46th week of 2021 patent applcation highlights part 47 |
Patent application number | Title | Published |
20210357444 | CONTENT-SPECIFIC KEYWORD NOTIFICATION SYSTEM - Systems, apparatuses, and methods for providing content using notifications with content-specific keywords are provided. In one example embodiment, a method includes identifying, by one or more computing devices, a media content item for a user of a user device. The method includes generating, by the one or more computing devices, a keyword for the user of the user device based at least in part on data associated with the media content item. The keyword is indicative of the media content item. The method includes providing, by the one or more computing devices to the user device, for display a notification indicating that the media content is available for the user. The notification includes the keyword and the keyword is viewable by the user. | 2021-11-18 |
20210357445 | MULTIMEDIA ASSET MATCHING SYSTEMS AND METHODS - Provided are computer-implemented methods and systems for implementing and utilizing an audio and visual asset matching platform. The audio and visual asset matching platform may include a first interface, a digital asset creation platform, an asset matching engine, and a user feedback engine. The first interface may be configured to select at least one master digital asset. The digital asset creation platform may be configured to create digital assets, the digital assets comprising at least one of text, audio, image, video, 3D/4D virtual environments, and animation files and metadata. The asset matching engine may be configured to match digital assets and generate at least one output digital asset. The user feedback engine may be configured to monitor and analyze behavior in response to receipt of at least one output digital asset and generate feedback metrics to improve the matching of the asset matching engine. | 2021-11-18 |
20210357446 | METHODS, SYSTEMS, AND MEDIA FOR GENERATING SENTIMENTAL INFORMATION ASSOCIATED WITH MEDIA CONTENT - In accordance with some embodiments, a method for generating sentimental information associated with media content is provided, the method comprising: receiving user input data corresponding to a user; identifying a portion of the media content item based on the user input data; determining a sentiment based on the user input data, wherein the sentiment is one of a positive sentiment which indicates that the media content item was liked by the user or a negative sentiment which indicates that the media content item was disliked by the user; determining an amount of the sentiment based on the user input data; associating the amount of the sentiment with the portion of the media content item; and generating, for the media content item, sentimental information that indicates the amount of the sentiment associated with at least one portion of the media content item. | 2021-11-18 |
20210357447 | Interactive Content Feedback System - This invention is directed to a tool that enables content creators to collect and analyze feedback on their content during production and live performances. During playback of content, users are enabled to provide detailed feedback and comments via various feedback interfaces on user devices. Users may indicate that they like and dislike certain aspects of the content, such as musical instruments featured in a song, at specific points in time. Feedback is timestamped, transformed into values, and aggregated for review and analysis. Using machine learning techniques, the present invention can identify trends in audience preferences and generate recommendations for tailoring content and content delivery. An interactive display enables the content creator to efficiently manipulate and make sense of collected feedback. With robust security features, the interactive content feedback system described herein may integrate with content streaming platforms as well as operate as an independent application. | 2021-11-18 |
20210357448 | Suggested Application Download - Example techniques involve suggesting an application of a streaming audio service via an application of a media playback system. An example implementation involves a mobile device displaying, via a control application of a media playback system, a library control comprising indicators representing respective media items of a particular streaming audio service. The mobile device receives, via the library control, input data indicating a selection of an indicator representing a particular media item. The mobile device sends instructions to cause a playback device to play back the particular media item. While the playback device is playing back the particular media item, the mobile device displays, via the control application, a control representing an application of the particular streaming audio service. The mobile device receives input data indicating a selection of the control representing the application of the particular streaming audio service and causes the mobile device to download the application. | 2021-11-18 |
20210357449 | Override of Automatically Shared Meta-Data of Media - An override of automatically shared meta-data of media method and apparatus are disclosed. In one embodiment, a method of a server device includes automatically populating a hierarchy using a play-list history data associated with a media data of a client device, and modifying the hierarchy based on a user override. The hierarchy may be a hierarchy of the play-list history data of certain items associated with the media data of the client device. A modified hierarchy may be generated based on an addition, deletion and/or an adjust modifying operation of the user override on the hierarchy, and may be automatically populated on a new mark-up language file. A new compatibility rating may be determined between the user and the other users based on the similar attributes between the modified hierarchy and the other hierarchies, and each user may be enabled to view mark-up language files of the other users. | 2021-11-18 |
20210357450 | ANALYZING CAPTURED SOUND AND SEEKING A MATCH FOR TEMPORAL AND GEOGRAPHIC PRESENTATION AND NAVIGATION OF LINKED CULTURAL, ARTISTIC AND HISTORIC CONTENT - The system and method described here relate to the effective organization of a media database. The media database can include music and can bring together time, place, genre, and artist with curator and community commentary and recommendations, cultural events and elements, media content, and a facility for procurement of related materials. The consistent focus of these fundamental elements of music and principles of organization provides a unique user experience that is a key aspect of the current invention. The user can interact with the media database using voice commands. | 2021-11-18 |
20210357451 | MUSIC COVER IDENTIFICATION WITH LYRICS FOR SEARCH, COMPLIANCE, AND LICENSING - Embodiments cover identifying an unidentified media content item as a cover of a known media content item using lyrical contents. In an example, a processing device receives an unidentified media content item and determines lyrical content associated with the unidentified media content item. The processing device then determines a lyrical similarity between the lyrical content associated with the unidentified media content item and additional lyrical content associated with a known media content item of a plurality of known media content items. The processing device then identifies the unidentified media content item as a cover of the known media content item based at least in part on the lyrical similarity, resulting in an identified cover-media content item. | 2021-11-18 |
20210357452 | METHOD FOR OBTAINING ONLINE PICTURE-BOOK CONTENT AND SMART SCREEN DEVICE - The present disclosure provides a method for obtaining online picture-book content, and relates to a field of online education technologies. The method is applied to the smart screen device. The method includes: establishing a communication link between the smart screen device and a prism component; identifying an offline picture book by using the prism component and obtaining image content of the offline picture book; and obtaining online picture-book content in a video form based on the image content. | 2021-11-18 |
20210357453 | QUERY USAGE BASED ORGANIZATION FOR VERY LARGE DATABASES - A query server identifies data collections of interest in a cloud store, and categorizes the collections based on an intended usage. Depending on the intended usage, the categorized data may be cataloged, indexed, or undergo a full intake into a column store. In a database of large data collections, some collections may experience sparse or indefinite usage. Cataloging or indexing position the collections for subsequent query access, but defers the computational burden. The full intake performs a columnar shredding of the collection for facilitating eminent and regular query access. Upon invocation of query activity, an instantiation of virtual machines provided by the cloud store vendor implements query logic, such that the VMs launch in conjunction with the cloud store having the collections. Collections therefore incur processing based on their expected usage—full intake for high query traffic collections, and reduced cataloging for maintaining accessibility of collections of indefinite query interest. | 2021-11-18 |
20210357454 | FEEDBACK FOR WATER CONSUMING APPLIANCE - A communication system provides feedback data for at least one water consuming device. The communication system includes a data collection interface, a controller, and an output interface. The data collection interface is configured to receive user data from at least one collection device. The controller is configured to perform an analysis of the user data from the at least one collection device. The output interface is configured to provide feedback data based on the analysis of the user data to a water consuming device. | 2021-11-18 |
