51st week of 2021 patent applcation highlights part 50 |
Patent application number | Title | Published |
20210397716 | Securely Signing Configuration Settings - Techniques are disclosed relating to securing computing devices during boot. In various embodiments, a secure circuit of a computing device generates for a public key pair and signs, using a private key of the public key pair, configuration settings for an operating system of the computing device. A bootloader of the computing device receives a certificate for the public key pair from a certificate authority and initiates a boot sequence to load the operating system. The boot sequence includes the bootloader verifying the signed configuration settings using a public key included in the certificate and the public key pair. In some embodiments, the secure circuit cryptographically protects the private key based on a passcode of a user, the passcode being usable by the user to authenticate to the computing device. | 2021-12-23 |
20210397717 | SOFTWARE INFORMATION ANALYSIS - A software information analysis system that assesses the operational risks of using a particular set of software is provided. The system identifies one or more software entities used by one or more applications operating in an environment. The system collects information relevant to the identified one or more software entities. The system extracts opinions regarding the identified one or more software entities in the collected information. The system calculates an operational risk metric for the environment based on sentiments expressed in the extracted opinions. Each extracted opinion is weighted based on a personal identity associated with the extracted opinion. | 2021-12-23 |
20210397718 | Secure Code Jump and Execution Gating - Systems, apparatuses, and methods for improving security of a silicon-based system by creating a glitch-resistant process for executing a software code block on the silicon-based system are disclosed. An example method may begin by marking the software code block as non-executable. Second, intent to execute the software code block is registered with a staging register. Third, the software code block is compressed into a compression constant. Fourth, the compression constant is compared with a first predetermined value using two comparators. Fifth, responsive to the comparators providing a true result after comparison, the software code block is marked as executable to allow the software code block to execute. In another aspect, the example method may be repeated for n>1 iterations, and in each iteration i, an ith software code block is compressed into an ith compression constant that is compared to an ith predetermined value. | 2021-12-23 |
20210397719 | Expansion Joint Seal with Positioned Load Transfer Member - An expansion joint design for supporting transfer loads. The system includes an elongated core and at least one longitudinal load-transfer member which are bonded together. | 2021-12-23 |
20210397720 | PRIVATE DATA PROCESSING - A method includes storing, in one or more databases amongst a plurality of databases by one or more nodes in a distributed database system, data for one or more of network enabled devices. The data for each network enabled device includes encrypted private data, and metadata associated with the private data. The metadata may include permissions data, time period validation data, and encryption parameters. In addition, the method may include locating the encrypted first private data and determining using first permissions data associated with the encrypted first private data and using the second network-enabled device identifier if the second network-enabled device is authorized to access the first private data. The method includes providing the first private data to the second network-enabled device. The second network-enabled device obtains and decrypts the encrypted first private data to obtain the first private data. | 2021-12-23 |
20210397721 | SECURE ENCRYPTION KEY MANAGEMENT IN TRUST DOMAINS - Implementations describe providing secure encryption key management in trust domains. In one implementation, a processing device includes a key ownership table (KOT) that is protected against software access. The processing device further includes a processing core to execute a trust domain resource manager (TDRM) to create a trust domain (TD) and a randomly-generated encryption key corresponding to the TD, the randomly-generated encryption key identified by a guest key identifier (GKID) and protected against software access from at least one of the TDRM or other TDs, the TDRM is to reference the KOT to obtain at least one unassigned host key identifier (HKID) utilized to encrypt a TD memory, the TDRM is to assign the HKID to the TD by marking the HKID in the KOT as assigned, and configure the randomly-generated encryption key on the processing device by associating the randomly-generated encryption key with the HKID. | 2021-12-23 |
20210397722 | Modifying Encryption In A Storage System - A method of modifying encryption of a storage system includes: receiving an instruction to rekey data on a storage system, wherein the instruction identifies first encryption information and second encryption information; determining that the instruction is authorized; decrypting, by a processing device of a storage system controller, the data using a current key included in the first encryption information to generate decrypted data; and encrypting, by the processing device of the storage system controller, the decrypted data using the second encryption information to generate encrypted data. | 2021-12-23 |
20210397723 | SYSTEM AND METHOD FOR PROTECTING LOCATION DATA - Systems and methods for securing user location data are described. A method includes receiving, by a location server computer, an encrypted location from a mobile device. The encrypted location is a location of the mobile device encrypted with a public key. The method then includes receiving, by the location server computer, a location request message from an interaction processing server and partially decrypting, by the location server computer, the encrypted location with a first private key share to form a partially decrypted location. The method further includes transmitting, by the location server computer to the interaction processing server, a location response message with the encrypted location and the partially decrypted location. The interaction processing server then uses the partially decrypted location and the second private key share to form a decrypted location. | 2021-12-23 |
20210397724 | SYSTEM AND METHOD FOR ENABLING AN INTERPROCESS COMMUNICATION IN ELECTRONIC CONTROL UNITS OF VEHICLES - A method for providing an interprocess interaction in an electronic control unit having an operating system defining a kernel space, wherein the method involves steps in which: the kernel of the operating system intercepts a request for an interprocess communication between a first application and a second application of the electronic control unit. A verdict is requested, from an access control component of the operating system, with respect to granting access for the requested interprocess communication between the first application and the second application of the electronic control unit. The access control component generates the verdict for the requested interprocess communication based on a security policy. The kernel of the operating system selectively allows the requested interprocess communication between the first application and the second application based on the generated verdict. | 2021-12-23 |
