41st week of 2019 patent applcation highlights part 41 |
Patent application number | Title | Published |
20190311071 | INCORPORATION OF PROCESS VARIATION CONTOURS IN DESIGN RULE AND RISK ESTIMATION ASPECTS OF DESIGN FOR MANUFACTURABILITY TO INCREASE FABRICATION YIELD - A system and method to perform risk assessment or design rule determination for an integrated circuit involves generating two or more process variation contours based on corresponding two or more combinations of two or more factors that affect manufacturability of the integrated circuit. Each of the two or more process variation contours is associated with a probability. The method also includes generating a random number to select from among the two or more process variation contours based on a cumulative probability value associated with each of the two or more process variation contours. The cumulative probability values are determined from the probabilities. The risk assessment or the design rule determination is performed using selected ones of the two or more process variation contours. Fabrication yield is increased based on finalizing the physical layout using the process variation contours. | 2019-10-10 |
20190311072 | METHOD OF DEBUGGING A PROCESSOR - Methods for designing a processor based on executing a randomly created and randomly executed executable on a fabricated processor. By implementing randomization at multiple levels in the testing of the processor, coupled with highly specific test generation constraint rules, highly focused tests on a micro-architectural feature are implemented while at the same time applying a high degree of random permutation in the way it stresses that specific feature. This allows for the detection and diagnosis of errors and bugs in the processor that elude traditional testing methods. Once the errors and bugs are detected and diagnosed, the processor can then be redesigned to no longer produce the anomalies. By eliminating the errors and bugs in the processor, a processor with improved computational efficiency and reliability can be fabricated. | 2019-10-10 |
20190311073 | METHOD AND SYSTEM FOR EXCHANGING DATA BETWEEN DIFFERENT SUB SYSTEMS - A method for exchanging data between different sub systems, the data relating to one or more buildings, is disclosed. The method comprises the following steps taken in any order: creating one or more applications for each different sub system; collecting the data in a single remotely stored and common shared Building Information Model, BIM, database via the one or more applications, and storing the data in the BIM database without conversion of the data; and providing the different sub systems access to the BIM database via the one or more applications, the access to the data being simultaneous for the different sub systems by allowing each different sub system to read any data in the BIM database at any time and by allowing each different sub system to reserve and release data in the BIM database for changing data in the BIM database. A system providing different sub systems with data exchange, according to such a method, to a database is also disclosed, the data relating to one or more buildings. The system comprises the database being a BIM database, the BIM database being a single remotely stored and common shared BIM database, data stored without conversion of the data in the BIM database. The BIM database comprises a single root class from which all other data model classes of each different sub system are derived, configured as a single and scalable data structure for the entire data model of the BIM database and all data operations on the BIM database, the single root class defining and handling all data of all objects in the data model, and the BIM database comprising a hierarchical tree structure where the hierarchical tree structure is configured according to parts and/or properties of the one or more physical buildings. The system comprises an application for each different sub system, the application being configured with one or more user accounts configured to access the data in the BIM database, and the application configured to share the BIM database via the one or more applications. The system comprises an access between the BIM database and each different sub system to allow data transfer between the BIM database and each different sub system via the application for each different sub system, the access comprising configuring the application to allow each different sub system to read any data in the BIM database simultaneously at any time and configuring the application to allow each different sub system to reserve and release data in the BIM database for changing data in the BIM database. | 2019-10-10 |
20190311074 | Verification of Hardware Design for Data Transformation Pipeline - Methods and systems for verifying, via formal verification, a hardware design for a data transformation pipeline comprising one or more data transformation elements that perform a data transformation on one or more inputs, wherein the formal verification is performed under conditions that simplify the data transformations calculations that the formal verification tool has to perform. In one embodiment the hardware design for the data transformation pipeline is verified by replacing one or more of the data transformation elements in the hardware design with a function element which is treated as an unevaluated function of its combinational inputs by a formal verification tool such that during formal verification the function element will produce the same output for the same inputs, and formally verifying that for each transaction of a set of transactions an instantiation of the modified hardware design for the data transformation pipeline produces a set of one or more outputs that matches a reference set of one or more outputs for that transaction. | 2019-10-10 |
20190311075 | Verification of Hardware Design for Data Transformation Pipeline with Equivalent Data Transformation Element Output Constraint - Methods and systems for verifying, via formal verification, a hardware design for a data transformation pipeline comprising one or more data transformation elements that perform a data transformation on one or more inputs, wherein the formal verification is performed under conditions that simplify the data transformations calculations that the formal verification tool has to perform. In one embodiment the hardware design for the data transformation pipeline is verified by formally verifying that the output of an instantiation of the hardware design produces the same output as an instantiation of a hardware design for another data transformation pipeline for a predetermined set of transactions under a constraint that substantially equivalent data transformation elements between the data transformation pipelines produce the same output(s) in response to the same input(s). | 2019-10-10 |
20190311076 | System And Method For Compliance, Safety And Space Management - A computerized system for managing disparate data comprising: a server in electronic communications with a remote access point and data depositories taken from the group consisting of: physical documents, digital documents, third party databases, regulatory databases, building code databases, or any combination; and, a set of server computer readable instructions that for retrieving disparate information from data depositories, normalizing the data in the data depositories, adding functional overlays to the normalized data, displaying the normalized data in response to a user request. | 2019-10-10 |
20190311077 | SYSTEM AND METHOD FOR GENERATING VEHICLE TRAVEL DATA - Disclosed embodiments provide techniques for generation of vehicle travel data. Past-travel data including previously taken trips, along with metadata including, but not limited to, vehicle type, vehicle model, navigation device model, are obtained and classified. A travel route for simulation data is selected. Data from various previous trips are combined to create a simulation data set for the travel route. This data is based on actual vehicle data. This can enable a new level of accuracy for data analysis and simulations based on this data as compared with purely simulated data. Actual vehicle data accounts for driver behavior, road obstacles, signage, vegetation, vehicle characteristics, and other factors that may not be able to be captured with purely simulated traffic data. Using the data generated by disclosed embodiments enables these factors to be considered in traffic analysis. | 2019-10-10 |
20190311078 | METHOD AND DEVICE FOR MONITORING A POWER SUPPLY DEVICE OF A TRAFFIC SYSTEM - A method and a device for monitoring a power supply apparatus of a traffic system. A computer-based model of the power supply apparatus is created inter alia with the aid of predetermined parameters which are relevant for the power supply apparatus. The invention aims to meet changed requirements of modern power supply devices. Current characteristic quantities are determined during the operation of the traffic system and the operation of the power supply device is simulated at least with the aid of the model and the characteristic quantities. | 2019-10-10 |
20190311079 | SIMULATION APPARATUS, ROBOT, SIMULATION METHOD, AND PROGRAM THEREFOR - A motion instruction value calculation unit is configured to calculate operation instruction values of a pick-and-place apparatus to be simulated. A dynamics calculation unit is configured to read the operation instruction values that are output from the motion instruction value calculation unit, and to calculate an apparatus operation considering the dynamics. Based on the apparatus operation considering the dynamics, the suction success/failure calculation unit is configured to determine whether a workpiece is successfully sucked by a suction pad. A 3D display unit is configured to display a 3D image of the apparatus operation considering the dynamics in a display unit such as a liquid crystal display. | 2019-10-10 |
