51st week of 2021 patent applcation highlights part 49 |
Patent application number | Title | Published |
20210397616 | FUNNEL ANALYSIS USING A UNIFORM TEMPORAL EVENT QUERY STRUCTURE - A method includes defining a root node for a funnel analysis query, wherein the query is structured as a graph comprising a plurality of nodes including the root node, wherein the root node comprises a point of origin for at least one funnel of the query, and wherein the root node is constructed to detect a first event that took place within a fixed first time range, defining a non-root node that is connected to the root node, wherein the non-root node is constructed to detect a second event that took place within a second time range that is defined relative to the first time range, performing a funnel analysis on a data set using the query, wherein the funnel analysis tracks an entity through a sequence of events including the first event and the second event, and initiating a remedial action in response to a funnel analysis result. | 2021-12-23 |
20210397617 | COMPUTER-IMPLEMENTED METHOD FOR KEYWORD SEARCH IN A KNOWLEDGE GRAPH - A computer-implemented method for keyword search in a data set. Data of the data set is represented by a knowledge graph. The knowledge graph comprises vertices representing entities of the data set and edges representing relations between said entities. The method comprises the following steps: receiving a search query comprising at least two entities; computing for the at least two entities of the search query a salient subset of the data set, wherein the salient subset is computed such that a structural compact subgraph exists in the knowledge graph, the structural compact subgraph connecting the at least two entities of the search query, and computing for the salient subset a structural compact subgraph of the knowledge graph which connects the at least two entities of the search query. | 2021-12-23 |
20210397618 | METHOD FOR MANAGING DATABASE - Disclosed is a computer program stored in a computer-readable medium according to an exemplary embodiment of the present disclosure. When the computer program is executed by one or more processors, the computer program allows the following operations for data caching to be performed and the operations may include an operation of generating a cache, an operation of caching at least some of the segments and at least one of records to the cache, an operation of reading the cache when receiving an inquiry request from a client, an operation of determining to read a cursor based on whether there is a segment or record corresponding to the inquiry request in the cache; and an operation of determining whether a query for at least one of a relational database and a hierarchical database is generated based on whether there is the segment or record in the cursor. | 2021-12-23 |
20210397619 | PROCESSING TECHNIQUES FOR QUERIES WHERE PREDICATE VALUES ARE UNKNOWN UNTIL RUNTIME - A query directed at a table organized into a set of batch units is received. The query comprises a predicate for which values are unknown prior to runtime. A set of values for the predicate are determined based on the query. An index access plan is created based on the set of values. Based on the index access plan, the set of batch units are pruned using a pruning index associated with the table. The pruning index comprises a set of filters that index distinct values in each column of the table. The pruning of the set of batch units comprises identifying a subset of batch units to scan for data that satisfies the query. The subset of batch units of the table are scanned to identify data that satisfies the query. | 2021-12-23 |
20210397620 | CONFIGURABLE GOVERNMENT PROCESS AUTOMATION ON MULTI TENANT PLATFORM SYSTEMS - Systems and methods relating to leveraging a cloud computing platform for use in providing a consumer with applications relating to the provision of government services. Methods for efficiently implementing rule-based database operations using a multi-tenant platform are discussed along with the automatic generation of user interfaces for such applications. | 2021-12-23 |
20210397621 | System and Method for Processing of Events - Systems and methods for processing events are disclosed. Event data comprising passive event data, active event data, or both is received. It is determined whether the received event data is available for a pattern of passive event data and active event data. In response to determining that the received event data is available for the pattern of passive event data and active event data, one or more constraints between the passive event data and the active event data are converted into one or more query terms. The query terms are used to construct at least one query. Remaining passive event data that is related to some, but not all, of the active event data is obtained using the constructed at least one query. | 2021-12-23 |
20210397622 | EFFICIENT ADAPTIVE DETECTION OF COMPLEX EVENT PATTERNS - A method comprising receiving, as input, a data stream representing events; receiving a complex event pattern (CEP) specification representing an occurrence of a CEP in said data stream based on a set of conditions and set of event attributes; applying an algorithm to generate a current CEP plan configured to determine said occurrence of said CEP, wherein said current CEP plan comprises of a series of execution steps; optimize said current CEP plan by, iteratively: (i) executing said current CEP plan, (ii) identifying, with respect to each of said execution steps, one of said conditions whose verification causes said execution step to be included in said current CEP plan, and (iii) performing a re-verification of all of said identified conditions using said updated current values; and re-applying said algorithm when said re-verification fails with respect to at least one of said identified conditions, to generate an updated CEP plan. | 2021-12-23 |
20210397623 | LEARNING APPARATUS, LEARNING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - A learning device according to the present application has an acquisition unit, a specifying unit, and a learning unit. The acquisition unit acquires the search queries, which are the search queries input by a plurality of input customers who have input the reference query and input within mutually different periods. The specifying unit specifies the categories to which the search queries input by the input customer in each period belong. The learning unit causes a model to learn a characteristic of a change in the category specified by the specifying unit. | 2021-12-23 |
20210397624 | CONTEXTUAL INSIGHT SYSTEM - Aspects of systems and methods for providing contextual and event driven insights are provided. The system monitors information about the users and their conversations. Upon receiving a natural language request for information for a topic, the system utilizes a model to extract one or more topics from the request. The system utilizes the topic to query a resource for candidate users with knowledge about the topic. The system then queries a resource to identify candidate content items associated with the topic and the candidate users. Thereafter, the system refines the candidate users and the candidate content items to identify relevant users and content items that are meaningful to the user. | 2021-12-23 |
20210397625 | Issues Recommendations Using Machine Learning - A query is received that requests issues relevant to a user. Thereafter, a plurality of issues responsive to the query are retrieved. The retrieved issues are ranked using a first machine learning model to result in a first subset of the retrieved issues. The first subset of the retrieved issues are then ranked using a second, different machine learning model to result in a second subset of the retrieved issues which are a subset of the first subset of the retrieved issues. Data can then be provided which is responsive the query and includes at least a portion of the second subset of the retrieved issues. Related apparatus, systems, techniques and articles are also described. | 2021-12-23 |
20210397626 | EXTENDED COMPUTERIZED QUERY LANGUAGE SYNTAX FOR ANALYZING MULTIPLE TABULAR DATA ARRANGEMENTS IN DATA-DRIVEN COLLABORATIVE PROJECTS - Various embodiments relate generally to data science and data analysis, computer software and systems, and wired and wireless network communications to interface among repositories of disparate datasets and computing machine-based entities configured to access datasets, and, more specifically, to a computing and data storage platform configured to provide one or more computerized tools that facilitate development and management of data projects, including implementation of extended computerized query language syntax to analyze, for example, multiple tabular data arrangements in data-driven collaborative projects. For example, a method may include generating data to present a query editor in a data project interface, receiving data representing a first query command to select one or more subsets of data, identifying in the data representing a second query command a subset of datasets from which to extract the data, and applying a query based on a first query command and a second query command. | 2021-12-23 |