20210357455 | SEARCHING ELECTRONIC DOCUMENTS BASED ON EXAMPLE-BASED SEARCH QUERY - A computer implemented method for searching electronic documents, and associated system and computer program product. The method includes receiving an input representing an example-based search query and processing the input. The method also includes determining, for each of the electronic documents, a relevance score between the input and the corresponding electronic document. The determination is based on, at least, textual similarity between the input and the corresponding electronic document, topical similarity between the input and the corresponding electronic document, as well as linkage relationship in a linkage network of the plurality of electronic documents. The method also includes determining, based on the determined relevance scores, a search result containing one or more of the electronic documents. The search results will be provided to the user. | 2021-11-18 |
20210357456 | DYNAMIC MANAGEMENT SYSTEM FOR NOTIFICATION AND RESPONSE TO EMERGENT EVENTS - Embodiments disclosed herein provide techniques for dynamic response management. Weather data for a geographic region is received, and a state of the geographic region is determined based on the weather data. A first predefined rule of a plurality of predefined rules is identified based on the determined state of the geographic region. A first role of a first user is determined. A first instruction is then generated for the first user based on the first predefined rule and the first role, where the first instruction comprises one or more actions. The first instruction is then transmitted to the first user. | 2021-11-18 |
20210357457 | Smart Interactions for a Digital Duplicate - Disclosed herein is a software tool that may be used to create and navigate through visualizations of an organization's data as embodied in a digital duplicate. These “smart interactions” may allow a user to visually and intuitively traverse the semantic network to dynamically provide on-demand visualization of the business data. Based on the traversal of the network, the network can be simplified and/or subnetworks can be created. As part of the visualization, “perspectives” can be created based on focal points (i.e., nodes) in the network. The focal points may be used as a starting point for the traversal, and functions (e.g., aggregates) can be dynamically applied to produce subnetworks to provide data for visualizations. | 2021-11-18 |
20210357458 | GENERATING NEAR REAL-TIME NOTIFICATIONS USING AN ASYNCHRONOUS MATCHING SYSTEM - Techniques are provided for automatically generating a real-time notification associated with a job posting. In one technique, in response to receiving a job posting, a plurality of saved searches that includes a first set of criteria and a second set of criteria is identified. For each saved search, a job posting is added to a first subset of saved searches if the job posting satisfies the first set of criteria. For each saved search of the first subset, a saved search is added to a second subset of saved searches if the job posting satisfies the second set of criteria. For each saved search of the second subset, a notification associated with the job posting is automatically sent to a computing device of a user associated with each saved search of the second subset. | 2021-11-18 |
20210357459 | DIGITAL PROCESSING SYSTEMS AND METHODS FOR CONTEXTUAL AUTO-POPULATION OF COMMUNICATIONS RECIPIENTS IN COLLABORATIVE WORK SYSTEMS - Systems, methods, and computer readable media for auto-populating recipient fields based on context of source content are disclosed. The system may include a processor configured to: maintain a plurality of boards related to a common entity, the boards including external addresses; receive an indication of an intent to send a communication, the indication originating from a specific board of the plurality of boards; render a communication interface associated with the specific board; perform a look up of a subset of the plurality of boards linked to the specific board; retrieve external addresses from each of the subset of the plurality of boards; populate the communication interface with the communication and the retrieved external addresses; receive a selection of at least one of the retrieved external addresses; cause the communication to be transmitted; and link a copy of the transmitted communication to at least the specific board. | 2021-11-18 |
20210357460 | COMPUTERIZED ANONYMOUS PERMISSION-BASED COMMUNICATIONS SYSTEM WITH MICRO-CATALOG SERVER ENABLING PERMISSION-BASED THIRD-PARTY COMMUNICATIONS - A computerized anonymous permission-based communications system is provided, including a computing device configured to display in a primary GUI network-addressable content served by a server and to receive, via an alignment GUI, a user input indicating a catalog intention for the content. The catalog intention is transmitted to a micro-catalog server to create a user micro-catalog entry. The user micro-catalog entry is indexed by an index value of the content, and includes a programmatically selected subset of content associated with the content. The computing device is further configured to receive, via the alignment GUI, user inputted permissions associated with the user micro-catalog entry. The permissions define permissible third-party communications associated with the user micro-catalog entry. The computing device is further configured to display, in the alignment GUI, the user micro-catalog entry, and present, via the alignment GUI, a third-party communication authorized by the permissions. | 2021-11-18 |
20210357461 | METHOD, APPARATUS AND STORAGE MEDIUM FOR SEARCHING BLOCKCHAIN DATA - The disclosure of the present invention provides a method for searching blockchain data, the method comprises: A. receiving a webpage read request sent by a search engine via a hypertext transfer protocol (HTTP) interface, the webpage read request including a first uniform resource locator address; B. obtaining first blockchain data at the first uniform resource locator address; C. determining whether there is at least one second uniform resource locator address, wherein second blockchain data at the at least one second uniform resource locator address is associated with the first blockchain data; D. generating a webpage associated with the first uniform resource locator address according to the first blockchain data and the at least one second uniform resource locator address, in the case where there is the at least one second uniform resource locator address; and E. returning the webpage to the search engine via the HTTP interface. | 2021-11-18 |
20210357462 | USER INTERFACE FOR PROVIDING DOCKETING DATA - Methods and systems for receiving docketing data are disclosed. The methods and systems perform operations comprising: obtaining, by a first party, a patent file wrapper from a publicly accessible database of patent records, the patent file wrapper including a plurality of patent documents; receiving, from the first party, user input that tags a patent document of the plurality of patent documents in the patent file wrapper, wherein the patent document that is tagged is associated with a patent activity that occurred within a threshold period of time; and transmitting, to a second party by the first party, a communication that includes the tagged patent document. | 2021-11-18 |
20210357463 | TECHNIQUES FOR CROWDSOURCED METADATA - Various embodiments are generally directed to techniques for crowdsourcing metadata, such as to create, maintain, utilize, and/or communicate metadata in a datastore. Some embodiments are particularly directed to collecting, managing, and/or distributing metadata via a user interface application (UIA), or an extension thereof. Many embodiments may facilitate collaborative creation of a repository for metadata, such as notes, characteristics, and/or statistics corresponding to data viewed with the user interface application. For example, the comments regarding websites may be collected from a first user via a first instantiation of the web browser extension and distributed to a second user via a second instantiation of the web browser extension. In several embodiments, the metadata may be collected and managed with instantiations of the web browser extension (herein after “WBE instants”) and a data manager may create, maintain, utilize, and/or communicate metadata in a datastore. | 2021-11-18 |
20210357464 | METHOD, SERVER, AND STORAGE MEDIUM FOR DETERMINING COMMON COMPONENTS OF PAGE - Embodiments of the present disclosure relate to a network technology field and disclose a method, server, and storage medium for determining common components of a page. In some embodiments of the present disclosure, the method for determining the common components of the page includes: determining information of a first page and information of a reference page corresponding to an identifier of the first page; and according to the information of the first page and the information of the reference page, determining common components of the first page and the reference page. In the present disclosure, manual configuration of the common components is not needed, which solves a poor feasibility problem of manually configuring the common components, such that the server is able to recognize the common components automatically. | 2021-11-18 |
20210357465 | Method and System for High Speed Serving of Webpages - Embodiments of the invention include a method and system for real time server-side rendering of webpages. When a request is received at a server from a requesting device for a webpage, the server queries a database for a logical page definition of the webpage responsive to the request. From the logical page definition, the server identifies a plurality of independent reusable blocks that collectively constitute the webpage. The server then renders each block of the plurality on the server to form a markup representation of the webpage in real time. The server then transmits the rendered markup representation of the page to the requesting device. | 2021-11-18 |