20190311080 | System and Method for Facilitating Installation of User Nodes in Fixed Wireless Data Network - A mobile application for facilitating installation of the user nodes in a fixed wireless network utilizes augmented reality to provide location, usage, and recommendation information about nearby service nodes. A camera of the mobile computing device captures image data depicting the surrounding area, which is displayed on a touchscreen display of the mobile computing device with graphical elements including icons and textual information overlaid on the captured image data in different positions and with different visual characteristics based on geometric information for the mobile computing device and the surrounding area, the relative position of nearby service nodes with respect to the mobile computing device, and information about the service nodes such as typical usage and/or whether the service node is recommended or not. A virtual antenna is also overlaid on the image data, and an image depicting the virtual antenna as it would look once installed is generated and stored. | 2019-10-10 |
20190311081 | Method for Designing a Forming Element for a Forming Tool and a Forming Element Produced by Way of Such a Method - A method for designing a first forming element for a forming tool that is intended for forming workpieces is provided. The forming tool includes the first forming element and at least one second forming element. The method includes the steps of: providing first data, characterizing an element geometry of the first forming element; providing second data, characterizing the second forming element; by way of an electronic computing device, carrying out a forming simulation on the basis of the first and second data, where a forming of a workpiece that is brought about by way of the forming elements is simulated by way of the forming simulation and a forming geometry of the workpiece; comparing the forming geometry with a predetermined target geometry; and if a difference determined by the comparison between the forming geometry and the target geometry exceeds a predetermined threshold, changing at least the first data. | 2019-10-10 |
20190311082 | HETEROGENEOUS MINIATURIZATION PLATFORM - A method of forming an electrical device is provided that includes forming microprocessor devices on a microprocessor die; forming memory devices on an memory device die; forming component devices on a component die; and forming a plurality of packing devices on a packaging die. Transferring a plurality of each of said microprocessor devices, memory devices, component devices and packaging components to a supporting substrate, wherein the packaging components electrically interconnect the memory devices, component devices and microprocessor devices in individualized groups. Sectioning the supporting substrate to provide said individualized groups of memory devices, component devices and microprocessor devices that are interconnected by a packaging component. | 2019-10-10 |
20190311083 | METHOD OF ETCH MODEL CALIBRATION USING OPTICAL SCATTEROMETRY - Computer-implemented methods of optimizing a process simulation model that predicts a result of a semiconductor device fabrication operation to process parameter values characterizing the semiconductor device fabrication operation are disclosed. The methods involve generating cost values using a computationally predicted result of the semiconductor device fabrication operation and a metrology result produced, at least in part, by performing the semiconductor device fabrication operation in a reaction chamber operating under a set of fixed process parameter values. The determination of the parameters of the process simulation model may employ pre-process profiles, via optimization of the resultant post-process profiles of the parameters against profile metrology results. Cost values for, e.g., optical scatterometry, scanning electron microscopy and transmission electron microscopy may be used to guide optimization. | 2019-10-10 |
20190311084 | TOOL FOR MODULAR CIRCUITBOARD DESIGN - A system for dynamic circuit board design, preferably including a library of modular circuits and a merge tool. A method for merging modular circuitry into a unified electronics module, preferably including: receiving a circuit board layout, the circuit board layout preferably including a set of modular circuits arranged on a virtual carrier board; converting the circuit board layout into a virtual circuit representation; applying transformations to the virtual circuit representation; and generating a unified circuit board design based on the transformed virtual circuit representation. | 2019-10-10 |
20190311085 | MODIFYING CIRCUITS BASED ON TIMING REPORTS FOR CRITICAL PATHS - Generating reports for critical path evaluation and tuning. A predetermined critical path in a circuit design is detected. The predetermined critical path includes a plurality of interconnects between at least two macros. At least one output or at least one input is detected for each of the at least two macros associated with the predetermined critical path. Additionally, a routing description and a buffer location corresponding to the predetermined critical path are detected and a reduced layout design is built. The reduced layout design includes the predetermined critical path and the at least two macros. Furthermore, a timing report is generated based on the reduced layout design, and a circuit based on the circuit design is manufactured in response to detecting the timing report based on the reduced layout design satisfies a predetermined condition. | 2019-10-10 |
20190311086 | METHODS AND APPARATUS FOR AUTOMATED DESIGN OF SEMICONDUCTOR PHOTONIC DEVICES - A photonic design automation (PDA) tool to facilitate design of semiconductor photonic devices is described. In one example, the PDA tool includes a process design library including one or more photonics parameterized cells (pCells), a plurality of processor-executable photonics design functions including a design rule check (DRC) violation removal function, and a semiconductor technology-dependent parameter file including a plurality of design rules that define allowed semiconductor design patterns to be converted to a plurality of semiconductor fabrication mask designs in a first semiconductor technology. The PDA tool supports a graphical user interface (GUI) to provide access to the library of photonic pCells to create intuitive physical property layers for a photonic device, and processes the physical property layers using the DRC violation removal function and the design rules to automatically generate a plurality of mask design layers for a “DRC clean” physical layout of the photonics device. | 2019-10-10 |
20190311087 | SYSTEMS, METHODS, AND APPARATUS TO GENERATE AN INTEGRATED MODULAR ARCHITECTURE MODEL - Systems, methods, apparatus, and articles of manufacture are disclosed to generate an integrated modular architecture (IMA) model. An example apparatus includes an interface importer to import first IMA protocol definitions into a computer modeling environment to generate libraries and generate IMA model objects, a model object handler to import ones of IMA model objects into the computer modeling environment to generate a first IMA model corresponding to an aircraft system of an aircraft and generate an IMA system model corresponding to the aircraft by generating IMA models including the first IMA model. The example apparatus further includes an interface validator to validate the IMA system model by comparing an output of the IMA system model to a validation output, an interface exporter to generate manufacturing build instructions of the aircraft system when the IMA system model is validated, and a report generator to initiate production of the aircraft system. | 2019-10-10 |
20190311088 | METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED - The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files. | 2019-10-10 |
20190311089 | RECORDING MEDIUM RECORDING MANAGEMENT PROGRAM, METHOD, AND RECORDING MEDIUM RECORDING SUPPORT REQUEST PROGRAM - A recording medium records a management program allowing a computer to execute a process of: obtaining a support request for first software including first individual information identifying a first device used by a user and a product name of the first software implemented in the first device; and referring to a storage storing second individual information identifying a second device in which second software in a support contract for the user is implemented; and in a case where the second individual information coincident with the first individual information in the support request is not stored in the storage and a number of pieces of the second individual information in the storage is smaller than a number of pieces of support indicating a number of pieces of software supportable based on the support contract, storing the first individual information in the support request to the storage as the second individual information. | 2019-10-10 |