20210397627 | ENTITY SELECTION TOOL SYSTEM AND METHOD - A computer server may receive an indication of a selected potential relationship and retrieve, from a use case configuration data store, an electronic record for that relationship. The first entity may then construct computer system configurations in accordance with use case parameters. The computer server may be used to evaluate the constructed computer system configurations, and an entity score result for the first entity may be stored into the use case configuration data store. The computer server may also retrieve, from a quality function deployment data store, an electronic record associated with the first entity and update a uniform scoring matrix by assigning weighted score values for the first entity in connection with a set of platform capabilities. An entity selection tool may be executed to automatically select a recommended entity based on the score results and scoring matrixes, and an indication of the recommended entity may be transmitted. | 2021-12-23 |
20210397628 | METHOD AND APPARATUS FOR MERGING DATA OF BUILDING BLOCKS, DEVICE AND STORAGE MEDIUM - The present disclosure discloses a method and apparatus for merging data of building blocks, a device and a storage medium, and relates to the field of electronic map and big data. A specific implementation comprises: acquiring data of building blocks of a target work region; dividing the target work region containing the data of building blocks into at least one target region based on a preset geographic isolation attribute; dividing each target region into at least one grid region based on a direction feature of a building block obtained by performing a direction feature extraction on the data of building blocks; and determining a relative positional relationship between corresponding building blocks based on data of building blocks in each grid region, and merging data of building blocks of at least two building blocks having a preset positional relationship. | 2021-12-23 |
20210397629 | METHOD OF FACILITATING CONTACT BETWEEN MUTUALLY INTERESTED PEOPLE - A computer-readable non-transitory physical storage medium having stored thereon machine-executable code for electronically facilitating contact between mutually interested entities, said machine-executable code to be executed by a microprocessor, said machine executable code which when executed by said microprocessor causes the microprocessor to perform operations including suggesting to a first user other users that first user may be interested in, where the suggested other users are filtered based on their location, causing a device to display a graphical user interface (GUI) for the first user to input a rating of the first user's level of interest in one or more respects in at least one other user, accepting the first user's level of interest rating via the GUI while not displaying the first user's rating to the at least one other user, and electronically notifying a pair of users that have rated each other above a threshold level. | 2021-12-23 |
20210397630 | CONTENT RESONANCE - A real-time messaging platform and method is disclosed which classifies messages in accordance with a combination of user engagement events as modified to reflect the temporal structure of the user engagement events. A message can be assigned a metric based, for example, on a weighted combination of user engagement rates, decayed with time to reflect an intuition that recent interactions by one or more users with the message will have a greater impact than older interactions with the message. Different types of interaction by one or more users with the message can be assigned different weights when the different engagement events are combined and, also, can be assigned different temporal characteristics. | 2021-12-23 |
20210397631 | DETECTING RELATIONSHIPS ACROSS DATA COLUMNS - There is a need for more effective and efficient detection of cross-data-column relationships. This need can be addressed by, for example, techniques for detecting cross-data-column data relationships that utilize at least one of feature-based similarity models and deep-learning-based similarity models. The cross-data-column data relationships may be displayed to an end-user using a cross-column relationship detection user interface. | 2021-12-23 |
20210397632 | GEOGRAPHIC INFORMATION SYSTEM ENGINE SYSTEM, IMPLEMENTATION METHOD, DEVICE AND STORAGE MEDIUM THEREOF - A geographic information system engine system, an implementation method, a device and a storage medium thereof, which relate to the fields of intelligent search and cloud computing, are disclosed. The system may include: an underlying data source supporting N different data sources and a core engine layer, N being a positive integer greater than one; the core engine layer including a full-text search layer configured for serving as a cache for full-text search, implementing data consistency with the underlying data source through a distributed locking mechanism, and ensuring data timeliness by micro-batch updating; and a service providing layer configured for providing various services based on the full-text search layer and the underlying data source. | 2021-12-23 |
20210397633 | SYSTEM, METHOD AND ARCHITECTURE FOR A DOCUMENT AS A NODE ON A SOCIAL GRAPH - A content management system may instantiate, from the same super class defined in a database schema, principal objects representing users and groups and content objects representing documents and folders. The principal objects and the content objects share the same social interaction functions. When a content object is modified, the system can create a message in which the content object identifies itself as a first person, update a message table such that any follower of the content object is notified of the message, and update a profile or feed associated with the content object. At least because content objects can “socialize” like principal objects, the system can generate a social graph containing content objects as nodes, map relationships among principal objects and content objects, and make recommendations to perhaps change/enhance such relationships. | 2021-12-23 |
20210397634 | AUTOMATED PROCESSING OF UNSTRUCTURED TEXT DATA IN PAIRED DATA FIELDS OF A DOCUMENT - An apparatus comprises a processing device configured to select a first data field of a first type that is associated with a second data field of a second type in a document, to determine an embedding of terms of unstructured text data in the first data field and to identify a subset of paired data fields from an unstructured text database based at least in part on metrics characterizing similarity between (i) the embedding of terms in the first data field and (ii) embeddings of terms in data fields of the first type in the paired data fields. The processing device is further configured to determine syntactic differences between the unstructured text data in the first data field and the identified subset of paired data fields, and to provide recommendations for unstructured text data to fill the second data field in the document based on the syntactic differences. | 2021-12-23 |
20210397635 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM - An information processing device includes: a memory; and a processor coupled to the memory and configured to: obtain an identifier of a process being executed in the information processing device; identify a data processing tool corresponding to the process on the basis of the identifier of the process; | 2021-12-23 |
20210397636 | TEXT OBJECT MANAGEMENT SYSTEM - Systems and methods are disclosed for managing data objects that include text content that are stored in a database. The management of text objects includes determining that a condition for a data object associated with a user has been satisfied. In response, a relevancy score for the data object is generated. The relevancy score is based on the text content of the data object and a density estimation model associated with the user. The density estimation is generated using a plurality of data objects that each include text content and that are associated with a plurality of users of a service associated with the data objects, and using a set of the plurality of data objects that are associated with the user. Irrelevancy actions or relevancy actions may be performed to the data object based on the relevancy score. | 2021-12-23 |