20210357466 | RECORDING LEDGER DATA ON A BLOCKCHAIN - This disclosure relates to recording blockchain ledger data. In one aspect, a method includes capturing, by a first evidence-capturing node of multiple evidence-capturing nodes of a blockchain network comprising multiple nodes, network evidence from a target evidence source. A first evidence hash of the captured network evidence is calculated. The first evidence hash is sent to other evidence-capturing nodes. Additional evidence hashes are received from the other evidence-capturing nodes. For each set of matching evidence hashes, an evidence hash group that includes the set of matching evidence hashes is generated. A count number of evidence hashes in the evidence hash group is determined for each evidence hash group. A given evidence hash group having a largest count number is identified. A given evidence hash corresponding to the matching evidence hashes of the given evidence hash group is determined as a trusted evidence hash. | 2021-11-18 |
20210357467 | SEARCH ENGINE - A method may include receiving a search phrase including a first word. In response to receiving the search phrase, a database may be queried to retrieve an item description matching the search phrase. The first item description may match the search phrase by including a second word that matches the first word in the search phrase. A semantic role for the first word included in the search phrase may be determined based on a semantic role of the second word included in the item description. An analytics result associated with the search phrase may be generated based on the semantic role of first word included in the search phrase. Related systems and articles of manufacture, including computer program products, are also provided. | 2021-11-18 |
20210357468 | METHOD FOR SORTING GEOGRAPHIC LOCATION POINT, METHOD FOR TRAINING SORTING MODEL AND CORRESPONDING APPARATUSES - A method for sorting geographic location points, a method for training a sorting model and corresponding apparatuses are disclosed, which relates to the technical field of big data. A specific implementation solution is: receiving a query request for geographic location points of a vertical class from a user; inputting candidate geographic location point data of the vertical class into a preference model of the user, to obtain a preference score of the user for each candidate geographic location point; inputting the preference score of the user for each candidate geographic location point into a sorting model as one of sorting features of each candidate geographic location point, to obtain a sorting score of each candidate geographic location point; and determining, according to the sorting score of each candidate geographic location point, a query result returned to the user. The present disclosure can integrate preference factors of a user into sorting when the user queries geographic location points of a vertical class, so that query results can meet the user's personalized needs. | 2021-11-18 |
20210357469 | METHOD FOR EVALUATING KNOWLEDGE CONTENT, ELECTRONIC DEVICE AND STORAGE MEDIUM - The present disclosure provides a method for evaluating a knowledge content, an electronic device and a storage medium, and relates to a field of knowledge content evaluating technologies. The method includes: obtaining a knowledge content; obtaining an evaluation parameter of the knowledge content, in which the evaluation parameter includes demand intensity information, author authority information, and scarcity degree information of the knowledge content; and generating an evaluation value of the knowledge content according to the evaluation parameter. | 2021-11-18 |
20210357470 | IDENTIFYING CONFIGURATION PARAMETERS FOR A QUERY USING A METADATA CATALOG - Systems and methods are disclosed for processing and executing queries in a data intake and query system. The data intake and query system receives a query identifying a set of data to be processed and a manner of processing the set of data. The data intake and query system parses the query and uses a metadata catalog to dynamically identify configuration parameters of datasets and/or rules associated with the query. The identified configuration parameters are communicated to a query processing component of the data intake and query system for use in executing the query. | 2021-11-18 |
20210357471 | FAULT MONITORING IN A UTILITY SUPPLY NETWORK - A first aspect of the invention provides a method of fault monitoring in a utility supply network, the method comprising: receiving user queries, each user query about a performance of the network at a respective location; defining a region based on the locations specified in the received user queries; determining an estimate of a user population in the region; and according the region, based on the estimate, a priority for one or more of fault investigation and remediation. | 2021-11-18 |
20210357472 | AUTOMATED HYPERLINKS FOR DRAFT EMAILS - Examples described herein can identify items from third-party or backend services, obtain relevant information for those items, and automatically populate hyperlinks relevant to those items in a draft email. A regular expressions search can be executed on the text of a draft email. When a match is found, the email client can request, from a server, an object associated with the matching expression. The server can obtain the object, using one or more connectors that provide access to a backend system, and provide it to the email client. The email client can extract a URL from the object and enter the URL into a links table stored on the user device. The email client can pull the URL from the links table and use it to automatically generate a hyperlink of the regular expression within the body of the draft email. | 2021-11-18 |
20210357473 | PAGE-LOADING METHOD AND TERMINAL, AND PAGE-RESPONDING METHOD AND SERVER - A page-loading method is applied to a terminal and includes: sending a page access request to a server, downloading page content returned by the server, and acquiring page content download information; parsing out a loading optimization script and address information of one or more to-be-loaded page elements from the page content; running the loading optimization script, and acquiring a current loading quality parameter for the one or more to-be-loaded page elements according to the page content download information; and loading the one or more to-be-loaded page elements according to the address information of the one or more to-be-loaded page elements and the current loading quality parameter. | 2021-11-18 |
20210357474 | CORE DATA SERVICE-BASED COMPILE TIME WEBPAGE GENERATION - Aspects of the current subject matter provide for core data service model-based webpage generation that occurs at compile time. A specialized webpage, based on metadata consumed by and interpreted by the model, is generated at compile time, thus resulting in improved performance speeds compared to that for runtime webpage generation as a reduced amount of code is transferred to the client. The compile time webpage generation provides for extensibility to be shifted to a single source of truth, the core data service (CDS) model at which compile time webpage generation is implemented. | 2021-11-18 |
20210357475 | Computationally Efficient General Matrix-Matrix Multiplication (GeMM) - A computation unit that comprises (i) a multiplicand vector decomposer that generates a decomposed multiplicand vector which uses a sequence of first and second concatenated multiplicand sub-elements (1 | 2021-11-18 |
20210357476 | SYSTEM ENHANCEMENT METHODOLOGY VIA MATRIX MULTIPLICATION EFFICIENCY SPEEDUP USING SPARSE BASIS APPROACH - The present invention relates to computing-implemented method and system that improves matrix multiplication efficiency, especially to method and system optimizing matrix multiplication using sparse basis approach. Matrices to be multiplied are organized into specially ordered vectors with zero values, facilitates speed up during linear combination computation or synthesis process. | 2021-11-18 |
20210357477 | PLANE-GEOMETRY CONSISTENCY DETECTION METHOD, COMPUTER DEVICE, STORAGE MEDIUM - The plane-geometry consistency detection method, the computer device, and the storage medium of the present disclosure are achieved by obtaining first normal vector set, second normal vector set, first distance set, and second distance set; obtaining pairs of the first normal vectors and an angle-matched second normal vector pair to compute a first rotation matrix and a first projection matrix; clustering elements in a rotation vector set obtained from the first projection matrix to generate a first normal vector sequence and a second normal vector sequence according to a first target classification; computing a second rotation matrix, using a second projection matrix as the target rotation matrix; obtaining a distance difference set, clustering to obtain a second target classification and using the element thereof and the corresponding second normal vector to obtain the target translation matrix. The present disclosure achieves a high-consistency and fast plane mapping in different coordinate systems. | 2021-11-18 |
20210357478 | NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, IMPACT CALCULATION DEVICE, AND IMPACT CALCULATION METHOD - A non-transitory computer-readable storage medium storing a program that causes a processor included in an impact calculation device to execute a process, the process includes calculating a plurality of gradient values, each of the plurality of gradient values is a gradient value corresponding to each of a plurality of sampling points of a nonlinear regression model, and calculating, as an impact, a root-mean-square of which a first gradient value included in the plurality of the gradient values at a first sampling point included in the plurality of sampling point and a second gradient value at a one or more sampling point within a predetermined range around the first sampling point. | 2021-11-18 |