20190311090 | MANAGEMENT SYSTEM, SERVER, MANAGEMENT METHOD, AND PROGRAM - A management system includes: a right holder information storage unit which stores right holder information about a right holder entitled to use a delivery locker device; an agreement formation unit which, creates a block of a blockchain that includes a processing instruction, and stores the block into a block storage unit; a terminal device which transmits an assignment processing instruction; a process execution unit which, when obtaining the assignment processing instruction included in the block, updates the current right holder included in the right holder information; and a condition checking unit which, when determining that the condition for assignment fails to be met, creates a return processing instruction and transmits the return processing instruction to the agreement formation unit. When obtaining the return processing instruction included in the block, the process execution unit updates the right holder information. | 2019-10-10 |
20190311091 | Managing Permissions - In general, an indication is received through a user interface of an intention of a potential rider to use an autonomous vehicle. In response to the receipt of the indication, a hailing request is sent by a signaling mode to at least one autonomous vehicle that can receive the hailing request directly in accordance with the signaling mode. | 2019-10-10 |
20190311092 | CUSTOMIZABLE FIRMWARE BASED ON ACCESS ATTRIBUTES - Embodiments include validating a user for performing a service procedure for a system and customizing the system for the user for the service procedure. An example computer-implemented method includes validating authorization of the user based on authentication data from a tag uniquely identifying the user. The method further includes receiving attribute data for the user from the tag. The method further includes generating and/or adapting a set of service procedure instructions that are customized for the user based on the attribute data. The method further includes displaying the set of service procedure instructions that are customized for the user. | 2019-10-10 |
20190311093 | Authenticating Users Requesting Access to Computing Resources - Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on actions available to be performed at the computing resources. An authenticator may verify login credentials received from a user and authorize the user to access a computing resource. A request to perform an action at the computing resource may be received, and a usage monitor may apply a usage rule to the requested action. If the requested action violates the usage constraint of the usage rule, the usage monitor may halt performance of the requested action and notify another user of the usage constraint violation. The authenticator may receive and verify another set of login credentials from that other user. In response to successful verification of the additional set of login credentials, the usage monitor may resume performance of the requested action. | 2019-10-10 |
20190311094 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK - Data processing systems and methods, according to various embodiments are adapted for efficiently processing data to allow for the streamlined assessment of the risk level associated with particular privacy campaigns. The systems may provide a centralized repository of templates of privacy-related question/answer pairings for various vendors, products (e.g., software products), and services. Different entities may electronically access the templates (which may be periodically updated and centrally audited) and customize the templates for evaluating the risk associated with the entities' respective business endeavors that involve the relevant vendors, products, or services. | 2019-10-10 |
20190311095 | METHOD AND SYSTEM FOR BEHAVIOR-BASED AUTHENTICATION OF A USER - A method for behaviour-based authentication of a current user to a mobile, portable communication system, is implemented using at least one sensor for capturing gross-motor measurement data, a gross-motor classification module, a processor, and an internal memory. Furthermore, a user is registered in the mobile, portable communication system. The sensor is designed to recognise the gross-motor measurement data of a gross-motor movement of the current user of the mobile, portable communication system and the gross-motor classification module is trained to capture a generic gross-motor movement pattern with the help of training data sets of a user cohort. In addition, the gross-motor classification module implements a machine-learning method. The gross-motor classification module is executed by the processor of the mobile, portable communication system. | 2019-10-10 |
20190311096 | SECURE RE-ENROLLMENT OF BIOMETRIC TEMPLATES USING DISTRIBUTED SECURE COMPUTATION & SECRET SHARING - An example computing device includes a shares generation unit configured to generate secret shares of biometric information of a user; a storage interface configured to interface with storage nodes for storing each of the secret shares to a corresponding one of the storage nodes; and a computation engine configured to perform re-enrollment by outputting a plurality of messages to instruct each of the storage nodes to generate a respective share of a new helper data in accordance with the secret shares of the biometric information and a secure computation protocol, receive the respective share of the new helper data from two or more storage nodes, and determine the new helper data based on the respective share of the new helper data from each of the two or more storage nodes for subsequent authentication of the user, wherein the re-enrollment occurs without receiving additional/repeat biometric information, thereby resulting in faster re-enrollment. | 2019-10-10 |
20190311097 | BIOMETRIC SECURITY DEVICE - A biometric security device for digital key storing is disclosed. The biometric security device includes a biometric information fetching module and a processing module. The processing module has a nonvolatile storage unit and a processing unit. The nonvolatile storage unit includes a secure storage unit and a general storage unit. The biometric security device with a secure electronic key designed for storing secret data utilizes both TrustZone™ technology (or similar technology) and biometric authentication. Thus, it can provide the flexibility for multiple users or applications to use the biometric security device or any equipment the biometric security device mounted in without compromising the safeguard of the data stored therein. | 2019-10-10 |
20190311098 | BEHAVIORAL BIOMETRIC FEATURE EXTRACTION AND VERIFICATION - A method for keystroke-based behavioral verification of user identity of a subject user of a computer system includes obtaining an enrollment signature corresponding to an identified user and serving as a unique identifier of the identified user, the enrollment signature including an enrollment determinate vector generated based on supplying enrollment keystroke data to a deep neural network for processing. The method further includes obtaining verification determinate vector(s), the verification determinate vector(s) for comparison to the enrollment signature to determine whether the subject user is the identified user. The method compares the verification determinate vector(s) to the enrollment signature and generates a probability indicator indicating a probability that keystroke data from a common user produced, from the deep neural network, the enrollment signature and the verification determinate vector(s), and indicates to the computer system whether, based on the probability indicator, the subject user is verified to be the identified user. | 2019-10-10 |
20190311099 | BEHAVIORAL BIOMETRIC FEATURE EXTRACTION AND VERIFICATION - A method for gait-based behavioral verification of user identity of a subject user of a computer system includes obtaining an enrollment signature corresponding to an identified user and serving as a unique identifier of the identified user, the enrollment signature including an enrollment determinate vector generated based on supplying enrollment gait data to a deep neural network for processing. The method further includes obtaining verification determinate vector(s), the verification determinate vector(s) for comparison to the enrollment signature to determine whether the subject user is the identified user. The method compares the verification determinate vector(s) to the enrollment signature and generates a probability indicator indicating a probability that gait data from a common user produced, from the deep neural network, the enrollment signature and the verification determinate vector(s), and indicates to the computer system whether, based on the probability indicator, the subject user is verified to be the identified user. | 2019-10-10 |
20190311100 | SYSTEM AND METHODS FOR SECURING SECURITY PROCESSES WITH BIOMETRIC DATA - The present invention discloses a system and method designed to secure computerized security processes via an MPC based biometric comparison. Such security processes can be operated between a computerized device operated by a user and a third-party server, or a third-party application executed by a computerized device. The MPC based biometric comparison process utilized to secure the security process can be operated by at least one server and in some cases, a computerized device operated by the user. Said servers may operate a Distributed Security Module, (DSM Server), designed to participate in multi-party computation (MPC) processes. The DSM server may be configured to use the MPC based biometric comparison process to compare a biometric data sample provided by the computerized device with a biometric data reference stored in the DSM server. | 2019-10-10 |
