIES - A system includes a source code repository which stores source code entries, which include instructions in a programming language for performing computing tasks. A style repository stores a style profile for a plurality of users. Each style profile includes predefined style features associated with formatting characteristics of the stored source code entries for a corresponding user. A source code analyzer receives, from a user, a source code which includes instructions in the programming language for performing a computing task. Style features of the source code are determined. The style features include characteristics of a format of the source code. The source code analyzer determines whether the style features correspond to predefined style features indicated by a style profile of the user. If this is the case, the source code is stored in the source code repository. If this is not the case, storage of the source code is prevented. | 2021-08-19 |
20210256123 | DOCUMENTING AND ANNOTATING CODE ACTIVITIES - One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation. | 2021-08-19 |
20210256124 | TARGETING AND SECURITY AUDIT FOR DIGITAL CONTENT - Methods, computer-readable media, and devices for auditing digital content to validate that the digital content is authentic, secure, and reaching the intended audience are disclosed. In one example, a method performed by a processing system including at least one processor includes launching a web browser application, wherein the launching includes instantiating a simulated user profile, and wherein the simulated user profile includes a simulated web browsing history, detecting, by the processing system, an item of digital content that is presented to the web browser application in response to the simulated user profile, determining, by the processing system, a relevance of the item of digital content to the simulated user profile, and generating, by the processing system, a report that indicates the relevance of the item of digital content to the user profile. | 2021-08-19 |
20210256125 | Post-Training Detection and Identification of Backdoor-Poisoning Attacks - This patent concerns novel technology for detecting backdoors in neural network, particularly deep neural network (DNN) classification or prediction/regression models. The backdoors are planted by suitably poisoning the training dataset, i.e., a data-poisoning attack. Once added to an input sample from a source class of the attack, the backdoor pattern causes the decision of the neural network to change to the attacker's target class in the case of classification, or causes the output of the network to significantly change in the case of prediction or regression. The backdoors under consideration are small in norm so as to be imperceptible to a human or otherwise innocuous/evasive, but this does not limit their location, support or manner of incorporation. There may not be components (edges, nodes) of the DNN which are specifically dedicated to achieving the backdoor function. Moreover, the training dataset used to learn the classifier or predictor/regressor may not be available. In one embodiment of the present invention, which addresses such challenges, if the classifier or predictor/regressor is poisoned then the backdoor pattern is determined through a feasible optimization process, followed by an inference process, so that both the backdoor pattern itself and the associated source class(es) and target class are determined based only on the classifier or predictor/regressor parameters and using a set of clean (unpoisoned) samples, from the different classes (none of which may be training samples). | 2021-08-19 |
20210256126 | PRIVACY-PRESERVING CONTENT CLASSIFICATION - An apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to store a malware pattern set and a non-malware pattern set ( | 2021-08-19 |
20210256127 | SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE DETECTION - Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a system and method for detecting malware using multi-stage file-typing and, optionally pre-processing, with fall-through options. The system and method receive a set of training files which are each known to be either malign or benign, partition the set of training files into a plurality of categories based on file-type, in which the partitioning file-types a subset of the training files into supported file-type categories, train file-type specific classifiers that distinguish between malign and benign files for the supported file-type categories of files, associate supported file-types with a file-type processing chain that includes a plurality of file-type specific classifiers corresponding to the supported file-types, train a generic file-type classifier that applies to file-types that are not supported file-types, and construct a composite classifier using the file-type specific classifiers and the generic file-type classifier. | 2021-08-19 |
20210256128 | MALWARE SCAN IN RESPONSE TO POWER CHANGE - In one aspect, a device includes at least one processor and storage accessible to the at least one processor. The storage includes instructions executable by the at least one processor to identify a power change condition in the device, and responsive to the power change condition, execute a scan for malware on the device using an operating system (O.S.) loaded into memory of the device from a server separate from the device. | 2021-08-19 |