20210357479 | METHODS AND APPARATUS FOR SORTING DATA - A computer implemented system for genomic data sorting, comprising alignment and position mapping. The system maps each read to a position on the reference genome with which the read is associated, followed by sorting these reads by their mapped positions. | 2021-11-18 |
20210357480 | SYSTEM AND METHOD FOR DEGRADATION-BASED POWER GRID OPERATION WITH THE AID OF A DIGITAL COMPUTER - Long-term photovoltaic system degradation can be predicted through a simple, low-cost solution. The approach requires the configuration specification for a photovoltaic system, as well as measured photovoltaic production data and solar irradiance, such as measured by a reliable third party source using satellite imagery. Note the configuration specification can be derived. This information is used to simulate photovoltaic power production by the photovoltaic system, which is then evaluated against the measured photovoltaic production data. The simulated production is adjusted to infer degradation that can be projected over time to forecast long-term photovoltaic system degradation. | 2021-11-18 |
20210357481 | MEDICAL DIAGNOSTIC-INITIATED INSURANCE OFFERING - When results of a medical diagnostic examination performed on a patient are initially or newly generated and stored into a medical diagnostic provider system, procurement of binding quotes of types of insurance that require a medical diagnostic exam to be performed and for which the patient is an insured party may be automatically initiated or triggered. Procurement of binding quotes may include, with customer or patient permission, generation of a health profile of the patient based upon the exam results, provision of the health profile to insurance providers (e.g., using an online auction), reception of binding quotes from at least some of the insurance providers, and acceptance of one of the binding quotes on behalf of the patient, thereby entering into a binding contract for insurance. Using the techniques disclosed herein, the patient may automatically be provided with approved insurance coverage upon completion of his or her medical examination. | 2021-11-18 |
20210357482 | SYSTEMS AND METHODS FOR IDENTIFYING A CONTENT RECEIVING DEVICE - A method for identifying from among network-connected devices a particular device likely associated with a theft of distributed content includes obtaining content, the content having been distributed from a particular one of the network-connected devices, identifying in the obtained content anti-collusion codes, and determining the particular one of the network-connected devices is likely associated with the theft of distributed content when an aggregated probability calculated using the identified anti-collusion codes is equal to or exceeds a predetermined threshold. | 2021-11-18 |
20210357483 | LINKING INDIVIDUAL BIOMETRIC DATA TO PROTECTED RESOURCES ACCESSED VIA USER DEVICES - Methods, apparatus, and processor-readable storage media for linking individual biometric data to protected resources accessed via user devices are provided herein. An example computer-implemented method includes obtaining biometric data associated with users of a user device and identifying information pertaining to the biometric data; outputting the identifying information pertaining to the of biometric data and identifying information pertaining to protected resources; linking at least a portion of the multiple sets of biometric data to one of the protected resources based on input from at least a first of the users in response to the outputting step; processing, in response to an authentication request in connection with an attempt to access the protected resource by the at least first user, biometric data input to the user device; and resolving the authentication request in response to a determination that the input biometric data match the biometric data linked to the protected resource. | 2021-11-18 |
20210357484 | AUTHENTICATION IN VIRTUAL ENVIRONMENTS - Example implementations relate to authentication invirtual reality systems. For example, a device comprising a generator engine can generate a stimulus, and display the stimulus to the user in a virtual environment. The device can receive an input from the user in response to the stimulus, via a receiver engine, and authenticate the user based on the input received via an authentication engine. Additionally, the device can obfuscate the received input from the user by preventing the input from being displayed in the virtual environment via an obfuscation engine. | 2021-11-18 |
20210357485 | ELECTRONIC APPARATUS AND CONTROL METHOD - An electronic apparatus includes: a detector that detects an object present within a predetermined detection range; and an embedded controller that based on a detection result by the detector determines that the object has left the electronic apparatus when the object is no longer detected within a first detection range of the predetermined detection range after the object has previously been detected within the first detection range, and determines that the object has approached the electronic apparatus after the object is detected within a second detection range in the predetermined detection range wider than the first detection range when no objects were previously detected within the predetermined detection range. While the object determined to have left is detected within the second detection range, the embedded controller determines that the object has re-approached based on a detection position of the object moving toward the first detection range. | 2021-11-18 |
20210357486 | METHOD AND SYSTEM FOR INFORMATION AUTHENTICATION - A system and a method for performing an authentication are provided. The method includes: capturing, by using a front-facing camera of a mobile communication device, a first image of a face of a user; capturing, by using a rear-facing camera of the mobile communication device, a second image of an identification card that includes a photograph of the face of the user; comparing the first image with the second image; verifying that the first image matches the second image; obtaining user-specific information included in the second image; receiving a request to authenticate a transaction that relates to the user; receiving an input from the user that is usable for authenticating the transaction; and using the first image, the second image, the obtained user-specific information, and the received input to authenticate the transaction. | 2021-11-18 |
20210357487 | MODULAR BIOMETRIC STATION WITH COHESIVE FORM FACTOR - A modular biometric station system is used to form one or more modular biometric stations with cohesive form factors. Such biometric stations include a core unit, one or more end caps, and one or more modules. The modules may be configured to communicably and electrically couple to one or more of the end caps. The end caps may be configured to communicably and electrically couple to the core unit and/or one or more of the modules and may communicably and electrically couple one or more of the modules to the core unit. The core unit, end caps, and/or the modules may be able to communicably interact when coupled together. The core unit, end caps, and modules may all share a form factor. The core unit may include hardware and/or software that satisfies common requirements, and the modules may include peripherals and/or other components that can be coupled to the core unit to adapt the modular biometric station to a variety of different needs of different applications. | 2021-11-18 |
20210357488 | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal - A fingerprint recognition method includes, when a fingerprint authentication module is in a disabled state, receiving a touch operation used to trigger an application program. If fingerprint authentication is not required for execution of the application program, the fingerprint recognition module is kept in a disabled state, and after the application program has been executed for specific duration, the fingerprint authentication module is enabled again, to perform the fingerprint authentication. | 2021-11-18 |
20210357489 | COMMUNICATION NETWORK BASED NON-FUNGIBLE TOKEN CREATION PLATFORM WITH INTEGRATED CREATOR BIOMETRIC AUTHENTICATION - A geo-locations software management utility provides a method and system for passive authentication of an individual's geo-location via a communication network and for user authenticating images and video and social media content. Specifically a communication network based non-fungible token creation platform with integrated creator biometric authentication is disclosed. | 2021-11-18 |
20210357490 | TRUSTED DEVICE - A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user. | 2021-11-18 |
20210357491 | TERMINAL ACCESS GRANT DETERMINATIONS BASED ON AUTHENTICATION FACTORS - According to examples, an apparatus may include a memory on which is stored machine-readable instructions that may cause a processor to receive a user credential from a terminal, in which the user credential is stored in a machine-readable code on a user device and the terminal obtained the machine-readable code from the user device. The processor may also identify at least one authentication factor associated with the user based on the user credential, in which the authentication factor(s) includes a physical location associated with the user and/or a time-based factor. The processor may further determine whether the authentication factor(s) indicates that the user is to be granted access to the terminal and based on a determination that the authentication factor(s) indicates that the user is to be granted access to the terminal, may grant the user access to the terminal. | 2021-11-18 |
20210357492 | METHOD AND SYSTEM FOR IMPROVED DATA CONTROL AND ACCESS - A method for backing up data includes: receiving, by a driver in a host controller of a data storage device, an indication of a threatening event identifying one or more data files in the data storage device; delaying, by the driver, the threatening event; and backing up, by the driver, the one or more data files in the data storage device, prior to allowing the threatening event. | 2021-11-18 |