20190311101 | SYSTEM AND METHOD FOR LOCATING AND DETERMINING SUBSTANCE USE - In devices that determine levels of substance use, a substance level in a test sample provided to the testing device by a test subject is determined. A sequence of images are captured to include a portion of the face of the test subject providing the test sample and a display of the testing device. A value indicative of the substance level detected within the test sample is determined. A validity indicator indicating validity of the value indicative of the substance level is determined. A current location is determined. The value indicative of the substance level, the validity indicator, and the current location are sent to a remote server. | 2019-10-10 |
20190311102 | METHOD TO VERIFY AND IDENTIFY BLOCKCHAIN WITH USER QUESTION DATA - Systems and methods for enrolling and authenticating a user in an authentication system via a camera of a computing device include capturing and storing biometric information from at least one first image and at least one second image of the user taken via the camera. Prior to use, the user answers personal questions and the answers are stored as stored answer data. Later, such as at a business, the questions are presented to the user and the user provides their personal answers via a computing device. The answers are processed and uploaded to an authentication server where a comparison occurs against the stored answer data. If a match does not occur, then the authentication/identity verification processes ends. If a match does occur, then the authentication process continues. The questions match may serve as a gate function for accessing authentication data stored in a blockchain. | 2019-10-10 |
20190311103 | Method Performed By A Computer System for Biometric Authentication of Human Beings of a First or a Second Category - Method performed by a computer system ( | 2019-10-10 |
20190311104 | FACE IMAGE PROCESSING METHOD AND FACE IMAGE PROCESSING DEVICE - A server device that is a face image processing device includes a controller, a storage unit, an input unit, an output unit, and a registration database. The identification information of an entering person acquired at an entrance gate is transmitted to the server device and collated with the registration database by the controller, and persons related to the entering person and persons matching the entering person are included in a search range. Search load is reduced, errors are suppressed, and high speed is achieved by narrowing down the search range. | 2019-10-10 |
20190311105 | GENERATING AUTHENTICATION ASSERTIONS INCLUDING AN ASSURANCE SCORE - One example of a system includes an authentication sever and an authentication consumer. The authentication server is to authenticate a user using an authentication process, collect environment specific attributes about the user during the authentication process, compute an assurance score based on the collected environment specific attributes, and generate an authentication assertion including the assurance score upon a successful user authentication. The authentication consumer is to receive the authentication assertion including the assurance score and make a local entitlement decision based on the assurance score. | 2019-10-10 |
20190311106 | SYSTEM AND METHOD FOR PIN ENTRY ON MOBILE DEVICES - A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device that are connected via a data communication link. The mobile computing device includes a mobile application and a display and the mobile application runs on the mobile computing device and displays a grid on the mobile computing device display. The peripheral device includes a display and an encryption engine, and the peripheral device display displays a grid corresponding to the grid displayed on the mobile computing device display. Positional inputs on the mobile computing device grid are sent to the peripheral device and the peripheral device decodes the positional inputs into PIN digits and generates an encrypted PIN and then sends the encrypted PIN back to the mobile computing device. | 2019-10-10 |
20190311107 | APPARATUS AND METHOD FOR AUTHENTICATING CALLER IN COMMUNICATION SYSTEM - The present disclosure relates to an apparatus and a method for authenticating a caller in a communication system. An operating method of a terminal for authenticating a caller may comprise the steps of: generating an identifier and information corresponding to the identifier, on the basis of an identification number related to the terminal and an identification number related to another terminal; generating a digital signature for the information; encrypting the information; and transmitting, to a server, a message including the identifier, the digital signature, and the encrypted information. | 2019-10-10 |
20190311108 | RECORDING OF INTRINSIC DEVICE SIGNATURES IN BLOCK CHAIN FOR COUNTERFEIT PREVENTION - Systems, methods, and devices are disclosed for authenticating a product. An internal component of a product is identified by identifying an intrinsic attribute of the internal component, where the intrinsic attribute is received at a time subsequent to independently storing the intrinsic attribute in a database. A match is determined between the intrinsic attribute and the stored intrinsic attribute. The product is confirmed to be authentic when the match is verified. | 2019-10-10 |
20190311109 | SYSTEMS FOR ENABLING TOKENIZED WEARABLE DEVICES - A method for authenticating a wearable device is disclosed. The method includes: receiving, a signal representing an indication that the wearable device is in active use; in response to receiving the signal, updating a device database to associate a first status with the wearable device; receiving, from a tokenization service provider (TSP), a signal representing a first code derived by the TSP from decrypting a security token previously provisioned in the wearable device, wherein the security token was received at a terminal from the wearable device and transmitted to the TSP; obtaining, based on the received first code, a device identifier of the wearable device and an identifier of an account; querying the device database to verify that the wearable device is associated with the first status; verifying that the account is enabled for an operation initiated using the wearable device; and transmitting an authorization message to the terminal, the authorization message authorizing the operation. | 2019-10-10 |
20190311110 | METHOD, FIRST DEVICE AND SYSTEM FOR AUTHENTICATING TO A SECOND DEVICE - The invention relates to a method for authenticating to a second device. A first device shares with the second device at least one session key. The first device sends to at least one third device at least one first session key. The at least one third device connects directly to the second device by using the at least one first session key. According to the invention, the method further comprises the following steps. The first device sends to the at least one third device a command for disconnecting from or switching to a non-connected mode with the second device. And the at least one third device disconnects from or switches to a non-connected mode with the second device based upon the received command. The invention also pertains to corresponding first device and system for authenticating to a second device. | 2019-10-10 |
20190311111 | METHOD OF AUTHENTICATING DEVICE USING PHOTOGRAPHED IMAGE AND SYSTEM THEREFOR - Disclosed herein are an authentication method between two devices, an authentication system, and an authentication device capable of performing the authentication method. More particularly, the present invention relates to an authentication method, authentication system and authentication device, wherein a specific device for authentication photographs a photo or image of a device to be connected (hereinafter referred to as a “target device”) and is connected to the target device through the medium of the photographed image of the device. | 2019-10-10 |
20190311112 | CertiSafe, a novel Credential Authentication Process and System (CAPS) - Certisafe is a novel Credential Authentication Process and System (CAPS), where a CertiSafe ID is generated once and only once the Issuer confirms the Authenticity of the Credential of a Candidate. This CertiSafe ID is a unique electronic ID, unique to the Candidate and also unique to the unique Credential, can be used repeatedly and endlessly in lieu of paper based copies that a Candidate usually submits to the Requestor through an application (physical I electronic). This method also purports to save precious paper and time for candidates each time they have to apply to an institution or an organization, by making redundant completely, the requirement of paper copies of the credentials and also their subsequent attestation. The verified credential, through CertiSafe ID, gives the Requesting organization the confidence of absorbing the right candidate and not a candidate with dubious credentials. | 2019-10-10 |
20190311113 | METHODS, MEDIA, AND SYSTEMS FOR DETECTING ATTACK ON A DIGITAL PROCESSING DEVICE - Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program. | 2019-10-10 |
20190311114 | MAN-MACHINE IDENTIFICATION METHOD AND DEVICE FOR CAPTCHA - The present application discloses a man-machine identification method and device for a captcha. The method includes: collecting real-time user data when a first user inputs the captcha; and making a prediction for the real-time user data according to a machine learning model to determine an attribute of the first user. The machine learning model is obtained by training a sample data set, the sample data set includes one or more sets of training sample data and a label respectively set for each set of training sample data, and the label represents an attribute of a second user. | 2019-10-10 |