20210397725 | SECURE COMMUNICATIONS BETWEEN VIRTUAL COMPUTING INSTANCES - Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are disclosed. A new virtual computing instance interfacing the service platform can be created, the created new virtual computing instance belonging to a class of virtual computing instances. At least one security credential is obtained from a storage of security credentials associated with the class of the new virtual computing instance. Data communicated with at least one further computing instance is secured based on the obtained at least one security credential. | 2021-12-23 |
20210397726 | SYSTEMS AND METHODS FOR EXECUTING DATA PROTECTION POLICIES SPECIFIC TO A CLASSIFIED ORGANIZATIONAL STRUCTURE - Disclosed herein are systems and methods for classifying organizational structure for implementing data protection policies. In one exemplary aspect, a method may comprise retrieving a plurality of data files of an organization, wherein the plurality of data files are stored in a data storage; retrieving structural information of the organization, the structural information comprising details of user accounts, organizational roles, and file metadata within the organization; classifying the structural information into an organization type of a plurality of organization types; classifying each respective data file of the plurality of data files into a respective topic of a plurality of topics, wherein the plurality of topics are associated with the organization type; generating a data protection policy for the organization based on each respective topic of the plurality of data files and the organization type; and executing the data protection policy on the data storage. | 2021-12-23 |
20210397727 | POLICY BASED CLIPBOARD ACCESS - Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard. | 2021-12-23 |
20210397728 | Third-Party Access of End-User Device Assets - This disclosure relates to systems, methods, and computer-readable media for identifying an asset privacy management trigger on an end-user device related to a third-party application. In response to identifying the asset privacy management trigger, a privacy selection interface to enable a user to select a limited asset access option is displayed. In response to the limited asset access option being selected, an asset selection interface is displayed, where the asset selection interface is configured to define a sub-set of assets of the end-user device as authorized for the third-party application based on user selection. In response to a subsequent request to access assets of the end-user device by the third-party application, the third-party application is able to access only the defined sub-set of assets. For different third-party applications or scenarios, the asset privacy management triggers and asset sub-set definitions may vary. | 2021-12-23 |
20210397729 | CONTROLLING JUST IN TIME ACCESS TO A CLUSTER - Examples include a system and computer-implemented method to receive a notification from an application programming interface (API) of creation of a just in time (JIT) grant, the JIT grant defining a request for a user to be authorized to access a cluster according to a JIT policy; determine if access to the cluster by the user is authorized according to the JIT policy; grant access to the user to the cluster when access is authorized according to the JIT policy; and send a notification to the API that access by the user to the cluster is granted. | 2021-12-23 |
20210397730 | Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers - Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a first reader-writer system, a first data access request. Based on receiving the first data access request, the computing platform may authenticate the first reader-writer system using a first data container object. After authenticating the first reader-writer system, the computing platform may rotate a first data track comprising a plurality of datasets to align a first dataset of the plurality of datasets with the first data container object. After rotating the first data track, the computing platform may retrieve first information from the first dataset using the first data container object. Subsequently, the computing platform may send, to the first reader-writer system, the first information retrieved from the first dataset using the first data container object. | 2021-12-23 |
20210397731 | METHOD AND SYSTEM FOR DISTRIBUTED DATA STORAGE WITH ENHANCED SECURITY, RESILIENCE, AND CONTROL - A method and system for encrypting and reconstructing data files, including related metadata, is disclosed. The method involves separately encrypting data and metadata as chaining processes and integrating a plurality of encryption/encoding techniques together with strategic storage distribution techniques and parsing techniques which results in the integrated benefits of the collection of techniques. As disclosed, the content data is separated from its metadata, encryption keys may be embedded in the metadata, and in a content data encryption chaining process, the method chunks, encrypts, shards, and stores content data and separately shards and stores metadata, and stored in a flexible, distributed, and efficient manner, at least in part to assure improved resiliency In addition, the processes are preferably implemented locally, including at the site of the content data or a proxy server. | 2021-12-23 |
20210397732 | VERIFIED TEMPLATES - A computing system that facilitates approval and validation of executable code between parties. A template including executable code and specifying certain operations and functions to be performed on protected data, as well as constraints thereto, may be verified and agreed upon by parties. The verified template and/or a hash of the verified template may be stored on a blockchain. Prior to execution of the code certain parameters within the template may be filled and validated by a system that will execute the code. A contract, which too may be agreed upon and stored on the blockchain, may also include other terms governing the parties. The filled template may also be validated, and compared against a blockchain version of the template, by the parties prior to execution of the code and prior to access being granted to protected data. Such verifications and validations ensure that data is only operated on, using a secure system, within the parameters as agreed upon by the parties. | 2021-12-23 |
20210397733 | SYSTEMS AND METHODS FOR PRIVACY-ENHANCING MODIFICATION OF A DATABASE QUERY - Systems and methods obtain a database query, modify the database query into a modified database query incorporating a privacy mechanism configured for randomizing an attribute value of data in an answer to the modified database query, and output the modified database query. In some embodiments, the modified database query is forwarded to a database. | 2021-12-23 |
20210397734 | DATA MANAGEMENT SYSTEM - A data management system includes a client apparatus, a window server apparatus and a plurality of data server apparatuses. The client apparatus is configured to transform private information including a character string having at least one item into a character code. The client apparatus is configured to divide the character code into at least two divisional character code portions. The client apparatus is configured to transmit the divisional character code portions to the window server apparatus. The window server apparatus is configured to store first data, which is formed by a part of the divisional character code portions, in one data server apparatus of the plurality of data server apparatuses and store second data, which is formed by a part of the divisional character code portions that is different from the part forming the first data, in another data server apparatus of the plurality of data server apparatuses. | 2021-12-23 |