20210397637 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND COMPUTER READABLE STORAGE MEDIUM - An information processing device, an information processing method, a computer readable storage medium are provided. The information processing device comprises processing circuitry configured to: construct, for each of a plurality of indexes, a sample unit set for the index based on a plurality of minimum labeled sample units related to the index which are obtained and labeled from an original sample set; and extract, for at least a part of the constructed plurality of sample unit sets, a minimum labeled sample unit from each sample unit set, and generate a labeled training sample based on the extracted minimum labeled sample unit. A sample unit set is constructed based on minimum labeled sample units that are labeled manually, and a labeled training sample is generated automatically based on such sample unit sets, thereby generating the labeled training sample automatically to a certain degree, and reducing manual participation. | 2021-12-23 |
20210397638 | SYSTEM AND METHOD FOR CYBERBULLYING DETECTION - A method for identifying cyberbullying may include obtaining content from a first electronic device associated with a first user; identifying, using a machine learning model, the cyberbullying of the first user based on the content obtained from the first electronic device; and providing anonymized information related to the cyberbullying to a second electronic device associated with a second user | 2021-12-23 |
20210397639 | CLUSTERING TOPICS FOR DATA VISUALIZATION - Systems and methods for receiving a set analyzing case records by extracting case text, performing natural language processing, and allocating each case text to a topic. Topics may be clustered to identify meaningful patterns that are reflected in numerous case records. The data resulting from the analysis may be visualized on a dashboard to allow users to identify and explore these patterns. | 2021-12-23 |
20210397640 | SYSTEMS AND METHODS FOR EXECUTING A SUPPLEMENTAL FUNCTION FOR A NATURAL LANGUAGE QUERY - Systems and methods are described to address shortcomings in conventional conversation systems by executing a customized supplemental function for a natural language query based on the user's profile. In some aspects, the systems and methods receive a user query for a media asset, determine a query template in the user's profile matching the user's query, and identify and execute a supplemental function corresponding to the query template in addition to responding to the user's query. The user's profile is customized on the user's usage patterns of an interactive media guidance application. By monitoring the user's usage patterns and learning from the user's actions in conjunction with the user's natural language queries on which supplemental functions to execute, the interactive media guidance application may provide a smarter and more efficient user experience. | 2021-12-23 |
20210397641 | Presentation Features for Performing Operations and Selecting Content - The present disclosure generally relates to techniques for presenting operations in a presentation. A technique is provided for allowing a user to insert media items on consecutive slides. During a presentation mode, the media items are determined to be two instances of a same media item, and matched such that the media item plays continuously across multiple slides. Another technique is provided to allow a user to utilize a user input to override a linearly-defined set of actions within a presentation. Another technique is utilized to temporarily select a visually obstructed object in a graphic editing interface such that the visually obstructed object may be manipulated during the temporary selection mode. | 2021-12-23 |
20210397642 | SYSTEMS AND METHODS FOR SELECTING DIGITAL DATA FOR ARCHIVAL - Data processing engines are provided that include an electronic display, a decoding functionality selector, a decoding functionality generator in communication with the decoding functionality selector, and a decoding functionality verifier, each configured as described anywhere herein. Related methods of automatically constructing platform-independent decoders for encoded digital data encoded in particular formats are also provided as described anywhere herein. | 2021-12-23 |
20210397643 | MEDIA FILE SYSTEMS AND METHODS OF STORING MEDIA FILES IN A MEDIA FILE SYSTEM - A media file system, apparatus, computer program product and method are provided for storing a file relationship graph and media data files. An exemplary method includes obtaining a new media file and determining the one or more portions of essence data from which the new media file is derived. The method further including generating a new materials data file for the new media file indicating the determined one or more portions of essence data. Moreover, storing the new materials data file in the media file system, and updating the file relationship graph using the new materials data file. | 2021-12-23 |
20210397644 | SPEECH TO MEDIA TRANSLATION - According to one embodiment of the present invention, a system for speech to media translation includes at least one processor. The at least one processor may be configured to receive an input in a first language and receive a command to translate the input. The input is one of text and audio. The at least one processor may be further configured to search an image database based on the input to retrieve contextually relevant images. The at least one processor may be configured to communicate the retrieved contextually relevant image to a target user. | 2021-12-23 |
20210397645 | IMAGE SEARCH METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM - An image search method is provided. In the method, an image selection page of a messaging application is displayed. An input image for a search is determined based on an operation performed by a user on the image selection page. A search is performed for at least one output image similar to the input image based on a plurality of types of image characteristics that indicate levels of similarity between images. Each of the ay least one output image is determined to be similar to the input image based on at least one of the types of image characteristics. A search result list is generated according to the at least one output image. Further, the search result list is displayed. | 2021-12-23 |
20210397646 | METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM FOR PROCESSING VISUAL DATA OF DEEP MODEL - The disclosure provides a method and an apparatus for processing visual data of a deep model, and an electronic device. The method includes: determining a user identifier in a request of displaying a workspace in response to acquiring the request; acquiring a set of historical visual data associated with the user identifier; and displaying the set of historical visual data in a page of a workspace of a user corresponding to the user identifier. | 2021-12-23 |
20210397647 | VIRTUAL PHOTOS LIBRARY - Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library. | 2021-12-23 |
20210397648 | A METHOD AND SYSTEM FOR CLASSIFYING FOOD ITEMS - The present invention relates to a method for classifying food items. The method includes the steps of: capturing one or more sensor data relating to a food item event; and classifying the food item, at least in part, automatically using a model trained on sensor data. A system and software are also disclosed. | 2021-12-23 |
20210397649 | RECOGNITION APPARATUS, RECOGNITION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A recognition apparatus | 2021-12-23 |
20210397650 | RAPID VIDEO SEARCH SYSTEM AND METHOD OF USING THE SAME - A method for searching a digital video recording is disclosed. The method includes receiving a video portion count associated with the digital video recording. The method further includes displaying in a graphical user interface (GUI) a number of sequential digital video images from the digital video recording in response to the video portion count to obtain displayed digital video images. The number of sequential digital video images is associated with a number of sequential portions of the digital video recording. | 2021-12-23 |
20210397651 | ESTIMATING SOCIAL INTEREST IN TIME-BASED MEDIA - Social media content items are mapped to relevant time-based media events. These mappings may be used as the basis for multiple applications, such as ranking of search results for time-based media, automatic recommendations for time-based media, prediction of audience interest for media purchasing/planning, and estimating social interest in the time-based media. Social interest in time-based media (e.g., video and audio streams and recordings) segments is estimated through a process of data ingestion and integration. The estimation process determines social interest in specific events represented as segments in time-based media, such as particular plays in a sporting event, scenes in a television show, or advertisements in an advertising block. The resulting estimates of social interest also can be graphically displayed. | 2021-12-23 |
20210397652 | METHOD AND APPARATUS FOR PRODUCING VIDEO MATERIAL, ELECTRONIC DEVICE AND COMPUTER READABLE MEDIUM - A method for producing a video material is provided. The method may include: acquiring, in response to an operation of inserting a label triggered by a user, a timestamp of a currently played video image in an original video; acquiring label information added by the user for the video image; and associating and integrating the label information, the timestamp and video data of the original video to generate an integrated video material carrying the label information. This method facilitates adding the label information while retaining the integrity of the original video. | 2021-12-23 |