20190311115 | PRIVILEGE ESCALATION PROTECTION - Techniques for privilege escalation protection are disclosed. In some embodiments, a system/process/computer program product for privilege escalation protection includes monitoring a process executed on a computing device, detecting an unauthorized change in a token value associated with the process, and performing an action based on a policy (e.g., a kernel protection security policy/rule(s), which can include a whitelisted set of processes and/or configured actions/responses to perform for other/non-whitelisted processes) in response to an unauthorized change in the token value associated with the process. | 2019-10-10 |
20190311116 | METHOD, APPARATUS, AND SYSTEM FOR SERVICE DATA PROCESSING AND VERIFICATION - Techniques for detecting data tampering are described. One example method includes identifying particular data associated with a service system; generating fingerprint data as a result of executing a fingerprint function on the particular data; storing the fingerprint data in a blockchain maintained by a blockchain network; storing the particular data in a storage device in the service system; after storing the fingerprint data to the blockchain and storing the particular data in the storage device: identifying a request to verify that the particular data stored in the storage device has not been modified since it was stored; generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device; determining that the verification fingerprint data matches the fingerprint data stored; and in response, determining that the particular data stored in the storage device has not been modified since it was stored. | 2019-10-10 |
20190311117 | EMPLOYING CODE SIGNING AS A TOOL IN CYBER-SECURITY DECEPTION - A computer implemented method of detecting execution of unregistered code in a protected networked system, comprising maintaining a pages registry record in a storage of an endpoint in a protected networked system, the pages registry record comprising a registration signature for each of a plurality of registered executable pages, monitoring a plurality of executable pages at a page management level using an adjusted page fault handler of an operating system kernel executed by one or more processors of the endpoint, detecting one or more unregistered executable pages by identifying incompliance of a runtime signature calculated in runtime for the unregistered executable page(s) with respective registration signature stored in the pages registry record and initiating one or more actions in case of the detection of the unregistered executable page(s). | 2019-10-10 |
20190311118 | PROVIDING A FASTLANE FOR DISARMING MALICIOUS CONTENT IN RECEIVED INPUT CONTENT - The disclosed embodiments include a method for disarming malicious content in a computer system. The method includes accessing input content intended for a recipient of a network, automatically modifying at least a portion of digital values of the input content to render inactive code that is included in the input content intended for malicious purpose, the modified input content being of the same type as the accessed input content, enabling access to the modified input content by the intended recipient, analyzing the input content according to at least one malware detection algorithm configured to detect malicious content, and enabling access to the input content by the intended recipient when no malicious content is detected according to the at least one malware detection algorithm. | 2019-10-10 |
20190311119 | Deep Reinforcement Learning Technologies for Detecting Malware - Technologies for detecting malware based on reinforcement learning model to detect whether a file is malicious or benign and to determine the best time to halt the file's execution in so detecting. The reinforcement learning model combined with an event classifier and a file classifier learns whether to halt execution after enough state information has been observed or to continue execution if more events are needed to make a highly confident determination. The algorithm disclosed allows the system to decide when to stop on a per file basis. | 2019-10-10 |
20190311120 | DEVICE BEHAVIOR ANOMALY DETECTION - A method of identifying anomalous behavior can include transforming input data to a series of numbers, determining first features and second features of the series of numbers that, given the same numbers in a different order, produce a different value for the respective feature, encoding the series of numbers by a key value indicating a number associated with a cell of a grid of cells to which the first and second features map, and determining, based on whether the key value has been previously provided, whether the input is anomalous. | 2019-10-10 |
20190311121 | METHOD FOR PREDICTING AND CHARACTERIZING CYBER ATTACKS - One variation of a method for predicting and characterizing cyber attacks includes: receiving, from a sensor implementing deep packet inspection to detect anomalous behaviors on the network, a first signal specifying a first anomalous behavior of a first asset on the network at a first time; representing the first signal in a first vector representing frequencies of anomalous behaviors—in a set of behavior types—of the first asset within a first time window; calculating a first malicious score representing proximity of the first vector to malicious vectors defining sets of behaviors representative of security threats; calculating a first benign score representing proximity of the first vector to a benign vector representing an innocuous set of behaviors; and in response to the first malicious score exceeding the first benign score and a malicious threshold score, issuing a first alert to investigate the network for a security threat. | 2019-10-10 |
20190311122 | DISARMING MALWARE IN PROTECTED CONTENT - Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network. | 2019-10-10 |
20190311123 | TECHNOLOGIES FOR SECURE DEVICE CONFIGURATION AND MANAGEMENT - Technologies for secure device configuration and management include a computing device having an I/O device. A trusted agent of the computing device is trusted by a virtual machine monitor of the computing device. The trusted agent securely commands the I/O device to enter a trusted I/O mode, securely commands the I/O device to set a global lock on configuration registers, receives configuration data from the I/O device, and provides the configuration data to a trusted execution environment. In the trusted I/O mode, the I/O device rejects a configuration command if a configuration register associated with the configuration command is locked and the configuration command is not received from the trusted agent. The trusted agent may provide attestation information to the trusted execution environment. The trusted execution environment may verify the configuration data and the attestation information. Other embodiments are described and claimed. | 2019-10-10 |
20190311124 | SECURITY DEVICE AND METHOD FOR OPERATING A SYSTEM - A security device includes at least one non-volatile memory element and a key memory having at least one non-volatile memory element including at least one data field. The security device provides a physical interface for the data exchange with a key memory, the range of the physical interface being spatially restricted, and the key memory being location-bound. The security device includes at least one calculation unit, which dynamically ascertains in particular the check-sum information from the parameter data record. | 2019-10-10 |
20190311125 | Trust in Block-Chain Implementations Using Compute Resource Configuration and Verification Systems and Methods - Systems and methods for compute resource configuration, verification, and remediation are provided herein. An example method includes verifying compliance of an operating system and compute assets provisioned configured within a middleware of a computing device using a pre-defined configuration profile, the compliance being determined by comparison of run-time hardware and software attributes of the compute assets to the pre-defined configuration profile comprising hardware and software requirements for the client of a blockchain implementation. | 2019-10-10 |
20190311126 | CONTROLLING SECURITY STATE OF COMMERCIAL OFF THE SHELF (COTS) SYSTEM - The concepts, systems and methods described herein are directed towards a method for secure booting running on a security device. The method is provided to include: receiving a public key from a security device; validating the security device by comparing the received public key with a hash code; in response that the security device is validated, receiving custom codes from the security device and storing the custom codes in a microprocessor, wherein the microprocessor is located in a programmable memory of a primary processor; programming the programmable memory by executing the custom codes; and executing a boot sequence of the primary processor by the programmable memory. | 2019-10-10 |
20190311127 | COMPUTING DEVICES - Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e.g., a cloudlet) may include: a trusted execution environment; a Basic Input/Output System (BIOS) to request a Key Encryption Key (KEK) from the trusted execution environment; and a Self-Encrypting Storage (SES) associated with the KEK; wherein the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is to provide the KEK to the SES to unlock the SES for access by the trusted execution environment. | 2019-10-10 |