20210397735 | SYSTEMS AND METHODS FOR REGULATION COMPLIANT COMPUTING - Disclosed are methods and systems for a computing environment that allows an operator to maximize or increase compliance with one or more data and privacy standards. In one embodiment, compliant and non-compliant sources are identified and exchange of data between those sources are blocked, partially allowed or allowed with regulation-compliant encryption of data. | 2021-12-23 |
20210397736 | METHOD TO MANAGE MULTIPLE VIRTUAL DOCUMENTS IN A CONTACTLESS SECURE ELEMENT - A contactless Secure Element compliant to an inter-industry Secure Element contactless management standard where a Card Reset privilege or Implicit Selection parameter on a contactless interface is compulsory for an Identification Virtual Document application to be able to communicate with an external entity, said Secure Element has a proxy application having the Card Reset privilege or Implicit Selection parameter on the contactless interface and being adapted to receive any command from an external entity for any of the available Identification Virtual Document application belonging to any one of the different standards of Identification Virtual Document, to extract a select command comprising an Logical Data Structure application identifier, to identify and to determine the corresponding recipient Identification Virtual Document application using the extracted Logical Data Structure application identifier and to forward such a command to the determined corresponding recipient Identification Virtual Document application, the proxy application then returning the response of the select command and subsequent commands from the corresponding recipient Identification Virtual Document application to the external entity. | 2021-12-23 |
20210397737 | REMOVAL OF SENSITIVE DATA FROM DOCUMENTS FOR USE AS TRAINING SETS - Systems and methods relating to the replacement or removal of sensitive data in images of documents. An initial image of a document with sensitive data is received at an execution module and changes are made based on the execution module's training. The changes include replacing or effectively removing the sensitive data from the image of the document. The resulting sanitized image is then sent to a user for validation of the changes. The feedback from the user is then used in training the execution module to refine its behaviour when applying changes to other initial images of documents. To train the execution module, training data sets of document images with sensitive data manually tagged by users are used. The execution module thus learns to identify sensitive data and its submodules replace that sensitive data with suitable replacement data. The feedback from the user works to improve the resulting sanitized images from the execution module. | 2021-12-23 |
20210397738 | FILTERED DATA LAKE FOR ENTERPRISE SECURITY - A data lake for enterprise security is created from an asynchronous stream of security events by deduplicating objects and creating metadata related to downstream security functions. Deduplication of objects may be efficiently performed with a bloom filter as objects are ingested into the data lake. The objects may also be augmented with metadata arranged in schemas to facilitate monitoring and use within the data lake. | 2021-12-23 |
20210397739 | APPARATUS AND METHOD FOR COLLECTING DATA - An apparatus for collecting data includes a memory that stores a vehicle identifier for identifying a vehicle; and a processor configured to associate, when a time of generation of data representing road environment around the vehicle is included in a first period, a first hash value with the data and to associate, when the time of generation is included in a second period different from the first period, a second hash value different from the first hash value with the data. The data is generated by a sensor mounted on the vehicle. The first hash value and the second hash value are obtained by irreversibly transforming the vehicle identifier. | 2021-12-23 |
20210397740 | SYSTEMS AND METHODS FOR DATA SECURITY WITH MODULAR WEBSITE INTEGRATION - Examples described herein include systems, methods, instructions, and other implementations for data security. One example includes receiving a checkout communication received from a merchant system, where the checkout communication does not include client information, and processing the communication to authenticate a validated checkout system. A client token is generated in response to an authentication that the checkout communication is from the validated checkout system and transmitted to allow verification of the merchant system. An account communication is then received including the client token and client information, where the client information is not received from the merchant system. A tokenized client account number is generated and used to allow the merchant system to process the secure transaction without access to the client information. | 2021-12-23 |
20210397741 | PRIVACY APPROVAL SYSTEM - Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and a method for determining whether data utilization is privacy compliant. The program and method includes receiving input, via a graphical user interface, that includes identification of an application feature that utilizes user data collected from a plurality of users of the application; generating, for display in the graphical user interface, a plurality of fields that characterize utilization of user data; receiving, via the graphical user interface, a selection of one or more fields, the selected one or more fields characterize the utilization of the user data by the application feature; determining, based on the selected one or more fields, whether the utilization of the user data is privacy compliant; and generating, for display, an approval status indicating whether the utilization of the user data is privacy compliant. | 2021-12-23 |
20210397742 | METHOD FOR CONFIGURING MOBILE ONLINE SERVICES - A method for configuring mobile online services for use with a transportation vehicle including providing a configuration system which assigns data contents to a data release class, providing a selection possibility for a user by the configuration system by which selection possibility the user allows one or more mobile online services to use the data contents of a data release class, selecting a data release class for the one or more mobile online services, and releasing the data contents of the selected data release class for use by the mobile online service by the configuration system. The method provides for enabling transparent and conveniently usable data protection configuration for the use of mobile online services together with a transportation vehicle which leads to increased trust of customers and potential buyers in the transportation vehicle manufacturer and in the offered mobile online services. | 2021-12-23 |