20210397653 | METHOD AND SYSTEM FOR IDENTIFYING AND DISCOVERING RELATIONSHIPS BETWEEN DISPARATE DATASETS FROM MULTIPLE SOURCES - A graph-based data cataloging system, product and method that structures expert knowledge and statistically driven data analytics into a system-based framework for finding and relating enhanced metadata on subject-relevant, curated datasets from disparate, externally held data sources is shown. Displayed across a knowledge graph of nodes of datasets linked by their metadata attributes, the system simplifies the search and retrieval of multiple datasets of relevance to a user's technical, content, and resource-driven needs. | 2021-12-23 |
20210397654 | TARGETED PARTIAL RE-ENRICHMENT OF A CORPUS BASED ON NLP MODEL ENHANCEMENTS - Techniques for targeted partial re-enrichment include determining that at least one natural language processing (NLP) request is associated with at least one surface form, the NLP request being for a corpus, a database comprising preexisting annotations associated with the corpus. An index query related to the at least one surface form is performed to generate index query results, the index query results including identification of portions of the corpus affected by the NLP request. A scope of the NLP request related to the database is determined based on the index query results, the scope including identification of impacted candidate annotations of the preexisting annotations affected by the NLP request. An NLP service is performed on the corpus according to the scope and the portions, thereby resulting in updates. The updates are committed to the database associated with the corpus. | 2021-12-23 |
20210397655 | SECURE HIERARCHICAL PROCESSING USING A SECURE LEDGER - Disclosed is a system and method for processing data using blockchain technology. The system includes a memory having programmable instructions stored thereon that, when executed by a processor, cause the system to: authenticate one or more sensors in anticipation of receiving component data; receive component data, upon successful authentication; store the component data locally or to a cloud-based server and/or calculate a root value for the component data; store or embed the root value with the stored component data; condense the component data and link the condensed component data to the stored component data via the root value. The system further includes instructions to log the condensed data, including the root value, to a ledger, and to identify a tag or transaction id corresponding to the logging event for subsequent retrieval of the condensed data using the tag or transaction id. | 2021-12-23 |
20210397656 | SYSTEM AND METHOD FOR MODELING, FUZZY CONCEPT MAPPING, CROWD SOURCED SUPERVISION, ENSEMBLING, AND TECHNOLOGY PREDICTION - The invention provides a system and method for providing ttx-based categorization services and a categorized commonplace of shared information. Currency of the contents is improved by a process called conjuring/concretizing wherein users' thoughts are rapidly infused into the Map. As a new idea is sought, a goal is created for a search. After the goal idea is found, a ttx is concretized and categorized. The Map provides for modeling where nodes are objects. The Map nodes also serve as binding points to other modeling paradigms such as spreadsheet cells. The needs met by such a Map are prior art searching, competitive environmental scanning, competitive analysis study repository management and reuse, innovation gap analysis indication, novelty checking, technology value prediction, investment area indication and planning, and product technology comparison and feature planning | 2021-12-23 |
20210397657 | FAST OBJECT LISTING IN GEOGRAPHICALLY DISTRIBUTED DATA STORAGE ENVIRONMENT - The described technology is generally directed towards quasi-listing table entries that facilitate the efficient return of an object list in response to a query for relevant objects in a data storage system. A quasi-listing table entry is created when an object is created, and subsequently converted to a normal listing table entry. A normal listing table entry is converted to a quasi-listing table entry when an object is deleted, with the quasi-listing table entry subsequently deleted. When an object list request is received, a normal listing table entry can be used directly to add to the object list; only if a quasi-listing table entry is encountered (before it can be converted or deleted) does the object table need to be accessed to determine if the object actually exists. This eliminates most object table accesses, including those in remote geographic zones, thereby making object listing significantly more efficient. | 2021-12-23 |
20210397658 | Systems and Methods for Enabling a User to Operate on Displayed Web Content via a Web Browser Plug-In - A method and apparatus is disclosed that transmits a plug-in module to a web browser of a client computer. The web browser displays web content in a main window. The plug-in module, when activated, causes the web browser to display a user interface to a user of the client computer. The user interface is separate from the main window of the web browser, displays at least a portion of the web content, and is configured to enable the user to operate on the displayed at least a portion of the web content. | 2021-12-23 |
20210397659 | AUTO SEED: AN AUTOMATIC CRAWLER SEEDS ADAPTATION MECHANISM - A computer-implemented method for automatically adjusting a Uniform Resource Locator (URL) seed list. The method includes crawling for documents based on a seed URL list. The method generates relations data from the documents using a Natural Language Processing (NLP) model. The method analyzes the relations data using an auto-seed model. The method modifies the seed URL list. | 2021-12-23 |
20210397660 | SYSTEMS AND METHODS FOR ENHANCING SEARCH RESULTS WITH INPUT FROM BRANDS, CITIES AND GEOGRAPHIC LOCATIONS - Systems and methods are provided for a brand search ecosystem for brands and branded products, locations, features, and services to enhance search results with real-time content and input on business rules, algorithms, and information from brandholders and provided over various modalities, including phones, TVs, kiosks, and speech recognition. The systems and methods include a brand name database including a plurality of brands and brandholders, bidders, and other content providers associated with respective brands. The search engine receives search requests from users, accesses the brand name database, and provides search results to the users based on a variety of factors, including the identity, search history, membership in a brand's rewards programs, aggregated feedback and ratings of others users, and direct feedback and ratings of the user conducting the search. The systems and methods also enable and process incentives to brands, bidders, content providers, and end users to encourage usage and real-time feedback, ratings, and other information on brands, branded products and services, and specific branded locations to further enhance search results. | 2021-12-23 |
20210397661 | A SYSTEM AND METHOD OF RECONSTRUCTING BROWSER INTERACTION FROM SESSION DATA HAVING INCOMPLETE TRACKING DATA - A system for reconstructing browser interaction data from session data having incomplete tracking data is described. The system comprises: a data ingestion engine for ingesting data from a plurality of different data sources including an on-line user-interaction tracking source which provides the session data relating to different users' interaction with a website, some of the session data including tracking identifiers, and a non-interaction tracking source for providing non-session data relating to user activity other than session data; a data store for storing the ingested data; a data cleansing engine for cleansing the ingested data, the data cleansing engine comprising: a data re-evaluation engine for evaluating the non-session data and recovering user identifiers within the non-session data; and a path view building engine for linking together session data from different user interaction sessions to form linked session data using the tracking identifiers within the session data; wherein the data re-evaluation engine is arranged to compare the recovered user identifiers from the non-session data with user identifiers associated with the session data, and to associate any unlinked session data not previously linked with the linked session data, with linked session data which has an association via the recovered user identifiers, and wherein the path view building engine is arranged to link together any unlinked session data with linked session data having an association via the recovered user identifiers. | 2021-12-23 |