20210357493 | PROVISIONING APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS FOR ELECTRONIC DEVICES - A provisioning apparatus for performing a provisioning procedure with an electronic component for an electronic device. The provisioning procedure includes providing provisioning data to the electronic component and processing the provisioning data by the electronic component. The provisioning apparatus has a provisioning and sensing unit electrically connected with the electronic component for performing the provisioning procedure. The provisioning and sensing unit detects a power profile of the electronic component, which represents the electric power consumed by the electronic component and/or the electromagnetic power. The provisioning apparatus has a provisioning control unit configured to receive the power profile from the provisioning and sensing unit and to compare the power profile with a reference power profile for the electronic component. The provisioning control unit determines on the basis of the comparison between the power profile of the electronic component and the reference power profile whether the electronic component is authentic or non-authentic. | 2021-11-18 |
20210357494 | USER AUTHENTICATION METHOD USING ULTRASONIC WAVES - A user authentication method using ultrasonic waves is disclosed. The user authentication method using ultrasonic waves, according to an embodiment of the present invention, comprises the steps of: receiving a sound wave signal which includes analog data; sampling the sound wave signal at a preset sampling rate; generating a block by selecting a preset number of pieces of sampling data; converting sampled data included in the block into frequency components; and determining, as digital data in the block, a letter or number corresponding to the frequency component having the largest magnitude from among the frequency components. | 2021-11-18 |
20210357495 | SYSTEMS, METHODS, AND APPARATUS FOR SECURING USER DOCUMENTS - The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device for storing documents, at least one document provider connected to the server, the at least one document provider operable to provide user documents to the server for storage in the data storage device, the user documents containing at least one object of security concern, and at least one document consumer connected to the server, the at least one document consumer operable to receive the user documents containing the at least one object of security concern from the server. The processor in the server is operable to determine whether to provide the at least one object of security concern to the at least one document consumer based on at least one security setting, and based on the decision either provide the documents with the at least one object of security concern or provide a replacement documents without the security of concern and an indication on each replacement document that that the at least one object of security concern has been excluded. | 2021-11-18 |
20210357496 | DATA TRANSFER IN SECURE PROCESSING ENVIRONMENTS - Data transfer in a secure processing environment is provided. A digital assistant can receive audio input detected by a microphone of a computing device. The digital assistant can determine, based on the audio input, to invoke a third-party application associated with the computing device. The digital assistant can generate, responsive to the determination to invoke the third-party application, a packaged data object. The digital assistant can forward, to the third-party application invoked by the digital assistant component to execute in a secure processing environment on the computing device, the packaged data object. The third-party application can transmit, responsive to a digital component request triggered in the third-party application, the packaged data object to a digital component selector to execute a real-time selection process based on the packaged data object. | 2021-11-18 |
20210357497 | SYSTEMS AND METHODS FOR TRANSFORMING INSTRUCTIONS FOR METADATA PROCESSING - According to at least one aspect, a hardware system include a host processor, a policy engine, and an interlock is provided. These components can interoperate to enforce security policies. The host processor can execute an instruction and provide instruction information to the policy engine and the result of the executed instruction to the interlock. The policy engine can determine whether the executed instruction is allowable according to one or more security policies using the instruction information. The interlock can buffer the result of the executed instruction until an indication is received from the policy engine that the instruction was allowable. The interlock can then release the result of the executed instruction. The policy engine can be configured to transform instructions received from the host processor or add inserted instructions to the policy evaluation pipeline to increase the flexibility of the policy engine and enable enforcement of the security policies. | 2021-11-18 |
20210357498 | CONFIGURABLE SYSTEM FOR DETECTING SOCIAL MEDIA THREATS - A system may include: a server comprising a rule cache; a user device communicably coupled to the server; a computer-readable medium comprising instructions that cause the server to: monitor a plurality of third-party data sources; obtain, via a queueing service, a plurality of pieces of content from the plurality of third-party data sources; for each piece of content, fetch a rule ID from a list of rule IDs on the user device, wherein the rule ID is fetched based on the content and a pre-selected setting on the user device; use the rule ID to fetch a rule from the rule cache, the rule comprising a script, the script comprising executable code; execute the script on the piece of content to determine if the piece of content matches the rule; and in response to determining that the piece of content matches the rule, send an alert to the user device. | 2021-11-18 |
20210357499 | RESTORATION OF FIRMWARE SUBSYSTEMS BASED ON MANUFACTURING STATES - An example computing device incudes a main processor, a management firmware subsystem, and a controller to control operation of the management firmware subsystem. The controller is separate from a main processor. A memory stores subsystem data that is useable by the controller. The computing device further includes a set of instructions that determines a manufacturing mode of the computing device. The manufacturing mode is enabled when the computing device is under manufacture or maintenance. The manufacturing mode is disabled when the computing device is under normal operation. The set of instructions further determines a manufacturing state of the subsystem data. The manufacturing state indicates whether the subsystem data is complete. In response to determining that the manufacturing mode is disabled and that the manufacturing state of the subsystem data is incomplete, the set of instructions initiates a restoration of the subsystem data from a backup of the subsystem data. | 2021-11-18 |
20210357500 | CALCULATION DEVICE, CALCULATION METHOD, AND CALCULATION PROGRAM - A calculation device receives input of a plurality of pieces of training data including a communication destination known to be malignant as data. The calculation device generates a model that calculates a malignant degree of an input communication destination from each piece of the training data. The calculation device gives weight to each of the models, and generates a mixed model using the model and the weight. The calculation device calculates a malignant degree of a communication destination unknown whether the communication destination is malignant using the mixed model. | 2021-11-18 |
20210357501 | ATTACK ESTIMATION DEVICE, ATTACK ESTIMATION METHOD, AND ATTACK ESTIMATION PROGRAM - An attack estimation device includes a storage unit configured to hold an attack tree, an abstract attack tree, and log check management information, and a prediction unit configured to predict, when a detection alert is received, a range of compromise from the attack by referring to the information in the storage unit. The prediction unit is configured to: determine that an attack of an unknown pattern has occurred as the attack when indicators of compromise that correspond to the attack are not successfully identified; identify an abstract attack name by referring to the abstract attack tree; and predict a range of compromise from the attack of an unknown pattern by identifying a device in which indicators of the attack of an unknown pattern are likely to be left, and by identifying a specific place in the log of the identified device, by referring to the log check management information. | 2021-11-18 |
20210357502 | ON-DIE VOLTAGE-FREQUENCY SECURITY MONITOR - A method to prevent a malicious attack on CPU subsystem (CPUSS) hardware is described. The method includes auto-calibrating tunable delay elements of a dynamic variation monitor (DVM) using an auto-calibration value computed in response to each detected change of a clock frequency (Fclk)/supply voltage (Vdd) of the CPUSS hardware. The method also includes comparing the auto-calibration value with a threshold reference calibration value to determine whether the malicious attack is detected. The method further includes forcing a safe clock frequency (Fclk)/safe supply voltage (Vdd) to the CPUSS hardware when the malicious attack is detected. | 2021-11-18 |
20210357503 | Systems and Methods for Detecting Data Alteration from Source to Target - Disclosed herein are systems and methods for intelligent metadata management and data lineage tracing. In exemplary embodiments of the present disclosure, a data element can be traced throughout multiple applications, platforms, and technologies present in an enterprise to determine how and where the specific data element is utilized. The data element is traced via a hierarchical key that defines it using metadata. In this way, metadata is interpreted and used to trace data lineage from one end of an enterprise to another. | 2021-11-18 |