20210397743 | APPLICATION PRIVACY SCANNING SYSTEMS AND RELATED METHODS - An application privacy analysis system is described, where the system obtains an application and analyzes it for privacy related data use. The system may determine privacy related activities of the application from established sources of such data and/or may decompile the application and analyze the resulting code to determine the privacy related activities of the application. The system may execute the application and monitor the communications traffic exchanged by the application to determine privacy related activities of the application. The system may store the results of such analyses for future reference. | 2021-12-23 |
20210397744 | PRIVACY-PRESERVING DATA COLLECTING - A method, system and product including communicating a first report associated with a first temporary identifier of a user device; upon receiving the first report from the user device, storing the first report with the first temporary identifier; communicating a message comprising a second temporary identifier of the user device; communicating a second report that is associated with the second temporary identifier of the user device, wherein the second report is not associated with the first temporary identifier; upon receiving from the user device a second report, storing the second report with the second temporary identifier, whereby the first report cannot be directly matched with the second report based on respective identifiers thereof. | 2021-12-23 |
20210397745 | DATA PROVIDING SERVER DEVICE AND DATA PROVIDING METHOD - When anonymized data is used for data analysis purposes, it is required to try a plurality of anonymized data by trial and error. In this case, it is required to prevent re-identification (deterioration in an anonymity level) caused by collation of the plurality of anonymized data regardless of the intention of a worker. | 2021-12-23 |
20210397746 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC IMAGES ACROSS REGIONS - Systems and methods are disclosed for preserving patient privacy while transmitting health data from one geographic region to another geographic region for data analysis. One method includes receiving patient-specific health data including patient privacy information at a first region; removing the patient privacy information from the patient-specific health data to generate anonymous health data; storing the patient privacy information at the first region; and transmitting the anonymous health data to a second region for analysis. | 2021-12-23 |
20210397747 | Electromagnetic and Power Noise Injection for Hardware Operation Concealment - A method of operation concealment for a cryptographic system includes randomly selecting which one of at least two cryptographic operation blocks receives a key to apply a valid operation to data and outputs a result that is used for subsequent operations. Noise can be added by operating the other of the at least two cryptographic operation blocks using a modified key. The modified key can be generated by mixing the key with a block-unique-identifier, a device secret, a slowly adjusting output of a counter, or a combination thereof. In some cases, noise can be added to a cryptographic system by transforming input data of the other cryptographic operation block(s) by mixing the input data with the block-unique-identifier, device secret, counter output, or a combination thereof. A cryptographic system with operation concealment can further include a distributed (across a chip) or interweaved arrangement of subblocks of the cryptographic operation blocks. | 2021-12-23 |
20210397748 | METHOD AND APPARATUS FOR PROCESSING BIOMETRIC INFORMATION IN ELECTRONIC DEVICE - A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode, the method comprising, detecting a biometric input event from a biometric sensor module at normal mode, creating biometric data based on sensed data from the biometric sensor module at the secure mode, performing biometric registration or biometric authentication based on the created biometric data at the secure mode, and providing result information of biometric registration or biometric authentication at the normal mode. | 2021-12-23 |
20210397749 | EXTRA-COMPACT KEY WITH REUSABLE COMMON KEY FOR ENCRYPTION - Techniques for secure public exposure of digital data include extracting first digital data comprising one or more batches, each batch comprising a plurality of no more than a number T of packets, each packet containing a plurality of a number n of bits. A random binary matrix CK consisting of T rows and n columns is generated. For a first batch, a first random n-bit temporary key is generated and positions of the nT elements of matrix CK are randomized to produce matrix CK(RP). For a packet in the first batch, a first packet vector key is generated based on non-overlapping pairs of bit positions for both the temporary key and for a first packet-corresponding row of matrix CK(RP). An encrypted packet is generated for the packet based on the packet and the first packet vector key. The encrypted packet is exposed publicly. | 2021-12-23 |
20210397750 | SECURITY COMPONENT FOR DEVICES ON AN ENUMERATED BUS - A plug-and-play (PnP) driver associated with a security agent is described herein. The PnP driver attaches to device stacks of enumerated bus devices of a computing device as upper-device or lower-device filters based on the device classes of the enumerated bus devices. For example, the PnP driver may attach to the device stack of a hub or controller device as an upper-device filter and to device stacks of other devices as lower-device filters. Either while attaching or after attachment, the PnP driver may take action to alter, limit, or otherwise block functionality of an enumerated bus device. The PnP driver may also perform a system inventory of enumerated bus devices connected to the computing device and create fingerprints for one or more of the computing devices. Additionally, the PnP driver may create and remove control device objects (CDOs) to enable communication with user-mode processes or threads. | 2021-12-23 |
20210397751 | SOFTWARE INITIATED CAMERA AND MICROPHONE INDICATOR - Embodiments described herein provide a software-based privacy indicator for a camera and microphone that focuses not purely on hardware status (e.g., on or off), but on whether potentially private data is flowing to the system or an application. If based purely on hardware status, the indicator for an electronic device may be shown in scenarios where no data actually flows to the system or applications. The privacy indicator will be enabled if any camera or microphone data is relayed to the operating system or an application that is executed via the operating system. When the device uses the microphone and camera to capture environmental metadata about the surroundings of the device without providing any audio samples, images, or video frames to the system or an application, the privacy indicator will not be enabled. | 2021-12-23 |
20210397752 | Electronic Device Control Method and Electronic Device - A method includes displaying, by an electronic device, a first page, enabling, by the electronic device, a page content hiding function for the first page in response to a first preset input of a user, receiving, by the electronic device, a second preset input of marking a hidden area on the first page by the user after enabling the page content hiding function, and hiding, by the electronic device, display content in the hidden area in response to the second preset input. | 2021-12-23 |