20210256129 | DYNAMIC ANALYSIS TECHNIQUES FOR APPLICATIONS - A virtualized storage for use in performing dynamic analysis on a sample is configured, at least in part by copying the sample to the virtualized storage. A virtual machine emulator is launched using a snapshot of a virtualized platform. The virtualized platform is previously configured to use the virtualized storage, and the snapshot is configured to use a placeholder file to occupy space for later use when installing the sample. A location of the copied sample in an image corresponding to the virtualized storage is determined. The copied sample is installed and dynamic analysis is performed on the sample. | 2021-08-19 |
20210256130 | DETERMINING AN ORIGIN OF A TARGET SOURCE CODE FOR A COMPUTER PROGRAM OR A PART THEREOF - A computer-implemented method for determining an origin of a target source code for a computer program or a part thereof. The method involves: Searching a plurality of software archives from different sources in a global computer network to find occurrences of the target source code among code files in said software archives. For every found occurrence of the target source code, the method further involves collecting key information about the matching source code files and, from the key information collected a frequency map is built that contains, for each keyword found in the key information, a keyword count value being indicative of the number of times the keyword occurs in the key information. The method may further involves applying a scoring scheme to the matching source code files based on the built frequency map ( | 2021-08-19 |
20210256131 | Information Handling System with Mechanism for Reporting Status of Persistent Memory Firmware Update - During a power-on self-test (POST), a basic input/output system (BIOS) retrieves an attribute value associated with the persistent memory device, and compares the attribute value to a default value. In response to the attribute value matching the default value, the BIOS may determine that a firmware management protocol was not executed during a previous POST. In response to the attribute value not matching the default value, the BIOS may compare the attribute value to a current firmware version of firmware within the persistent memory device. | 2021-08-19 |
20210256132 | SYSTEM AND METHOD FOR SECURING FIRMWARE FUNCTION CALLS USING SESSION-BASED ENCRYPTION - Systems and methods for securing firmware function calls are discussed. More particularly, mechanisms for reducing the chance of tampering and information disclosure attacks against firmware function calls implemented in SMM/MM are described. Data may be passed to and from a calling entity to platform firmware via a communication channel where both the data and the means of decrypting the data are protected from potential snooping OS applications, drivers or DMA-enabled hardware devices. | 2021-08-19 |
20210256133 | HTTPS BOOT TO PROVIDE DECRYPTION KEY - Systems and methods are disclosed for generating a key based on at least one hardware component identifier for hardware of a first device and/or at least one piece of firmware code of the first device. The key may then be stored at a storage area accessible to the first device via hypertext transfer protocol secure (HTTPS) communication and the key may also be used to encrypt storage of the first device. Booting of the first device may then be facilitated based on HTTPS communication with a second device and using an extensible firmware interface (EFI) file and/or an IMG file stored at the second device. Then subsequent to at least partially facilitating the booting of the first device and based on verifying authentication credentials, the key may be transmitted to the first device to decrypt the storage of the first device. | 2021-08-19 |
20210256134 | APPARATUS FOR LAN BOOTING ENVIRONMENT-BASED FILE SECURITY AND CENTRALIZATION, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM ON WHICH PROGRAM FOR PERFORMING SAME METHOD IS RECORDED - An apparatus for LAN booting environment-based file security and centralization, a method therefor, and a computer-readable recording medium recorded with a program for performing the method are proposed. The apparatus can include a central server including a storage module for storing a plurality of operating system images; a communication module for communicating with a user device; and a LAN booting management module configured to, when receiving a LAN booting start request message from the user device through the communication module, select an operating system image that can be used in the user device among the plurality of operating systems according to user device information, and transmit the selected operating system image, a user apparatus corresponding to the same, a method for LAN booting environment-based file security and centralization of these devices, and a computer-readable recording medium recorded with a program for performing the method. | 2021-08-19 |
20210256135 | TECHNOLOGY FOR ADAPTIVE SOFTWARE DISCOVERY SCAN - A first computer system is scanned at configured, default time intervals by a software asset management (“SAM”) software application installed on the first computer system, wherein the scanning detects other software applications installed on the first computer system. The SAM software application generates a list of the other software applications installed on the first computer system and stores the list on a computer readable storage medium. An override software module triggers the SAM software application to perform an early scan of the first computer system, before a scan of the first computer system that the SAM software application would otherwise perform at a next default scan time. The triggering is in response to information obtained from a source external to the first computer system about a triggering one of the software applications on the list. | 2021-08-19 |