20210357504 | EFFICIENT DETECTION OF RANSOMWARE ATTACKS WITHIN A BACKUP STORAGE ENVIRONMENT - Described is a system that efficiently detects ransomware attacks within a storage environment. The system may perform a specialized validation by comparing a sampling of backup data obtained from a storage environment with a sampling of data maintained by a specialized validation database. Accordingly, if there is a discrepancy between the samples, the system may issue an alert indicating the original backup data may be encrypted as part of a ransomware attack. The system may utilize the specialized sampling as a validation technique in addition, or as an alternative, to relying on data fingerprints for validation. For example, malicious code may be configured to cause the storage environment to provide fingerprints prior to an unauthorized encryption as an attempt to deceive certain validation processes. Accordingly, to counteract such attempts, the system may rely on the sampling of data, instead of relying solely on a fingerprint comparison. | 2021-11-18 |
20210357505 | DATA PROCESSING METHOD FOR COPING WITH RANSOMWARE, PROGRAM FOR EXECUTING THE METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING THE PROGRAM - The present disclosure provides a data processing method for coping with ransomware, which encrypts data with a malicious intent and blocks an access to the data, to protect the data, and a program for executing the data processing method. In a computer apparatus that loads an application program stored in a memory onto a processor and carries out a predetermined processing according to the application program, on an operating system (OS) kernel which controls an access of the application program to hardware components of the computer apparatus, the processor reads the data stored in the memory, performs the predetermined processing at the request of the application program, determines whether a ransomware attack occurred for the data before storing the processed data back to the memory, and stores the processed data to the memory according to a determination result, thereby preventing the damage caused by the ransomware attack. | 2021-11-18 |
20210357506 | SYSTEM AND METHOD UTLIZING MACHINE LEARNING TO PREDICT SECURITY MISCONFIGURATIONS - Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data. The computer-based system and method using the trained classifier generate and output a report indicating a pass or fail state of the new configuration. | 2021-11-18 |
20210357507 | FRAMEWORK FOR AUTOMATED PENETRATION TESTING - In one aspect, a distributed security-testing infrastructure is used for attack-tree modeling for penetration testing. An API framework, fully distributed and scalable, is used to access the attack-tree modeling based on attack trees, or decision trees, to emulate attacker behavior and decisions taken during an attack. The API framework allows developers to implement the security tools into existing software to perform actions based on desired conditions as defined by the nodes of the attack tree. For example, APIs can be used along with if/else-type statements to create advanced threat models that react based on given conditions to test multiple paths through the attack tree. Nodes of the attack tree are configured to perform actions based on the output of previous attacks in other nodes. This flexible design allows for the easy modification of the threat modeling system to test new scenarios. | 2021-11-18 |
20210357508 | METHOD AND A SYSTEM FOR TESTING MACHINE LEARNING AND DEEP LEARNING MODELS FOR ROBUSTNESS, AND DURABILITY AGAINST ADVERSARIAL BIAS AND PRIVACY ATTACKS - A system for testing Machine Learning (ML) and deep learning models for robustness, and durability against adversarial bias and privacy attacks, comprising a Project Repository for storing metadata of ongoing projects each of which having a defined project policy, and created ML models and data sources being associated with the ongoing projects; a Secure Data Repository, for storing training and testing datasets and models used in each project for evaluating the robustness of the each project; a Data/Model Profiler for creating a profile, based on the settings and configurations of the datasets and the models; a Test Recommendation Engine for recommending the relevant and most indicative attacks/tests for each examined model and for creating indicative and effective test suites; a Test/Attack Ontology module for storing all attacks/tests with their metadata and mapping the attacks/tests to their corresponding settings and configurations; an Attack Repository for storing the implemented tests/attacks. An ML model is tested against each one of the robustness categories (privacy, bias and adversarial learning); a Test Execution Environment for Initializing a test suite, running multiple tests and prioritizing tests in the test suite; a Project/Test Analytics module for analyzing the test suite results and monitoring changes in performance over time; a Defenses Repository for storing implemented defense methods implemented for each robustness category. | 2021-11-18 |
20210357509 | DEEP APPLICATION DISCOVERY AND FORENSICS FOR AUTOMATED THREAT MODELING - In an embodiment, a method for deep application discovery and forensics of a reference system includes a computing device, such as an orchestrator, receiving and/or obtaining from an inspection layer executing on the reference system, during runtime of the reference system, architecture and configuration information describing the reference system. Also, the computing device generates, during runtime of the reference system, dependency matrices describing relationships between components of the reference system which allow for generation, during runtime of the reference system, at least one threat model describing vulnerabilities of the reference system based on the dependency matrices. The inspection layer identifies the applications and databases accessed by the applications. From this information, the inspection layer discovers components associated with the applications and databases, APIs, URIs, URLs, and individual processes spawned by the applications, along with storage tables, and store-procedures invoked between the applications and the databases. | 2021-11-18 |
20210357510 | VULNERABILITY ASSESSMENT - Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device. | 2021-11-18 |
20210357511 | METHOD AND APPARATUS FOR SYSTEM PROTECTION TECHNOLOGY ANALYSIS - A method includes determining, by an analysis system, a system aspect of a system for a protection evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective for use in performing the protection evaluation on the system aspect. The method further includes determining, by the analysis system, at least one evaluation viewpoint for use in performing the protection analysis on the system aspect. The method further includes obtaining, by the analysis system, protection data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, a protection rating as a measure of protection maturity for the system aspect based on the protection data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric. | 2021-11-18 |
20210357512 | SENSITIVE DATA DETECTION AND REPLACEMENT - Systems and methods for privacy and sensitive data protection. An image of a document is received at a pre-processing stage and image pre-processing is applied to the image to ensure that the resulting image is sufficient for further processing. Pre-processing may involve processing relating to image quality and image orientation. The image is then passed to an initial processing stage. At the initial processing stage, the relevant data in the document are located and bounding boxes are placed around the data. The resulting image is then passed to a processing stage. At this stage, the type of data within the bounding boxes is determined and suitable replacement data is generated. The replacement data is then inserted into the image to thereby remove and replace the sensitive data in the image. | 2021-11-18 |
20210357513 | SECURE PROCESSING SYSTEMS AND METHODS - This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain. | 2021-11-18 |
20210357514 | SYSTEM AND DEVICE FOR DATA MANAGEMENT - The present disclosure provides a system, device and method for data management. The system includes a processor configured to: receive, from an entity, data packets; receive, from the entity; generate a plurality of shares pertaining to the data packets by applying a threshold scheme to the data packets; and distribute the plurality of shares amongst at least two secure cryptoprocessors, wherein each secure cryptoprocessor allows access to the plurality of shares stored within it upon receipt of a corresponding second password, and wherein the processor is configured to re-generate the data packets from a threshold number of shares out of the plurality of generated shares, the value of the threshold number being predetermined. | 2021-11-18 |
20210357515 | SECURE SIMILARITY SEARCH FOR SENSITIVE DATA - A system including a secure, in-memory unit implemented on an associative processing unit (APU), for creating encrypted vectors. The in-memory unit includes a data store and an encryptor. The data store stores data and the encryptor encrypts the data into an encrypted vector. Optionally, the unit includes a neural proxy hash encoder that encodes the data into an encoded vector, and, in this embodiment, the encryptor encrypts the encoded vector into an encrypted encoded vector. The neural proxy hash encoder includes a trained neural network which includes a plurality of layers that encode the data into feature sets. The trained neural network encodes image files, audio files, or large data sets. The APU is implemented on SRAM, non-volatile, or non-destructive memory. | 2021-11-18 |