20210397753 | Secured communication by monitoring bus transactions using selectively delayed clock signal - A security device includes a bus interface and circuitry. The bus interface is coupled to a bus connecting between a host device and a peripheral device. The circuitry is configured to receive, via the bus interface, a clock signal of the bus, and to produce a delayed clock signal relative to the clock signal. The circuitry is further configured to monitor, using the clock signal, transactions communicated between the host device and the peripheral device, in response to identifying a given transaction, of which a portion is expected to be delayed by a predefined time delay relative to the clock signal, to sample the portion of the given transaction using the delayed clock signal, and in response to identifying, based on the sampled portion, that the given transaction violates a security policy, to apply a security action. | 2021-12-23 |
20210397754 | Dual Level Management - Access permissions are set for different requesting circuits on a control bus. The access permissions can be set by the level 1 manager and the level 2 manager, allowing two layers of security to be added. The level 1 manager has priority, allowing it to add access permissions that cannot be removed by the level 2 manager. | 2021-12-23 |
20210397755 | SHIPPABLE DATA TRANSFER DEVICE WITH ANTI-TAMPER CASING - A shippable data transfer device includes a data storage medium encased in a chamber surrounded by an anti-tamper casing. The anti-tamper casing includes an anti-tamper layer with identifying elements arranged in a unique or otherwise identifiable pattern. The anti-tamper layer is configured to actively re-arrange, alter, or obscure the identifying elements in response to a breach of the anti-tamper casing. | 2021-12-23 |
20210397756 | SYSTEMS AND METHODS FOR DESIGNING MEMS SCANNING MIRRORS - Embodiments of the disclosure provide a design method for a LiDAR scanning mirror. The design method may include receiving, by a communication interface, design parameters of the LiDAR scanning mirror. The design method may further include setting, by at least one processor, an initial value and a step size for each design parameter. The design method may also include adjusting the design parameters according to the respective step sizes. The design method may additionally include computing one or more mirror performance indexes, by the at least one processor, by applying a Finite Element Analysis (FEA) model to the adjusted design parameters. The design method may further include determining that the mirror performance indexes meet a predetermined target performance. The design method may also include providing, by the at least one processor, the adjusted design parameters and the mirror performance indexes for making the LiDAR scanning mirror. | 2021-12-23 |
20210397757 | Generating Space Models and Geometry Models Using a Machine Learning System with Multi-Platform Interfaces - Aspects of the disclosure relate to geometry model generation. A computing platform may receive a plurality of drawing models corresponding to different space designs. The computing platform may identify a plurality of design parameters associated with each drawing model of the plurality of drawing models corresponding to the different space designs. The computing platform may train a machine learning engine based on the plurality of drawing models corresponding to the different space designs and the plurality of design parameters associated with each drawing model of the plurality of drawing models corresponding to the different space designs, which may produce at least one geometry model corresponding to the plurality of drawing models. The computing platform may store, in a database storing one or more additional geometry models, the at least one geometry model corresponding to the plurality of drawing models. | 2021-12-23 |
20210397758 | Method and Apparatus for Creating Organic Compositions - A computer terminal arranged to allow a user to produce a fragrance or flavour composition, the terminal comprising a processor, a database connection to a database storing ingredients, an output connection to an output device configured to produce a sample of the composition, a display and a user input means; wherein the processor is configured to: accept selection via the user input means of ingredients from the database; add pictograms representing the selected ingredients to an olfactive design space on the display, wherein the size of the pictogram for each selected ingredient represents that selected ingredient's olfactive contribution to the composition; convert for each selected ingredient, its olfactive contribution to a corresponding quantity of the ingredient; and, when the user requests a sample of the composition via the input means, to instruct the output device to dispense the corresponding quantity of the selected ingredients. | 2021-12-23 |
20210397759 | Generating Space Models and Geometry Models Using a Machine Learning System with Multi-Platform Interfaces - Aspects of the disclosure relate to space model generation. A computing platform may receive space program data identifying parameters of a physical space. The computing platform may load a geometry model defining a plurality of design rules. The computing platform may generate space models for the physical space based on the space program data and the geometry model. Based on the geometry model, the computing platform may produce a score for each space model. Based on the scores, the computing platform may produce a ranked list of space models. The computing platform may generate user interface data comprising the ranked list of space models. The computing platform may send the user interface data comprising the ranked list of space models, which may cause a user computing device to display a user interface including a portion of the ranked list of space models. | 2021-12-23 |
20210397760 | Generating Space Models And Geometry Models Using A Machine Learning System With Multi-Platform Interfaces - Aspects of the disclosure relate to the export and translation of space models. A computing platform may receive data indicating a request to export a space model to a design tool, and the space model may be defined in a plurality of data formats. In response to receiving the data indicating the request to export the space model to the design tool, the computing platform may generate drawing files based on the space model by: 1) selecting, based on the design tool, a data format, 2) extracting format-specific data from the space model, where the format-specific data is defined in the data format, and 3) generating the drawing files using the format-specific data extracted from the space model, where the drawing files are generated according to the data format. The computing platform may send the drawing files generated based on the space model. | 2021-12-23 |
20210397761 | FIBER PATH PLANNING TO REDUCE IN-PLANE CURVATURE - A method of planning fiber paths for a composite ply of a composite layup includes determining a first unit vector field. The first unit vector field represents a first approximation of target directions to be followed by tow centerlines of the composite ply. The first unit vector field is determined based on a specified rosette direction, a surface approximation of a nonplanar contoured surface of an object to be formed, and a fiber angle distribution. The method also includes determining, based on specified angle deviation bounds and the first unit vector field, a second unit vector field. The second unit vector field represents a second approximation of the target directions. The second approximation has reduced in-plane curvature relative to the first approximation. The method further includes planning a fiber placement head path for forming the composite ply of the composite layup based on the second unit vector field. | 2021-12-23 |