20210397662 | SEARCH NEEDS EVALUATION APPARATUS, SEARCH NEEDS EVALUATION SYSTEM, AND SEARCH NEEDS EVALUATION METHOD - By showing information that can infer the search intent, it will be possible to develop products and create Web pages that match the search intent. | 2021-12-23 |
20210397663 | DATA REDUCTION IN A TREE DATA STRUCTURE FOR A WIREFRAME - A second tree data structure (“second tree”) is formed from a first tree data structure (“first tree”). The first tree relates to a displayable page. The second tree relates to a displayable wireframe of the page. A method comprises: for each node in the first tree, determining if the node meets at least one predetermined node type rule (B, 312); and based at least on a result of the determining, including the node, in the second tree (E, 328, 330). | 2021-12-23 |
20210397664 | METHOD AND SYSTEM FOR PREDICTING CONTENT BASED RECOMMENDATIONS - The embodiments herein provide a method for predicting content based recommendations. The method includes recognizing, by a first electronic device ( | 2021-12-23 |
20210397665 | METHOD AND APPARATUS FOR GENERATING A SEARCH QUERY FOR A SEARCH ENGINE - Aspects of the subject disclosure may include, for example, detecting, by a processing system including a processor, access to a search engine by a user; obtaining a user model associated with the user; generating, by the processing system, a search query according to the user model; and presenting an overlay on a graphical user interface of the search engine, wherein the graphical user interface includes the search query field, and wherein the overlay includes the search query. Other embodiments are disclosed. | 2021-12-23 |
20210397666 | METHOD AND SYSTEM FOR PROVIDING ORGANIZED CONTENT - The present teaching relates to providing content to a user. Information related to a user is obtained. One or more channels are determined for the user from a plurality of channels based on the information, wherein each of the plurality of channels includes one or more online content items. A personal interest space is established associated with the user based on the information related to the user and the one or more channels. Content is provided in the one or more channels to the user based on information related to the personal interest space. | 2021-12-23 |
20210397667 | SEARCH TERM RECOMMENDATION METHOD AND SYSTEM BASED ON MULTI-BRANCH TREE - The invention relates to a search term recommendation method and system based on a multi-branch tree. The method comprise that steps that: A, a multi-branch tree term chain data generation process: splitting each hot term into a plurality of independent words, generating a term chain according to the sequence of the words from first to last in the hot term, each word is a node in the term chain, and nodes corresponding to the same word in different term chains are used as public nodes to generate multi-branch tree term chain data; B, a search term recommendation process: searching multi-branch tree term chain data accord to that currently input terms, taking a term chain that matches the inputted words as a recommended term. | 2021-12-23 |
20210397668 | SYSTEMS AND METHODS FOR DETERMINING CREDIBILITY AT SCALE - An example system may include instructions to control processor(s) to receive text from content of a first web page, determine, based on the content, a first title topic indicator, a first sentiment indicator, and a first text subjectivity indicator, apply the first title topic indicator, the first sentiment indicator, and the first text subjectivity indicator to a credibility machine learning model to generate a first content credibility score and a first content bias score for the text of the first web page, the credibility machine learning model being trained on text from other web pages using known title topic indicators, known sentiment indicators, and known text subjectivity indicators, and known credibility scores and bias scores, generate a first graphical representation for the first content credibility score and the first bias credibility score, and provide the graphical representation to a first digital device. | 2021-12-23 |
20210397669 | CLUSTERING WEB PAGE ADDRESSES FOR WEBSITE ANALYSIS - A machine learning clustering process is trained. Web pages of a website are clustered. User flow data associated with a first browsing session at the website is obtained. The user flow data includes a plurality of web page identifiers (e.g., URLs). A web page record for each of the web page identifiers is generated. Each web page record includes words of the corresponding web page identifier. Clusters of web page identifiers previously output from the trained machine learning clustering process are received. For each of the web page records, a cluster of web page identifiers is identified by mapping the web page record to one of the clusters of web page identifiers using the machine learning clustering process. A directed graph representative of the first browsing session is constructed. One or more nodes of the directed graph are the identified clusters of web page identifiers. | 2021-12-23 |
20210397670 | User-directed suggestions - A computer-implemented suggestion engine suggests documents to a requesting user based on keywords in the documents and document metadata. The keywords may also be presented to the user, with each keyword associated with a visual indicator indicating the importance of the keyword relative to the other keywords. The user can manipulate the visual indicator for a keyword to adjust the relative importance of the keyword and the system will accordingly revise the documents suggested to the user. | 2021-12-23 |
20210397671 | METHOD AND DEVICE FOR PROCESSING RESOURCE DESCRIPTION FILE AND FOR OBTAINING PAGE RESOURCE - A method and a device for processing resource description file and for obtaining page resource are provided. The method for processing the resource description file includes: receiving the resource description file inserted with a monitoring script fed back by the node server; when the monitoring script is executed in the client terminal, monitoring a resource link generated by the client terminal in a process of parsing the resource description file, determining whether the resource link contains an external link, and if contains, rewriting the external link into an internal link, and replacing the corresponding external link in the resource link with the rewritten internal link; and writing the rewritten resource link into the resource description file, and according to the resource description file, obtaining page resource of the target page. | 2021-12-23 |
20210397672 | ACCURATE AND EFFICIENT RECORDING OF USER EXPERIENCE, GUI CHANGES AND USER INTERACTION EVENTS ON A REMOTE WEB DOCUMENT - The present disclosure describes how to capture events (e.g., changes and user interactions) of a Web document and combine those changes with the original DOM displayed to accurately and efficiently enable a replay engine to redisplay the DOM, changes, and user interactions which occurred within a user's browser. The data collected from a client-side HTML DOM capture engine can be combined with a minimal amount of contextual information to a replay engine so as to accurately and efficiently replay a session of a plurality of web documents. | 2021-12-23 |
20210397673 | METHOD AND SYSTEM FOR NAVIGATION CONTROL - In general, the technology relates to navigation control in a web application that includes receiving an event of a navigation trigger in a first page of a web application, and obtaining, in response to the event, an expression for the navigation trigger. The technology further includes gathering data from a first data source specified by the expression. The technology further includes evaluating the expression using the data to select a second page from a set of possible target pages, where each of the possible target pages is separately pre-stored in a data repository. The technology further includes presenting the second page. | 2021-12-23 |
20210397674 | SYSTEMS AND METHODS FOR INVERTING THE CHIRP Z-TRANSFORM IN O(n log n) TIME AND O(n) MEMORY - Embodiments of the present disclosure describe an efficient O(n log n) method that implements the Inverse Chirp Z-Transform (ICZT). This transform is the inverse of the well-known forward Chirp Z-Transform (CZT), which generalizes the fast Fourier transform (FFT) by allowing the sampling points to fall on a logarithmic spiral contour instead of the unit circle. Thus, the ICZT can be viewed as a generalization of the inverse fast Fourier transform (IFFT). | 2021-12-23 |
20210397675 | COMPUTING IN MEMORY CELL - A computing in memory (CIM) cell includes a memory cell circuit, a first semiconductor element, a second semiconductor element, and a third semiconductor element. A first terminal of the first semiconductor element is coupled to a first computing bit-line. A control terminal of the first semiconductor element is coupled to a computing word-line. A control terminal of the second semiconductor element is coupled to the memory cell circuit. A first terminal of the second semiconductor element is coupled to a second terminal of the first semiconductor element. A first terminal of the third semiconductor element is coupled to a second terminal of the second semiconductor element. A second terminal of the third semiconductor element is coupled to a second computing bit-line. A control terminal of the third semiconductor element receives a bias voltage. | 2021-12-23 |