20210357516 | METHOD FOR DUPLEXING DATABASE - The present invention contemplates a non-transitory computer readable medium including a computer program steps for a change data capture (CDC) between a first database and a second database when executed by one or more processors of the computer system. The disclosed non-transitory computer readable medium contemplates receiving data from a first database by a second transceiver module, the data including a null data contained in an encrypted column and a data contained in a non-encrypted column of a table, generating, by the second management module, a change data, by reproducing transactions performed in the first database with respect to the data transmitted from the first database and performing a processing on a transaction before commit, and determining, by the second management module, to request an encrypted column data corresponding to the null data to the first database. | 2021-11-18 |
20210357517 | APPARATUSES AND METHODS FOR IMPROVED DATA PRIVACY - Apparatuses, methods, and computer program products are provided for improved data privacy. An example method includes receiving a standard model where the standard model includes user data associated with a plurality of users, and the user data is associated with one or more privacy factors. The method also includes receiving a first privacy impact model that identifies a first privacy factor and analyzing the standard model with the first privacy impact model. The method also includes generating a first privacy impact score for the first privacy factor. The method may further include determining if the first privacy impact score satisfies a first privacy factor threshold. In an instance in which the first privacy impact score fails to satisfy the first privacy factor threshold, the method may generate a first violation notification or augment the standard model. | 2021-11-18 |
20210357518 | CONTROL OF ACCESS TO HIERARCHICAL NODES - An example of a computer-readable medium to store machine-readable instructions. The instructions may be executed by a processor to determine an identity of an application and control access of the application to a hierarchical data structure. | 2021-11-18 |
20210357519 | TECHNIQUES FOR SECURE DOCUMENT MANAGEMENT AND VERIFICATION - The present innovative solution solves the problem of managing secure documents so that they can be verified, and protected from tampering and illegal printing. A legal document is converted to a secure document by embedding into the legal document one or more security codes that have been encrypted with a standard of proprietary cryptographic algorithm. The security codes are supplemented by a QR code associated with the archive location of each page of the secure document, and stored at a server or database. The security codes stored in the document and can be printed together with the document, as a form of watermark, using UV-sensitive ink or toner at a security printer. The security codes are encrypted and can be printed on varying locations in the secure document pages, which are defined in a geolocation template, separately transmitted in encrypted format. | 2021-11-18 |
20210357520 | EDGE CLOUD DATA PROTECTION - An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed. | 2021-11-18 |
20210357521 | MATHEMATICAL METHOD FOR PERFORMING HOMOMORPHIC OPERATIONS - The present invention relates generally to a system and method of querying an anonymized database. More particularly, the invention provides a method and system for querying an anonymized database without the need to decrypt queried data while it's processed. Even more specifically, the invention provides a method and system of anonymizing a database such that it may be queried efficiently in near real time while still retaining the ability to not decrypt requested data while it's being processed. | 2021-11-18 |
20210357522 | COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR COMPLETING QUERIES PROPAGATED ACROSS A PLURALITY OF DATASOURCES - A computer-implemented method for completing queries propagated across a plurality of datasources that may include receiving a search query comprising a search string via an application user interface. Identity information regarding an end user associated with the search query may also be received. At least one role of the end user may be automatically determined and authorization metadata corresponding to the at least one role may be automatically appended to the search query. A plurality of adapters corresponding to the datasources may be invoked and the appended search query may be passed to the adapters. The appended search query may be translated by the adapters into a plurality of translated search queries according to the syntax and format configurations of the datasources. The translated search queries may be automatically submitted to the corresponding datasources. Responsive results may be automatically received and presented at an end user computing device. | 2021-11-18 |
20210357523 | Differentially Private Processing and Database Storage - A hardware database privacy device is communicatively coupled to a private database system. The hardware database privacy device receives a request from a client device to perform a query of the private database system and identifies a level of differential privacy corresponding to the request. The identified level of differential privacy includes privacy parameters (ε,δ) indicating the degree of information released about the private database system. The hardware database privacy device identifies a set of operations to be performed on the set of data that corresponds to the requested query. After the set of data is accessed, the set of operations is modified based on the identified level of differential privacy such that a performance of the modified set of operations produces a result set that is (ε,δ)-differentially private. | 2021-11-18 |
20210357524 | SOFTWARE PRIVACY FILTER OVERLAY - Input data for a computing device is received from one or more input devices. Whether there is visual hacking of the computing device is determined based on the input data. A user interface of the computing device is modified in response to determining there is visual hacking of the computing device. | 2021-11-18 |
20210357525 | SECURING CONFIDENTIAL INFORMATION DURING A TELECOMMUNICATION SESSION - Systems and methods disclosed herein securely provide confidential information associated with a user during an active voice call conducted using the user's mobile device. The confidential information may be provided by generating the information in spoken form and inserting the spoken information into an audio stream of the voice call. For example, a customer may be on a phone call with a customer agent. The customer agent may ask the customer for a credit card number in order to process a financial transaction. The customer may select the credit card number via an application executing on the customer's mobile phone. The application may cause the credit card number to be spoken out loud during the voice call. A voice sample of the spoken credit card number in inserted into the audio stream of the voice call and is therefore, audible to the customer and the customer agent without being overheard by a third party. | 2021-11-18 |
20210357526 | USING A SECURE ENCLAVE TO SATISFY RETENTION AND EXPUNGEMENT REQUIREMENTS WITH RESPECT TO PRIVATE DATA - A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements. | 2021-11-18 |
20210357527 | APPARATUSES AND METHODS FOR DATA CLEARANCE TRAVERSAL - Apparatuses, methods, and computer program products are provided for data privacy and clearance traversal. An example method includes receiving a first model having an associated first clearance. The method further includes determining a faulty outcome of the first model due to the first clearance and receiving a second model having an associated second clearance. The method also includes inputting the faulty outcome of the first model to the second model and generating a traversal outcome of the second model. The method further include inputting the traversal outcome to the first model so as to traverse a clearance issue associated with the first clearance. The method also includes preventing access of the second model to user data analyzed by the first model in generating the faulty outcome. | 2021-11-18 |
20210357528 | SECURED USE OF PRIVATE USER DATA BY THIRD PARTY DATA CONSUMERS - Disclosed herein is a system configured to collect and maintain user data within a first party silo while allowing third party data consumers to use the user data in accordance with explicit input from users. The system provides a user with transparency and control with regard to data use by displaying graphical user interfaces configured to receive input indicating whether the user allows or prevents third party data consumers to use his or her data. The system exposes an API that enables the third party data consumers to submit a data query. The system uses the data query to internally analyze a user data set. User data is included in the user data set in accordance with the input. The system is configured to provide, via the API, a result of the analysis to the third party data consumer that submitted the data query without providing the user data set. | 2021-11-18 |
20210357529 | PROVIDING TRANSPARENCY AND USER CONTROL OVER USE OF BROWSING DATA - Disclosed herein is a system configured to provide a user with transparency and user control over how browsing data is shared. The system can determine that a user has initiated use of a browser. The system displays, as part of the management of browser settings in accordance with a user account, a graphical UI that presents functionality to receive input indicating whether the user allows or prevents sharing of the browsing data. The graphical UI can list the identities of data aggregators and corresponding incentives offered by each of the data aggregators in exchange for the user sharing his or her browsing data. The browser can collect the browsing data based on interactions with web sites and share the browsing data with individual ones of the data aggregators based on the input. Upon sharing the user browsing data, the system can enable the incentive to be provided to the user. | 2021-11-18 |