20210397762 | DISTRIBUTION GRID ADMITTANCE ESTIMATION WITH LIMITED NONSYNCHRONIZED MEASUREMENTS - A method of estimating grid admittance is provided and includes receiving an input of a network topology of a distribution grid, categorizing nodes of the network topology of the distribution grid into node-cases, for each node-case, executing a network admittance estimation algorithm from available measurement information and determining a network admittance estimate for the distribution grid with the network topology from results of the network admittance estimation algorithm executed for each node-case. | 2021-12-23 |
20210397763 | SYSTEM FOR DYNAMIC CONFIGURATION OF DEVICES/EQUIPMENT USING TEMPLATES - A building management system, such as a small or medium business, having one or more control devices. Assigning codes to devices, and reading and listing them may aid in configuring the devices. Templates may be used for dynamic configuration of devices and equipment. Representing terminal assignments and wiring diagrams of control devices may be intuitive in that they resemble real hardware for ease of complete installation. The present system and approach may provide an intuitive way of securely registering devices with cloud usage, for example, involving a mobile phone with no manual entry of data so that a user can complete this process with ease. An intuitive, automatic and asynchronous device configuration downloading may be seen, such as to multiple control devices in a single shot. There may be seamless configuration data synchronization, for example, in view of replacement devices, or so the latest data is readily available. | 2021-12-23 |
20210397764 | PIPELINE NETWORK SOLVING USING DECOMPOSITION PROCEDURE - A physical pipeline network is decomposed into multiple subnetworks. The subnetworks include upstream subnetworks and at least one downstream subnetwork. A network solver is executed on the upstream subnetworks in parallel to obtain a set of boundary conditions and a set of control device settings. The set of boundary conditions and a set of control device settings are then used to execute the network solver on the downstream subnetwork and obtain a result having another set of control device settings. The network solver may repeat executions until convergence is achieved. When convergence is achieved, the result is presented. | 2021-12-23 |
20210397765 | WORK AREA ZONE BOUNDARY DEMARCATION APPARATUS OF AUTONOMOUSLY NAVIGATING WORK MACHINE - A work zone boundary demarcation apparatus to demarcate boundaries that divide a work area (AR) to be serviced by at least one autonomously navigating work machine into multiple zones (ARn), equipped with a computer having at least a processor, a memory, an input-output circuit and a simulation program loaded in the memory to simulate work of the work machine in the work area; wherein the processor is configured to perform as a boundary demarcation unit that demarcates boundaries which divide the work area into multiple zones, a simulation execution unit that executes simulation of work of the work machine in the multiple zones divided by the boundaries demarcated by the boundary demarcation unit, a boundary re-demarcation unit that re-demarcates boundaries demarcated by the boundary demarcation unit based on results of the simulation executed by the simulation execution unit, and a zone display unit that displays the multiple zones divided by the boundaries re-demarcated by the boundary re-demarcation unit. | 2021-12-23 |
20210397766 | SYSTEM AND METHODS FOR MULTI-LANGUAGE ABSTRACT MODEL CREATION FOR DIGITAL ENVIRONMENT SIMULATIONS - A system and methods for multi-language abstract digital simulation model generation and execution, comprising a meta-model structuring and creation system, meta-model mapping table, remote server, simulation execution process, computer domain specific language, and methods for user-creation and editing of meta-models, simulation models, and parametrization of simulation environments, actors, objects, and events in real-time using heuristic searching. | 2021-12-23 |
20210397767 | HYBRID METHOD OF ASSESSING AND PREDICTING ATHLETIC PERFORMANCE - Exemplary systems, apparatus, and methods for evaluating and predicting athletic performance are described. Systems may include a receiver that gathers non-deterministic data on one or more aspects of athletic performance, a deterministic model of the athletic performance, a hybrid processor that creates a conditional probabilistic model from these elements, and a display presenting the evaluated or predicted performance. The system may include sensors affixed to an athlete or their equipment to convey position, acceleration, heart rate, respiration, biomechanical attributes, and detached sensors to record video, audio, and other ambient conditions. Apparatus may include a hybridization processor that communicates the output of conditional probabilistic models directly to athletes, coaches, and trainers using sound, light, or haptic signals, or to spectators using audiovisual enhancements to broadcasts. The methods enable more accurate evaluations and predictions of athletic performance than are possible with either statistical or deterministic methods alone. | 2021-12-23 |
20210397768 | Method For Predicting Arc Flash Energy And PPE Category Within A Real-Time Monitoring System - Systems and methods for making real-time predictions about an arc flash event on an electrical system are disclosed. A virtual system model database is operable for providing a virtual system model for the electrical system and continuously update the virtual system model with real-time data from the electrical system. An analytics server comprises an arch flash simulation engine. The arch flash simulation engine is operable to modify the virtual system model to introduce a short-circuit feature to an uninterrupted power supply bypass circuit branch; choose a standard to supply equations used for arc flash event simulation and energy calculation; simulate an arc flash event utilizing the modified virtual system model; calculate a quantity of arc energy released by the arc flash event using results from the simulation; and communicate a report that forecasts an aspect of the arc flash event. | 2021-12-23 |
20210397769 | MATERIAL DESIGN DEVICE, MATERIAL DESIGN METHOD, AND MATERIAL DESIGN PROGRAM - A material design device derives the optimal solution for a design condition satisfying a desired material property. A design condition setting unit for setting a specified range of a design condition of a material to be designed. A comprehensive prediction point generation unit generates a plurality of comprehensive prediction points within the specified range set by the design condition setting unit. A design condition-material property table stores data sets in which each point of the comprehensive prediction points is associated with a material property value calculated by inputting the comprehensive prediction points generated by the comprehensive prediction point generation unit, to a learned model. A required property setting unit sets a specified range of a required property of the material. A design condition extraction unit extracts, from the design condition-material property table, a data set satisfying the required property set by the required property setting unit. | 2021-12-23 |