20210397676 | OUTSOURCED DATA PROCESSING - An apparatus comprising at least one processing core ( | 2021-12-23 |
20210397677 | CONFIGURABLE CODE SIGNING SYSTEM AND METHOD - A system is provided for configurably signing a secure data image that includes software code that interprets cryptographic atomic code. In the system, a code signing engine includes an interpreter that interprets atomic code signing operations presented in a recipe defined by a system administrator according to configuration parameter values supplied with the input image. | 2021-12-23 |
20210397678 | RIGHT-HOLDER TERMINAL, USER TERMINAL, RIGHT-HOLDER PROGRAM, USER PROGRAM, CONTENT USAGE SYSTEM, AND CONTENT USAGE METHOD - Content data is registered in a file management system | 2021-12-23 |
20210397679 | SYSTEM AND METHOD FOR SECURING A BROWSER AGAINST FONT USAGE FINGERPRINTING - In a method for securing a web browser, display instructions for displaying web content are received from a content server by a web browser operating on a client computing device. The web browser creates a document object using the display instructions and determines from the document object whether one or more of the display instructions meet font profiling criteria selected to identify attempts to profile font display characteristics of the web browser. Responsive to a determination that font profiling criteria are met, the web browser alters a character display of the document object and implements the document object for displaying the web content on the client computing device. | 2021-12-23 |
20210397680 | SYSTEMS AND METHODS FOR DYNAMICALLY ENFORCING DIGITAL RIGHTS MANAGEMENT VIA EMBEDDED BROWSER - Embodiments described include systems and methods for incorporating tags in content of network applications. An embedded browser, which is executable on one or more processors of a client device, may detect content from a network application accessed via the embedded browser. A DRM engine of the embedded browser identifies a DRM scheme for the network application from the plurality of DRM schemes and according to the network application. The DRM engine generates a DRM tag for the content according to the DRM scheme identified for the network application. The DRM tag includes a classification of the content. The DRM engine incorporates the DRM tag into the content for managing usage of the content according to the classification. | 2021-12-23 |
20210397681 | USER INTERFACES FOR MANAGING SECURE OPERATIONS - The present disclosure generally relates to methods for providing an option (e.g., a selectable option) to initiate a secure operation (e.g., a secure operation), such methods using a computer system and an external device. | 2021-12-23 |
20210397682 | Secure Service Interaction - A system for allowing a user to interact with a secure service, the system including an interaction processing system including one or more electronic processing devices configured to receive security data from a user client device, the security data being usable to interact with the secure service and being encrypted using a passcode, store the security data, receive from a user interface system, on behalf of the user, an indication of a service interaction request, an access token indicative of the passcode, retrieve the security data using the access token and use the security data to interact with the secure service on behalf of the user and in accordance with the service interaction request. | 2021-12-23 |
20210397683 | System and Method for Continuous User Authentication - Methods and systems for continuously authenticating a user of a device by comparing current sensor data of the device being used with a fingerprint generated from sensor data collected from the device during use by an authorized user. A likelihood value, indicating the likelihood that the user is an authorized user of the device, is generated and the user is authenticated when the likelihood value is determined to be acceptable. | 2021-12-23 |
20210397684 | BIOMETRIC AUTHENTICATION SMART CARDS - A smart card is provided. The smart card includes a peripheral circuit configured to control a fingerprint sensing array and generate a raw image, an authentication information processing module configured to process the raw image into fingerprint information for verification, a security module configured to determine whether the fingerprint information for verification matches registered fingerprint information to determine usage approval or disapproval for a payment request, and an active shield overlapping the security module. The peripheral circuit, the authentication information processing module, and the security module are integrated into one chip. | 2021-12-23 |
20210397685 | AUTHENTICATION CANDIDATE EXTRACTION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION CANDIDATE EXTRACTION METHOD, AND PROGRAM - It is an object of the present invention to protect authentication data while ensuring high response performance. An authentication candidate extraction apparatus comprises a biometric information input part that receives biometric information of a to-be-authenticated subject, moving from a first spot to a second spot, acquired at the first spot; a feature information storage part that stores feature information used for authentication of the to-be-authenticated subject; a candidate selection part that selects a feature information candidate to be used for the authentication processing by means of a predetermined secure computation scheme using features extracted from the biometric information acquired at the first spot; and a feature information transmission part that transmits the extracted feature information candidate to an authentication apparatus that performs authentication processing using biometric information of the to-be-authenticated subject acquired at the second spot. | 2021-12-23 |
20210397686 | Audio Control Method and Electronic Device - A method includes receiving a first audio signal when an electronic device is locked, where the first audio signal includes a first voice signal of a user, and the first voice signal includes a keyword for requesting the electronic device to perform a first operation, performing voiceprint recognition on the first audio signal to determine a score of the first audio signal, unlocking the electronic device and performing the first operation when the score is greater than or equal to a first threshold, prompting the user to perform security authentication in a manner other than a voice manner when the score is less than the first threshold and greater than a second threshold, and unlocking the electronic device and performing the first operation when the security authentication performed by the user succeeds. | 2021-12-23 |
20210397687 | METHOD FOR AUTHENTICATING A USER ON CLIENT EQUIPMENT - A method of authenticating a user on client equipment, the user equipped with a personal terminal, the method wherein it comprises implementing by data processing means in said client equipment the following steps: (a) When said user's personal terminal is in proximity to said client equipment, receiving from the terminal and temporarily storing on data storage means in the client equipment: a reference biometric data item of the user; and at least one alphanumeric user authentication data item; stored on the data storage means in the terminal; (b) Identifying said user via biometric recognition from a candidate biometric data item of the user and the reference biometric data item(s) stored on the data storage means in the client equipment; (c) Using at least one alphanumeric authentication data item of the identified user stored on the data storage means in the client equipment, for authentication of said user. | 2021-12-23 |
20210397688 | TRUSTED HARDWARE-BASED IDENTITY MANAGEMENT METHODS, APPARATUSES, AND DEVICES - Embodiments of the present specification disclose trusted hardware-based identity management methods, apparatuses, and devices. One method comprising: determining personal identity information of a user of a trusted hardware; determining hardware identifier information of the trusted hardware; generating a decentralized identifier (DID) binding request based on the personal identity information and the hardware identifier information, wherein the DID binding request is configured to request to establish a corresponding relationship between a DID of the user and the trusted hardware; and sending the DID binding request to a decentralized identity service (DIS). | 2021-12-23 |