20190311128 | SECURE BOOTING OF VIRTUALIZATION MANAGERS - A multi-phase boot operation of a virtualization manager at a virtualization host is initiated at an offload card. In a first phase of the boot, a security key stored in a tamper-resistant location of the offload card is used. In a second phase, firmware programs are measured using a security module, and a first version of a virtualization coordinator is instantiated at the offload card. The first version of the virtualization coordinator obtains a different version of the virtualization coordinator and launches the different version at the offload card. Other components of the virtualization manager (such as various hypervisor components that do not run at the offload card) are launched by the different version of the virtualization controller. | 2019-10-10 |
20190311129 | DETERMINING LOCATION OF SPECULATION DENIAL INSTRUCTIONS FOR MEMORY ACCESS VULNERABILITIES - A system includes a memory, a processor in communication with the memory, and a scanner. The scanner is configured to execute a first simulation instructions and track a register value and/or a stack value while executing the simulation. Responsive to encountering a conditional branch, the scanner is configured to split the first simulation into a second simulation and a third simulation to follow respective legs of the conditional branch. The scanner is also configured to track a movement from a register and/or a stack associated with the memory, record the movement and instruction associated with the movement, and report potential vulnerabilities. | 2019-10-10 |
20190311130 | Vulnerability assessment - Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device. | 2019-10-10 |
20190311131 | STAGED DYNAMIC TAINT FLOW INFERENCE - A method may include obtaining, from a runtime system that executes code, a source value at a source point of the code and a sink value at a sink point of the code, identifying a potential taint flow from the source point to the sink point by performing a series of taint inferences that each infer a relationship between the source value and the sink value, and determining whether the potential taint flow is an actual taint flow by performing a series of taint checks that each analyze the execution of the code using the source value and the sink value. | 2019-10-10 |
20190311132 | METHOD AND COMPUTER SYSTEM FOR DETERMINING A THREAT SCORE - A method and a computer system are disclosed for determining a threat score of an electronic document comprising the steps of: loading and rendering the electronic document in a document sandbox, controlling the document sandbox to simulate user interaction with the electronic document, while loading and rendering the electronic document and while controlling the document sandbox to simulate user interaction with the electronic document, monitoring the document sandbox for events triggered by the electronic document and belonging to one of at least two predefined event classes, recording each observed event together with a respective event class to which each observed event belongs, and determining a threat score of the electronic document based on predefined numerical weights associated with each of the predefined event classes to which the recorded events belong. | 2019-10-10 |
20190311133 | AUTO-REMEDIATION WORKFLOW FOR COMPUTER SECURITY TESTING - Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated. | 2019-10-10 |
20190311134 | METHODS AND SYSTEMS FOR GRANTING ACCESS TO SERVICES BASED ON A SECURITY STATE THAT VARIES WITH THE SEVERITY OF SECURITY EVENTS - A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The security state of the requesting device varies according to severity levels of device security events. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service. | 2019-10-10 |
20190311135 | Avoidance of Malicious Content in Nested Files - A nested file having a primary file and at least one secondary file embedded therein is parsed using at least one parser of a cell. The cell assigns a maliciousness score to each of the parsed primary file and each of the parsed at least one secondary file. Thereafter, the cell generates an overall maliciousness score for the nested file that indicates a level of confidence that the nested file contains malicious content. The overall maliciousness score is provided to a data consumer indicating whether to proceed with consuming the data contained within the nested file. | 2019-10-10 |
20190311136 | SYSTEMS AND METHODS FOR UTILIZING AN INFORMATION TRAIL TO ENFORCE DATA LOSS PREVENTION POLICIES ON POTENTIALLY MALICIOUS FILE ACTIVITY - The disclosed computer-implemented method for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity may include (1) recording, by a computing device, one or more current activities associated with a file retrieved from a server, (2) linking, by the computing device, the current activities to one or more previously recorded activities associated with the file, (3) generating, by the computing device, a graph including nodes representing an information trail of related events associated with the current activities and the previously recorded activities, (4) determining, by the computing device, a severity of the information trail based on one or more rules, and (5) performing, by the computing device, a data loss prevention action on one or more operations associated with the file based on potential malicious activity. Various other methods, systems, and computer-readable media are also disclosed. | 2019-10-10 |
20190311137 | DYNAMIC DATA ASSET SECURITY USING COGNITIVE DATA ANALYSIS - Embodiments disclosed herein identify a first data asset that is associated with a non-optimized security configuration, based at least in part on metadata associated with the first data asset. Additionally, an optimized security configuration is generated for the first data asset by processing the metadata associated with the first data asset using one or more machine learning models. Furthermore, the optimized security configuration is applied to the first data asset. | 2019-10-10 |
20190311138 | Multi-Party Encryption Cube Processing Apparatuses, Methods and Systems - Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference. | 2019-10-10 |
20190311139 | SECURELY STORING DATA IN AN ELASTICALLY SCALABLE DISPERSED STORAGE NETWORK - A method for execution by a dispersed storage and task (DST) processing unit includes: generating an encoded data slice from a dispersed storage encoding of a data object and determining when the encoded data slice will not be stored in local dispersed storage. When the encoded data slice will not be stored in the local dispersed storage, the encoded data slice is stored via at least one elastic slice in an elastic dispersed storage, cryptographic material and an elastic storage pointer indicating a location of the elastic slice in the elastic dispersed storage are generated, and the cryptographic material and the elastic storage pointer are stored in the local dispersed storage. | 2019-10-10 |
20190311140 | Automatically Discovering Attribute Permissions - Automatically discovering attribute permissions is provided. A profile indicating a set of attributes that can be converted into permissions for a new target instance is provided. In response to detecting that the new target instance is being added, a convertible set of attributes for the new target instance is searched for based on the profile. Search results for the convertible set of attributes are displayed. Ones of the convertible set of attributes are selected as a set of attribute permissions for the new target instance for access control to the new target instance. | 2019-10-10 |
20190311141 | Secure Interface Disablement - Various embodiments include methods and devices for implementing secure peripheral interface disablement on a computing device. Various embodiments may include receiving a trigger to disable a peripheral interface associated with a peripheral device of the computing device, identifying a physical address of the peripheral interface, and securely removing a mapping of an intermediate physical address of the peripheral interface to the physical address of the peripheral interface. | 2019-10-10 |
20190311142 | SECURED FILE SHARING SYSTEM - One embodiment provides a file sharing system. During operation, the system identifies a data file to be sent to a second device of a second user and generates a plurality of coded fragments from the data file based on a generator matrix of erasure encoding. An individual coded fragment does not include plaintext data. The system generates a plurality of sub-files, each of which comprises one or more coded fragments, of the data file. The system attaches a first sub-file to an electronic communication destined to the second device, uploads a second sub-file to a cloud provider, and embeds a link, which may expire and is protected based on a verification code, associated with the uploaded second sub-file into the electronic communication. The system sends the electronic communication to the second device and the verification code in a text message to a cell phone of the second user. | 2019-10-10 |
20190311143 | SYSTEM FOR MONITORING AND EXTRACTING PUBLIC INFORMATION WHICH BELONGS TO USERS REGISTERED ON SOCIAL NETWORKS AND WHICH IS STORED ON SERVERS AND DATA CLOUDS OF SOCIAL NETWORKS - A method for monitoring and extracting information published by users registered in a social network comprising regularly sending the APIs of social networks messages such that each query message ( | 2019-10-10 |