20210397770 | METHOD OF NEURAL NETWORK CONSTRUCTION FOR THE SIMULATION OF PHYSICAL SYSTEMS - A method of construction of a feedforward neural network includes a step of initialization of a neural network according to an initial topology, and at least one topological optimization phase, of which each phase includes: an additive phase including a modification of the network topology by adding at least one node and/or a connection link between the input of a node of a layer and the output of a node of any one of the preceding layers, and/or a subtractive phase including a modification of the network topology by removing at least one node and/or a connection link between two layers. Each topology modification includes the selection of a topology modification among several candidate modifications, based on an estimation of the variation in the network error between the previous topology and each topology modified according to a candidate modification. | 2021-12-23 |
20210397771 | Integrated Sensor Device with Deep Learning Accelerator and Random Access Memory - Systems, devices, and methods related to a Deep Learning Accelerator and memory are described. For example, an integrated sensor device may be configured to execute instructions with matrix operands and configured with: a sensor to generate measurements of stimuli; random access memory to store instructions executable by the Deep Learning Accelerator and store matrices of an Artificial Neural Network; a host interface connectable to a host system; and a controller to store the measurements generated by the sensor into the random access memory as an input to the Artificial Neural Network. After the Deep Learning Accelerator generates in the random access memory an output of the Artificial Neural Network by executing the instructions to process the input, the controller may communicate the output to a host system through the host interface. | 2021-12-23 |
20210397772 | QUANTUM CIRCUIT SIMULATION METHOD AND DEVICE, APPARATUS, AND STORAGE MEDIUM - A quantum circuit simulation method and device, an apparatus, and a storage medium are provided, which are related to a field of quantum simulation computation. The specific implementation is: obtaining, based on a quantum circuit containing n qubits, an n-order pure state corresponding to the quantum circuit; determining, based on the quantum circuit, a (k, k)-order gate tensor representing a quantum gate, on which a contraction processing is to be performed with the n-order state tensor; transforming the contraction processing between the n-order state tensor and the (k, k)-order gate tensor into a processing between matrices which can be expressed in a classic computer and reduce a computation amount in the classic computer, to obtain a processing result; and using the processing result as a result of the contraction processing between the n-order state tensor and the (k, k)-order gate tensor, to complete simulation of the quantum circuit. | 2021-12-23 |
20210397773 | FinFET Semiconductor Device Grouping - A method of designing a circuit is provided. The method includes: providing a circuit; selecting a first NMOS fin field-effect transistor (FinFET) in the circuit; and replacing the first NMOS FinFET having a first fin number with a second NMOS FinFET having a second fin number and a third NMOS FinFET having a third fin number, wherein the sum of the second fin number and the third fin number is equal to the first fin number. | 2021-12-23 |
20210397774 | BUMP CONNECTION PLACEMENT IN QUANTUM DEVICES IN A FLIP CHIP CONFIGURATION - Within a layout of a first surface in a flip chip configuration, a bump restriction area is mapped according to a set of bump placement restrictions, wherein a first bump placement restriction specifies an allowed distance range between a bump and a qubit chip element in a layout of the first surface in the flip chip configuration. An electrically conductive material is deposited outside the bump restriction area, to form the bump, wherein the bump comprises an electrically conductive structure that electrically couples a signal from the first surface and is positioned according to the set of bump placement restrictions. | 2021-12-23 |
20210397775 | ELECTRONIC APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processing method includes displaying a graph on a display screen of a display, in response to a user operation of specifying at least part of the graph, displaying an icon corresponding to a numerical value which is associated with the at least part of the graph on the display screen, in response to a user operation of selecting the icon, as at least part of a mathematical expression to execute calculation using the numerical value which is associated with the icon selected, displaying the numerical value or a variable indicating the numerical value which is associated with the icon on the display screen. | 2021-12-23 |
20210397776 | ON-DEMAND WEB-SERVER EXECUTION INSTANCE FOR WEBSITE HOSTING WITH CUSTOM BACK-END FUNCTIONALITY - An online website building system includes: an online database configured to store a library of website building elements for configuring a front-end of a webpage, the webpage having been built on a platform including at least common server code; and store rules for accessing code associated with the website building elements; and at least one processor configured to enable the user to edit code associated with a webpage, and to provide a programmable event for activating the resultant user-editable code, wherein the user-editable code is configured to provide dynamic customized back-end functionality associated with the webpage; store the edited user-editable code in a code storage system in communication with the online database; receive a request to access the webpage, and in response to the request and before the request times out, provide access to a virtualized execution instance comprising at least the common server code and the edited user-editable code. | 2021-12-23 |
20210397777 | SYSTEM AND METHOD FOR DEEP LINKING AND SEARCH ENGINE SUPPORT FOR WEB SITES INTEGRATING THIRD PARTY APPLICATION AND COMPONENTS - A method and system for a website building system (WBS) integrating at least one third party application includes detecting the presence of a spider associated with a search engine; parsing the output of said least one third party application to determine non-text components according to a request from said search engine spider, said non-text components having encoded or interleaved text, extracting said encoded or interleaved text from said non-text components; creating a search engine friendly page containing said extracted text; and providing said search engine friendly page to said spider. | 2021-12-23 |
20210397778 | Systems for Generating Layouts of Text Objects - In implementations of systems for generating layouts of text objects, a computing device implements a layout system to receive input data describing a sequence of text and the layout system represents the sequence of the text as a number of text objects. A candidate layout for the text objects is identified from layout data describing a plurality of layouts, the candidate layout identified at least partially based on the number of the text objects. The layout system generates a binary tree having leaf nodes and at least one parent node representing the candidate layout. An arrangement of the text objects in the candidate layout is generated for display in a user interface based on the binary tree. | 2021-12-23 |