20210397689 | Input Method and Electronic Device - Embodiments of this application provide an input method. The input method may be implemented in an electronic device that has a fingerprint collection device, and the method includes: when a text input application runs, obtaining, by the electronic device, a fingerprint of a user on a touchscreen; determining, by the electronic device when the fingerprint is a prestored registered fingerprint, a target lexicon associated with the fingerprint; and providing, by the electronic device by using the target lexicon, at least one candidate word corresponding to a current input event. | 2021-12-23 |
20210397690 | METHODS AND SYSTEMS FOR A VOICE ID VERIFICATION DATABASE AND SERVICE IN SOCIAL NETWORKING AND COMMERCIAL BUSINESS TRANSACTIONS - Devices and methods to track contact between persons using acoustic voiceprint identification from stored audio signals are presented herein. | 2021-12-23 |
20210397691 | AUTHENTICATION SYSTEM, AND INFORMATION RECORDING MEDIUM - A management device calculates, from access information transmitted from a token terminal and a site seed assigned to a server, a user seed, and registers the user seed in the token terminal. The token terminal obtains a share seed, calculates a key code from the share seed and the user seed, and presents the key code to the user. When the user enters the key code to an access terminal, the access terminal transmits, to the server, a request having the key code specified. The server obtains access information relating to the transmitted request, calculates a checkup seed from the access information and the site seed assigned to the server, obtains a share seed independently from the token terminal, calculates a checkup code from the share seed and the checkup seed, and sets a necessary condition for sign-in that is consistent between the key code and the checkup code. | 2021-12-23 |
20210397692 | INDICATION FOR MULTI-FACTOR AUTHENTICATION - An input device configured for multi-factor authentication. The input device includes a plurality of sensor electrodes, one or more light sources, and an authentication component. The plurality of sensor electrodes is configured for capacitive sensing in a sensing region of the input device. The one or more light sources are configured to illuminate at least a portion of the sensing region of the input device. The authentication component is configured to receive a first authentication input via a first authentication device, determine whether the first authentication input matches a first credential of an authorized user, and selectively activate the one or more light sources based at least in part on whether the first authentication input matches the first credential of an authorized user. | 2021-12-23 |
20210397693 | METHOD AND DEVICE FOR MULTI-FACTOR AUTHENTICATION ON A CAPACITIVE AREA SENSOR - A method for multi-factor authentication on a device with a capacitive area sensor is provided in which a device with an electrically conductive structure on a non-conductive substrate represents a first authentication factor and information for the execution of an input sequence on the device represents a second authentication factor. Authentication can be performed by means of a comparison with reference data, in accordance with the likelihood with which a signal detected by the area sensor was generated by a combination of the first and second authentication factors. A device, a system and a kit for executing the method for multi-factor authentication on a capacitive area sensor.are provided. | 2021-12-23 |
20210397694 | APPLICATION EXTENSION-BASED AUTHENTICATION ON A DEVICE UNDER THIRD PARTY MANAGEMENT - Techniques are disclosed to provide application extension-based authentication on a device under third party management. In various embodiments, a unique identifier associated with an authentication app is stored on the device. An app extension framework that enables a native app to request, via an app extension associated with the authentication app, access to a service with which the native app is associated is provided. The authentication app is configured to use the unique identifier to determine a security posture of the device and to grant or deny access to the service based at least in part on the security posture of the device. | 2021-12-23 |
20210397695 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a controller that, in response to capturing of an operation target and an authentication object by an image capturing unit, controls notification of information used for operating the operation target. | 2021-12-23 |
20210397696 | DATA SECURITY SYSTEM FOR ANALYZING HISTORICAL AUTHENTICATION ENTRY ATTEMPTS TO IDENTIFY MISAPPROPRIATION OF SECURITY CREDENTIAL AND ENFORCE PASSWORD CHANGE - Embodiments of the invention are directed to a system, method, or computer program product structured for identifying potential misappropriation attempts into a technology resource and enforcing a credential lockout. In some embodiments, a system is structured for receiving a user credential associated with a first log-on attempt to access a technology resource, determining whether the user credential matches a stored valid credential, and, if it does not match, performing a misappropriation assessment. The misappropriation assessment includes evaluating and weighting a plurality of potential misappropriation factors, determining a misappropriation score from the weighted plurality of potential misappropriation factors, and adding the misappropriation score to a cumulative misappropriation score for the technology resource. The system is also structured for determining whether the cumulative misappropriation score has reached or exceeded a threshold and, if it has, enforcing a credential lockout for the technology resource. | 2021-12-23 |
20210397697 | SYSTEMS AND METHODS FOR DETECTING STORED PASSWORDS VULNERABLE TO COMPROMISE - Disclosed herein are systems and method for detecting passwords vulnerable to compromise. In one exemplary aspect, a method comprises identifying a plurality of files in at least one storage device of an organization. For each respective file in the plurality of files, in response to determining that the respective file type is in the database of vulnerable file types, the method comprises parsing text in the respective file and identifying, for the respective file, at least one demographic associated with the organization. The method further comprises retrieving dictionaries and expressions specific to the at least one demographic and determining the text in the respective file comprises a password using the retrieved dictionaries and expressions of the at least one demographic. In response to determining that the text comprises the password, the method comprises generating a security alert for an administrator of the storage device. | 2021-12-23 |
20210397698 | SYSTEM AND METHOD FOR REMOTE ATTESTATION IN TRUSTED EXECUTION ENVIRONMENT CREATION USING VIRTUALIZATION TECHNOLOGY - System and method for performing a remote attestation for creation of a trusted execution environment (TEE) using a virtual secure enclave device running in a virtualized environment utilizes a trusted bootloader appliance in a TEE virtual computing instance, which is created in response to a request for a TEE from a software process running in the system. The trusted bootloader appliance manages the provisioning of a TEE in the TEE virtual computing instance for the software process. The remote attestation includes performing a first stage attestation on the trusted bootloader appliance by a hardware platform of the computer system and performing a second stage attestation on the provisioned TEE by the trusted bootloader appliance. | 2021-12-23 |
20210397699 | SYSTEM FOR IDENTIFYING SUSPICIOUS CODE IN AN ISOLATED COMPUTING ENVIRONMENT BASED ON CODE CHARACTERISTICS - Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container. | 2021-12-23 |
20210397700 | METHOD AND APPARATUS FOR ISOLATING SENSITIVE UNTRUSTED PROGRAM CODE ON MOBILE DEVICE - A method provides isolated and secured execution environments on a terminal controlled by one or more processors having one or more processor cores. The processors execute a first trusted execution environment and a second legacy execution environment. At least one trusted application ( | 2021-12-23 |
20210397701 | SYSTEM AND METHOD OF DETECTING AN UNAPPROVED USE OF A COMPUTING DEVICE OF A USER - Disclosed herein are systems and methods for detecting an unapproved use of a computing device of a user. In one aspect, an exemplary method comprises, by a security application: detecting a script executing in a browser on the computing device of the user, intercepting messages being exchanged during an interaction of the script with a server, wherein the intercepted messages comprise at least one of messages sent from the script to the server and from the server to the script, analyzing the intercepted messages to determine whether or not attributes of an unapproved use of resources of the computing device of the user are present, detecting the unapproved use of the resources of the computing device of the user when at least one of said attributes is detected. | 2021-12-23 |