20190311144 | CONTROLLING ACCESS TO REMOVABLE NON-VOLATILE MEMORY DEVICE USING INSTRUCTION FILE - A method is disclosed for use with a plurality of networked computing devices comprising a plurality of physical ports. The method comprises determining that a non-volatile memory (NVM) device is removably connected with a first port owned by a first virtual machine associated with a first owning entity, and determining whether the NVM device was previously connected with a second port owned by a second virtual machine associated with a second owning entity. The method further comprises determining whether the NVM device has a predefined association with a first instruction file that specifies one or more restrictions for accessing data stored in the NVM device. The method further comprises providing, to the first virtual machine, access to the data stored in the NVM device in accordance with the one or more restrictions. | 2019-10-10 |
20190311145 | NATIONAL IDENTIFICATION NUMBER BASED AUTHENTICATION AND CONTENT DELIVERY - The present disclosure envisages a computer implemented method that provides an intended content recipient with selective access to an encrypted data file, subject to successful authentication of the intended content recipient's unique personal identity. An intended content recipient is enabled to create a verifiable personal identity for himself by using a National Identification Number (NIN), and link the NIN to an identifier identifying a computer-based device, so that a challenge (preferably in the form of an OTP having a time-validity) for verifying the identity of the intended content recipient could be delivered to both the mobile phone and the email ID linked to the corresponding NIN. Subsequently, when the intended content recipient authenticates himself and validates the fact that the email ID and mobile phone number linked to the NIN are indeed accessible to him, the remote server enables the intended content recipient to access the encrypted data file. | 2019-10-10 |
20190311146 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 2019-10-10 |
20190311147 | ESTABLISHMENT OF A CONFIDENTIAL BLOCKCHAIN NETWORK - A permissioned blockchain is caused to be deployed to nodes. Access level blocks are established. Each access level block is configured to store a nanoblock. Each nanoblock is an encrypted database. The access level blocks include access levels blocks for users, and the corresponding access level block for each user includes security credentials for the user. For each access level block: nodes are selected for deployment of the access level block; and the access level block is replicated to each of the selected nodes, such that, after replicating the access level blocks, there are at least two copies of each access level block on the permissioned blockchain, and the permissioned blockchain is capable of performing cryptographic operations, including determining permissions of the users based on the security credentials for the users, and is further capable of storing details of the cryptographic operations on the nanoblocks. | 2019-10-10 |
20190311148 | SYSTEM AND METHOD FOR SECURE STORAGE OF ELECTRONIC MATERIAL - A secure storage system and method for storing electronic material, e.g., digital files, is disclosed. In the system and method, a digital file is broken down into file fragments and one or more fragments are stored on a distributed ledger or distributed ledgers, and the remaining (one or more) fragments are stored off the distributed ledger, e.g., on a secure server or servers, and/or on a user device or devices. The files that are stored may be biometric or partial biometric files. The files may be encrypted or hashed. The file fragments are preferably unintelligible except when decrypted and fully assembled. For example, theft or copying or hacking of one file fragment will not be effective to steal or copy intelligible, useful information. In some embodiments, the benefits of storage on a distributed ledger or distributed ledgers are combined with the benefits of storage on a secure server or servers (and/or on a user's device or devices) or both. | 2019-10-10 |
20190311149 | DETECTING ATTACKS ON DATABASES BASED ON TRANSACTION CHARACTERISTICS DETERMINED FROM ANALYZING DATABASE LOGS - A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access. | 2019-10-10 |
20190311150 | SECURE DATA SYNCHRONIZATION - Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a determination is made as to whether a permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices. If the first device lacks permission to propagate the enterprise data to non-enterprise devices, the enterprise data is prevented from being propagated to the second device. | 2019-10-10 |
20190311151 | Playback Device Queue Access Levels - Based on a credential, an access level of a playback queue for a first control interface and a first subset and second subset of media items in the playback queue may be determined. Media items in the playback queue that were added via a second control interface may be included in the first subset. Media items that were added via a control interface different from the second control interface may be included in a second subset. Information may be provided which identifies the first subset of the media items in the playback queue and the second subset of the media items in the playback queue. | 2019-10-10 |
20190311152 | Choreographed Distributed Execution Of Programs - Techniques are described for managing creation and/or execution of distributed programs, such as for a group of multiple interrelated programs that are part of a service-oriented architecture or that otherwise interact during execution to provide a desired type of functionality. In at least some situations, the described techniques include performing decentralized choreographed distributed execution of a group of related programs, by using executing supervisor components for some or all such programs to manage execution-related behavior of the programs. The execution-related behavior that is managed by supervisor components for a group of programs may include, for example, managing interactions between the programs, managing run-time dependencies and other relationships between at least some of the programs, managing update strategies for updating some or all of the programs of the group while the group continues to provide functionality (e.g., performing updates in a defined serial or simultaneous manner), etc. | 2019-10-10 |
20190311153 | REVERSE-TIERED MODEL TO MANAGE TEMPORAL ACCESS TO DATA - Embodiments for managing temporal access to data by a processor. Permission for communicating with a user for providing temporal consent data during a selected time window based on a plurality of factors may be established. The temporal consent data may be delivered during the selected time window. | 2019-10-10 |
20190311154 | SECURE LOADING OF SECRET DATA TO NON-PROTECTED HARDWARE REGISTERS - The present invention relates to a method to securely load set of sensitive data hardware registers with sensitive data on a chip supporting hardware cryptography operations, said method comprising the following steps monitored by software instructions, at each run of a software: select a set of available hardware registers listed in a predefined list listing, in the chip architecture, the unused hardware registers and other relevant hardware registers not handling sensitive data and not disrupting chip functionality when loaded, establish an indexible register list of the address of the sensitive data hardware registers and of the hardware registers in the set of available hardware registers, in a loop, write each hardware register in this register list with random data, a random number of times, in random order except the last writing in each of the sensitive data hardware registers where a part of the sensitive data is written. | 2019-10-10 |
20190311155 | METHOD OF MANAGING A SECURE ELEMENT - A method for managing a secure element embedded in an equipment comprising an NFC controller. The secure element comprises a security indicator. The method comprises the steps of: on receipt of a triggering command sent by the NFC controller, the secure element switches in a test context; on receipt of a restore command sent by an application, the secure element sets the security indicator, such as a counter of unusual events, to a predefined value only if the secure element is in test context; and on receipt of an ending command sent by the NFC controller, the secure element switches in a Live context. The secure element keeps a track of the switch in the test context and denies any further triggering commands. The method enables reset of security indicator after manufacturing and test where the security indicator may have been affected. | 2019-10-10 |
20190311156 | CIRCUIT EDIT AND OBFUSCATION FOR TRUSTED CHIP FABRICATION - Circuits and methods for protecting against intellectual property piracy and integrated circuit piracy from an untrusted third party are provided. A circuit can include an original circuit and an obfuscated circuit incorporated into the original circuit and changing the output of the original circuit, wherein the obfuscated circuit is configured to recover the output of the original circuit by modifying the obfuscated circuit. In addition, a method of manufacturing a semiconductor device can include designing a circuit including an original circuit and an obfuscated circuit, and fabricating the circuit, wherein the obfuscated circuit is configured to change an output of the original circuit and to recover the output of the original circuit by modifying the obfuscated circuit. | 2019-10-10 |