20210357530 | INFORMATION COMPUTING APPARATUS, INFORMATION COMPUTING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - An information processing apparatus according to the present application includes an acquisition unit that acquire content to be disclosed from a user's terminal apparatus and a specifying unit that specifies a portion of the acquired content that meets a predetermined condition set in advance. | 2021-11-18 |
20210357531 | PRIVACY PRESERVING LOCATION TRACKING - A method, an apparatus and a computer program for tracking location of users without disclosing Personally Identifiable Information (PII). The method comprises analyzing sequences of location events of a user over time to determine a Point Of Interest (POI) of the user. In response to determining that the POI is PII-revealing POI; obfuscating the POI, by generating a pseudolocation identifier of the POI indicative of a semantic meaning thereof to the user without revealing a geographic location of the POI. The method further comprises generating an anonymized sequence of location events of the user based on the sequence of location events, that comprises the pseudolocation identifier to represent location events associated with the POI, and absent of the geographic location thereof. The anonymized sequence of location events may be provided a third party to analyze behavior of the user without divulging identity of the user. | 2021-11-18 |
20210357532 | PREEMPTION OF A CONTAINER IN A SECURE COMPUTATION ENVIRONMENT - A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege. | 2021-11-18 |
20210357533 | Runtime Signature Integrity - The field of deep fakes is a growing problem in a variety of areas. The disclosed systems and methods are used to check the integrity of video in both the signal and the time domains. The validity of the signal domain is checked through a unique signature generation of each frame at the point of video creation, and subsequently, signature checking. Validation of the time domain is accomplished by interleaving portions of the current frame into the following frame. Also included in the disclosure are hardware and network architecture which may be used for creation, validation, and content distribution. | 2021-11-18 |
20210357534 | SYSTEM AND METHOD FOR IDENTIFYING ALTERED CONTENT - Methods and systems for identifying altered content are described herein. The system determines a content type for an unverified content item and determines verification criteria based on the content type. The system then locates a first verified content item corresponding to the unverified content item. Based on comparing the unverified content item to the first verified content item, the system determines whether the unverified content item violates the verification criteria. If the unverified content item violates the verification criteria, the system displays a verification flag indicating that the unverified content item violates the verification criteria. If the unverified content item does not violate the verification criteria, the system displays a verification flag indicating that the unverified content item does not violate the verification criteria. | 2021-11-18 |
20210357535 | INTERACTIVE KIOSK WITH MISOPERATION PREVENTION FUNCTION - An interactive kiosk includes a machine body, a human-computer interaction interface, a magnetic induction module and a processing device. The machine body has an outer housing. The human-computer interaction interface is arranged on the machine body. The magnetic induction module and the processing device are disposed in the machine body. The processing device has a processing unit connecting to the human-computer interaction interface and the magnetic induction module. The magnetic induction module sends a magnetic induction signal to the processing unit by sensing a magnetic field of the magnetic object, and the processing unit receives the magnetic induction signal and controls the processing device to be started or shut down according to the magnetic induction signal. | 2021-11-18 |
20210357536 | HARDWARE COUNTERMEASURES IN A FAULT TOLERANT SECURITY ARCHITECTURE - A system-on-chip (SoC) is provided that includes security control registers, the security control registers including security flags for security critical assets of the SoC, wherein each security flag includes multiple bits. | 2021-11-18 |
20210357537 | SECURITY SYSTEM AND METHOD PREVENTING ROLLBACK ATTACKS ON SILICON DEVICE FIRMWARE - A chip system comprising ROM code including a bootloader which runs whenever the chip is powered on; and programmable fuse array memory storing version identifiers, NVMs in which copies of a version of bootable firmware are stored, wherein a first identifier is stored including active major number and minor numbers, signed with a private key; wherein a second identifier is stored including recovery major and minor numbers, signed with said private key; and hardware which obeys a first command by the boot ROM code to disable until next system reset, writing to the recovery NVM other than to the bootloader, and obeys a second command, to lift write protection of the recovery NVM, wherein firmware images associated with both said versions, and both said identifiers, are signed with said private key, and the boot ROM code authenticates firmware image/s and said identifiers. | 2021-11-18 |
20210357538 | HARDWARE SECURE ELEMENT, RELATED PROCESSING SYSTEM, INTEGRATED CIRCUIT, AND DEVICE - A hardware secure element includes a processing unit and a receiver circuit configured to receive data comprising a command field and a parameter field adapted to contain a plurality of parameters. The hardware secure element also includes at least one hardware parameter check module configured to receive at an input a parameter to be processed selected from the plurality of parameters, and to process the parameter to be processed to verify whether the parameter has given characteristics. The hardware parameter check module has associated one or more look-up tables configured to receive at an input the command field and a parameter index identifying the parameter to be processed by the hardware parameter check module, and to determine for the command field and the parameter index a configuration data element. | 2021-11-18 |
20210357539 | COMPUTER IMPLEMENTED SYSTEM AND METHOD OF TRANSLATION OF VERIFICATION COMMANDS OF AN ELECTRONIC DESIGN - A computer implemented method of translation of verification commands of an electronic design file of an electronic circuit defined by the electronic design file, comprising receiving, at a processor, the electronic design file defining a functional level electronic design of the electronic circuit, wherein said electronic circuit comprises at least two subsystems and said electronic circuit includes at least two configuration options for the at least two subsystems, receiving along with the electronic design file, at least one analog test harness model having at least one indirect branch contribution statement, translating said at least one indirect branch contribution statement into a plurality of direct branch contribution operators based at least in part upon said at least one analog test harness model and said electronic design file and generating a netlist for the electronic circuit based at least in part upon said translation of said at least one indirect branch contribution statement. | 2021-11-18 |
20210357540 | MATRIX SKETCHING USING ANALOG CROSSBAR ARCHITECTURES - A computer-implemented method is presented for performing matrix sketching by employing an analog crossbar architecture. The method includes low rank updating a first matrix for a first period of time, copying the first matrix into a dynamic correction computing device, switching to a second matrix to low rank update the second matrix for a second period of time, as the second matrix is low rank updated, feeding the first matrix with first stochastic pulses to reset the first matrix back to a first matrix symmetry point, copying the second matrix into the dynamic correction computing device, switching back to the first matrix to low rank update the first matrix for a third period of time, and as the first matrix is low rank updated, feeding the second matrix with second stochastic pulses to reset the second matrix back to a second matrix symmetry point. | 2021-11-18 |
20210357541 | MESH VOID SPACE IDENTIFICATION AND AUTO SEEDING DETECTION IN COMPUTER ADDED DESIGN DEFINED GEOMETRIES - Described are computer implemented techniques to select a single surface of a computer aided design (CAD) as a surface that shares a boundary with a void space that will be discretized, produce a virtual geometry item that is positioned within or about the void region to define the volume to be discretization and propagate a mesh within the defined volume by discretizing the CAD generated geometry by a discretization factor to find a first valid seed point within the CAD generated geometry that satisfies all virtual geometries taken together. | 2021-11-18 |
20210357542 | COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS - A computer-aided design (CAD) system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A CAD user interface may be generated that includes an image of a model of an article of manufacture and a customizable template. The customizable template may include user customizable design areas. One or more defined rules associated with respective customizable areas may be accessed. In response to a user selection of a default content item and a corresponding rule, content items may be automatically used to populate other template design areas and/or change a color of one or content items. Manufacturing instructions corresponding to the user customizations may be transmitted to a printing system using a file that includes location, rotation, and/or scale data. | 2021-11-18 |
20210357543 | METHOD AND SYSTEM FOR GENERATING ARTIFICIAL INTELLIGENCE-AIDED DESIGN SOLUTIONS AND TRAINING METHOD AND SYSTEM OF THE SAME - The invention relates to a method for generating design solutions using an external database ( | 2021-11-18 |