20210397702 | RISK ANALYZER AND RISK ANALYSIS METHOD - A risk analyzer analyzing a risk of a system including N (natural number greater than or equal to 2) elements connected includes: an inputter receiving, as inputs, a degree of safety of each N element against a threat to security, a connection relationship of the N elements, an entry point being an element serving as an entry to the system, and a defense target being an element protected in the system; an identifier identifying, among one or more paths from the entry point to the defense target, based on the degrees of safety and the connection relationship of the N elements, a target path in which a total sum of the degrees of safety of elements passed while the target path extends from the entry point to the defense target is lower than a threshold value; and an outputter outputting path information on the target path. | 2021-12-23 |
20210397703 | SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A COMPUTING ENVIRONMENT - Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network. | 2021-12-23 |
20210397704 | SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A DISPOSABLE COMPUTING ENVIRONMENT - Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information. | 2021-12-23 |
20210397705 | RETURN-ORIENTED PROGRAMMING PROTECTION - An ROP attack protection apparatus constituted of: a first region of memory having stored therein a protection function, the first region of memory set as executable; and a second region of memory having stored thereon a plurality of operation functions, the second region of memory set as non-executable, wherein the protection function is arranged to: responsive to a call to one of the plurality of operation functions and further responsive to at least one predetermined rule, allow execution of the called operation function; and after receiving a return from the executed operation function, set the executed operation function as non-executable. | 2021-12-23 |
20210397706 | APPLICATION INTERFACE BASED SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A COMPUTING ENVIRONMENT - Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system. | 2021-12-23 |
20210397707 | SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A DISPOSABLE COMPUTING ENVIRONMENT USING A USER INTERFACE AND AN AUTOMATED INTELLIGENT SYSTEM - Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. The isolation system automatically performs analysis of the suspicious information in parallel, via an automated intelligent engine to identify presence of harmful information in the suspicious information. In response to identifying the at least harmful information in the suspicious information, the isolation system determines a type of the harmful information and transmits one or more notifications to one or more users based on the type of the harmful information. | 2021-12-23 |
20210397708 | EMULATOR AND EMULATION METHOD - A method for emulating execution of a file includes emulating execution of the instructions of a file on a virtual processor of an emulator. The execution of the instructions is halted in response to an invocation of an API function. A determination is made whether the invoked API function is present in the updatable modules of the emulator. The updatable modules contain implementation of API functions. In response to determining that the invoked API function is present in the updatable modules, execution of the invoked API function is emulated according to corresponding implementation contained in the updatable modules. Otherwise, result of execution of the invoked API function is generated by executing a corresponding virtual API function on a processor of a computing device. | 2021-12-23 |
20210397709 | DATA STRUCTURE MEASUREMENT COMPARISON - A system comprising an inner kernel of an operating system (OS) running at a higher privilege level than an outer kernel of the OS, the inner kernel to measure a data structure in a memory; a device including a measurement engine to measure the data structure in the memory, wherein the device operates independently of the OS; and a trusted execution environment including an application to compare measurements from the inner kernel and the measurement engine. | 2021-12-23 |
20210397710 | METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOF - There is provided a system and a computerized method of remediating one or more operations linked to a given program running in an operating system, the method comprising: querying a stateful model to retrieve a group of entities related to the given program; terminating at least a sub set of the group of entities related to the given program; generating a remediation plan including one or more operations linked to the given program, the one or more operations being retrieved based on the group in the stateful model; and executing the remediation plan by undoing at least part of the one or more operations linked to the given program thereby restoring state of the operating system to a state prior to the given program being executed. There is further provided a computerized method of detecting malicious code related to a program in an operating system in a live environment. | 2021-12-23 |
20210397711 | Detection of Writing to a Non-header Portion of a File as an Indicator of a Possible Ransomware Attack Against a Storage System - An illustrative method includes detecting a request to perform an overwrite operation with respect to a non-header portion of a file stored by a storage system and determining, based on the detecting the request, that data stored by the storage system is possibly being targeted by a security threat. | 2021-12-23 |
20210397712 | PREVENTING UNAUTHORIZED PACKAGE DEPLOYMENT IN CLUSTERS - A method for checking an integrity of an object to be deployed to a cluster is provided. The method detects a resource creation request. The method, responsive to the request being an initial resource creation request for the object, verifies the integrity of the object based on properties in the request to create a release secret in the cluster for a positive integrity verification result for the object. The release secret represents a specific deployment configuration of the object on the cluster. The method, responsive to the request being other than the initial resource request, checks if the request corresponds to the specific deployment configuration of the object by checking against the release secret in the cluster. The method, responsive to the request corresponding to a deployment of the object and the release secret being present in the cluster, creates a resource requested by the request in the cluster. | 2021-12-23 |
20210397713 | PERFORM VERIFICATION CHECK IN RESPONSE TO CHANGE IN PAGE TABLE BASE REGISTER - Examples disclosed herein relate to performing a verification check in response to receiving notification. A computing system includes a host processor, memory coupled to the host processor, and a device separate from the host processor capable of accessing the memory. The host processor has a page table base register. The host processor is configured to send a notification to the device when the page table base register changes. The device performs a verification check in response to receiving the notification. | 2021-12-23 |
20210397714 | ACCESS CONTROL SYSTEM AND METHOD FOR ISOLATING MUTUALLY DISTRUSTING SECURITY DOMAINS - Resource access control in a system-on-chip (“SoC”) may employ an agent executing on a processor of the SoC and a trust management engine of the SoC. The agent, such as, for example, a high-level operating system or a hypervisor, may be configured to allocate a resource comprising a memory region to an access domain and to load a software image associated with the access domain into the memory region. The trust management engine may be configured to lock the resource against access by any entity other than the access domain, to authenticate the software image associated with the access domain, and to initiate booting of the access domain in response to a successful authentication of the software image associated with the access domain. | 2021-12-23 |
20210397715 | AUTHENTICATING SOFTWARE IMAGES - Methods, systems, and devices for authenticating software images are described. Software images may include different portions (e.g., different versions, different users) that may be authenticated using hashes associated with an underlying data structure of the portion of the software image. In some examples, hashes (e.g., first hashes) associated with the software image may be generated and stored using a tree structure, such that a previous hash may be used when calculating a hash associated with a new portion of the software image. To authenticate a portion of the software image, a command may be issued, and a second hash may be calculated using the current data structure of the software image. The second hash may be compared to the associated first hash, and the software image may be authenticated based on the hashes matching. | 2021-12-23 |