20190311157 | PUF-FILM AND METHOD FOR PRODUCING THE SAME - A PUF-film includes a flat circuit structure including a plurality of circuit elements and includes a flat electric shield. The circuit structure is evaluable with respect to a plurality of electric capacitance values being arranged between the plurality of circuit elements. The electric shield at least partially covers the circuit structure and provides for a counter reference electrode of the plurality of electric capacitance values. | 2019-10-10 |
20190311158 | COMPUTER ANTI-THEFT DEVICE - The computer anti-theft device includes a main board, a component detachably mounted on the main board, and an anchor element fixedly mounted on the main board. The anchor element has a first fastener, and the component has a second fastener. A cable element has its two ends connected with the first and second fasteners, respectively. Through the above structure, the cable element and the anchor element jointly lock the various components inside the computer to the main board. As such, these components are prevented from being swapped or removed by unauthorized users, thereby achieving the anti-theft effect. | 2019-10-10 |
20190311159 | PAYMENT TERMINAL SECURITY DEVICE COMPRISING AN EMBEDDED SECURITY ELEMENT - A security device for an electronic payment terminal having at least one printed circuit. The security device includes at least one deformable security element designed to be inserted in a housing of the printed circuit. The printed circuit has at least one security circuit including at least one conducting track internal to the printed circuit and interrupted at the housing. Furthermore, the at least one deformable element has at least one conducting surface configured to close the at least one internal conducting track when the deformable element is deformed in the housing. | 2019-10-10 |
20190311160 | CODE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, PROGRAM, STORAGE MEDIUM, INK, PIGMENT, AND STORAGE DEVICE - A code includes a first part printed by using a first pigment, and a second part printed by using a second pigment which is easier to discolor than the first pigment, wherein the code is decodable by using information about discoloration of the second pigment. | 2019-10-10 |
20190311161 | MARKING PAPER PRODUCTS - Methods of marking paper products and marked paper products are provided. Some methods include irradiating the paper product to alter the functionalization of the paper. | 2019-10-10 |
20190311162 | SIGNATURE-BASED RFID LOCALIZATION - A Radio Frequency Identification (RFID) localization system is provided. The system includes a set of passive RFID tags, each for reflecting transmitted signals. The system further includes an RFID reader for detecting the reflected signals by the passive RFID tags. The system also includes a processor for localizing an object in an area based on the reflected signals by computing signatures using probabilistic macro-channels between the RFID reader and locations of the passive RFID tags. The transmitted signals form inputs to the probabilistic macro-channels, and the signatures form outputs from the probabilistic macro-channels. | 2019-10-10 |
20190311163 | RFID Systems Using Distributed Exciter Network - RFID systems are disclosed that include at least one RFID receiver system and a distributed exciter architecture. Exciters can be connected via wired and/or wireless connections to the RFID receiver system, which can control activation of the exciters to detect the presence of RFID tags within interrogation spaces defined by the exciter topology. One embodiment includes an RFID receiver system configured to detect information from RFID tags within a receive coverage area, and a plurality of exciters defining a plurality of interrogation spaces within the receive coverage area of the receiver system. The receiver system is configured to transmit a control signal that identifies one of the exciters and includes information indicative of an RFID tag interrogation signal, the exciters are configured to receive the control signal, and the exciter identified in the control signal is configured to illuminate an interrogation space with the RFID tag interrogation signal. | 2019-10-10 |
20190311164 | RFID Multi-Read Portal - An RFID portal reads multiple associated RFID tags on articles in groups moved through an RFID code reader having interrogation/charging and receiving/detection antennas concentrated on the group when in a reading zone. The articles are movable through a passage between the reading zone and an outside area. The passage has conductive walls at the reading zone associated with antennas for applying and collecting focused RF signals, and the walls define a vestibule lined with broadband or specific stopband electromagnetic damping structures as well as elongating signal paths into and/or out of the reading zone. Attenuation by one or more of broadband and stopband damping and signal path elongation can achieve 10 dB attenuation or more, sufficient to minimize interaction with stray RFID tagged articles that may be outside of the group in the reading zone. | 2019-10-10 |
20190311165 | Optical Measuring System And Method - An optical measuring system includes a calibration apparatus having at least one optical marker and a code. The optical measuring system includes a memory unit that stores a metadata record with calibration parameters that have physical state and change variables that are specific to the calibration apparatus. The calibration apparatus is configured to encrypt a link to the metadata record stored in the memory unit. The optical measuring system includes an optical sensor configured to capture image data containing the at least one optical marker and the code. The optical measuring system includes a control unit configured to evaluate the image data captured by the optical sensor, decrypt the code captured by the optical sensor, access the memory unit via the link, read the metadata record stored therein, and include the read calibration parameters and the at least one optical marker in the evaluation of the image data. | 2019-10-10 |
20190311166 | METHODS FOR READING MACHINE-READABLE LABELS ON SAMPLE RECEPTACLES - A method of reading machine-readable labels on sample receptacles held by a sample rack. In the method, an absolute position of the sample rack is measured as the sample rack moves between first and second positions in a housing. During movement between the first and second positions, an image is acquired of a machine-readable label associated with each sample receptacle held by the sample rack. The image of each machine-readable label is thereafter decoded. | 2019-10-10 |
20190311167 | SCANNER WITH CONTROL LOGIC FOR RESOLVING PACKAGE LABELING CONFLICTS - An automatic object identification scanner is equipped with recognition units that provide detection results for objects and a controller that resolves potential conflicts in the results. One form of recognition unit detects product identifiers and flags in a digital payload that is encoded redundantly across packaging or labels applied to packaging. The controller gets detection results and evaluates them relative to a state data structure, which maintains state for identifiers obtained within a time interval, such as a timeout interval or waiting period after a detection result. Identifiers are reported to a POS system depending on logic that evaluates code priority and pending waiting periods. | 2019-10-10 |
20190311168 | METHOD, IMAGING DEVICE AND SYSTEM FOR GENERATING A MEASURE OF AUTHENTICITY OF AN OBJECT - The invention notably relates to generating a measure of authenticity of an object ( | 2019-10-10 |
20190311169 | TWO-DIMENSIONAL CODE AND METHOD, TERMINAL, AND APPARATUS FOR RECOGNIZING TWO-DIMENTIONAL CODE - A method, an apparatus, and a terminal for recognizing a two-dimensional code are provided. The two-dimensional code includes an image region and an encoding region. The image region and the encoding region have no overlap. The method includes selecting, from pixels of the two-dimensional code, a pixel included in a code element in an encoding region. The method further includes determining a value of the code element in the encoding region according to the pixel included in the code element in the encoding region. The method further includes recognizing the two-dimensional code according to the value of the code element in the encoding region. | 2019-10-10 |
20190311170 | MODELING TRENDS IN CROP YIELDS - A method and system for modeling trends in crop yields is provided. In an embodiment, the method comprises receiving, over a computer network, electronic digital data comprising yield data representing crop yields harvested from a plurality of agricultural fields and at a plurality of time points; in response to receiving input specifying a request to generate one or more particular yield data: determining one or more factors that impact yields of crops that were harvested from the plurality of agricultural fields; decomposing the yield data into decomposed yield data that identifies one or more data dependencies according to the one or more factors; generating, based on the decomposed yield data, the one or more particular yield data; generating forecasted yield data or reconstructing the yield data by incorporating the one or more particular yield data into the yield data. | 2019-10-10 |