20210397779 | METHOD OF DISPLAYING TEXT OF ELECTRONIC DOCUMENT ON SCREEN OF INFORMATION TERMINAL - A method of displaying text of an electronic document on a screen of an information terminal is proposed. The method includes: selecting a specific electronic document by a user; assigning new tags to all text of a corresponding electronic document selected by the user in units of words or letters so as to objectify the text; designating one page of text displayed on a screen of the information terminal by calculating a last word or a last letter at the bottom of that screen that may be displayed on a screen of the information terminal to the extent of not infringing the copyright of the electronic document; and selecting and performing a sequential display mode, a sequential disappearance mode, and an emphasis part designation mode, thereby allowing rapid reading training and enabling quicker review/revision of the parts that have already been studied and understood by a learner. | 2021-12-23 |
20210397780 | METHOD, DEVICE, AND STORAGE MEDIUM FOR CORRECTING ERROR IN TEXT - A method for correcting an error in a text, an electronic device, and a storage medium are provided. The method includes: obtaining an original text; obtaining a training text by preprocessing the original text; extracting a plurality of feature vectors corresponding to each word in the training text; obtaining an input vector by processing the plurality of feature vectors; obtaining a target text by inputting the input vector into a text error correction model; and adjusting parameters of the text error correction model based on a difference between the target text and the original text. | 2021-12-23 |
20210397781 | SYSTEM AND METHOD FOR IN-CONTEXT DOCUMENT COMPOSITION USING SUBJECT METADATA QUERIES - Embodiments of systems and method for assistance in document composition in the context of a document editor are disclosed. Specifically, embodiments may utilize a document definition syntax that allows a user to define a document that includes a set of document sections with identifiers and definitions. A client document compositor may be integrated with the document editor and communicate with a document composition platform to obtain a data section for substitution in the document in place of a document section. | 2021-12-23 |
20210397782 | CROSS-DOCUMENT PROPAGATION OF ENTITY METADATA - Embodiments include cross-document propagation of entity metadata. Aspects include identifying a set of documents from a plurality of documents, the set of documents being related to one another and identifying a concept in a first document of the set of documents and creating an annotation corresponding to the concept. Aspects also include evaluating the annotation from the first document against all of the documents in the set of documents and identifying a concept match between the annotation and a mention discovered in a second document in the set of documents. Aspects further include creating a metadata linkage between the concept in the first document to the mention in the second document. | 2021-12-23 |
20210397783 | RICH MEDIA ANNOTATION OF COLLABORATIVE DOCUMENTS - Methods and systems describe providing for media annotations for collaborative documents. The system receives a collaborative document based on a collaborative document platform; receives, from the client device, a user interaction of an annotation area within the collaborative document; provides one or more interactive recording components for the annotation area; receives a signal to initiate recording using at least one of the interactive recording components; generates, in response to receiving the signal to initiate recording, a media recording comprising one or more sample portions; generates a transcript based on the one or more sample portions of the generated media recording; and provides, for display on the client device, the generated media recording and the generated transcript. | 2021-12-23 |
20210397784 | SYSTEM AND METHOD FOR AUTOMATED DATA IMPORTATION, PROCESSING, AND FORM SUBMITTAL - A method including receiving information pertaining to a client entity; storing the information in a database; receiving, from a user interface of an application communicatively coupled to the database, a first selection to perform a first task; determining, based on the first task, a first subset of document templates to populate from a plurality of document templates; retrieving the first subset of document templates from the database; populating the first subset of document templates using the information pertaining to the client entity to generate a first populated subset of documents; and performing the first task using the first populated subset of documents. | 2021-12-23 |
20210397785 | Classifying Input Fields and Groups of Input Fields of a Webpage - A method, a system and a machine-readable data carrier, which are intended to classify input fields and groups of input fields of a webpage, are described. The method for classifying input fields and groups of input fields of a webpage may include a browser extension that contains program elements Content Script and Background Script and a program recognition module. The method may form a hierarchy of HTML-documents of a webpage. A multicomponent system for classifying input fields and groups of input fields of a webpage may include a processor device and a storage, and a set of instructions that, when executed by the processor, control the processor to form a hierarchy with grouped fields and a report file for HTML-documents of the webpage. The instructions may also identify elements of the HTML-documents on the webpage. | 2021-12-23 |
20210397786 | INFORMATION PROVIDING SYSTEM, INFORMATION PROVIDING METHOD, AND DATA STRUCTURE OF KNOWLEDGE DATA - A user is able to easily acquire desired knowledge data. An information providing system | 2021-12-23 |
20210397787 | DOMAIN-SPECIFIC GRAMMAR CORRECTION SYSTEM, SERVER AND METHOD FOR ACADEMIC TEXT - A method of identifying text (e.g., a sentence or sentence portion) in a word processing text editor; automatically identifying a domain-specific deep-learning neural network that corresponds to an identified context, from among one or more domain-specific deep-learning neural networks; automatically identifying at least one suggested replacement word using the identified domain specific deep-learning neural network that corresponds to the identified context; and automatically controlling a display to display a user interface that includes functionality that presents prompt information that includes the at least one suggested replacement word. Changes for errors that are common in academic papers written by non-native speakers may be suggested. | 2021-12-23 |
20210397788 | FULFILLMENT OF ACTIONABLE REQUESTS AHEAD OF A USER SELECTING A PARTICULAR AUTOCOMPLETE SUGGESTION FOR COMPLETING A CURRENT USER INPUT - Implementations set forth herein relate to providing selectable autofill suggestions, which correspond to application actions that are at least partially fulfilled using server command data—prior to a user selecting a particular selectable autofill suggestion. Proactively fulfilling command data in this way mitigates latency between user selection of a suggestion and fulfillment of a particular action. Initially, a partial input can be processed to generate autofill suggestions, which can be communicated to a server device for further processing. The autofill suggestions can also be rendered for selection at a touch display interface, thereby allowing a user to select one of the autofill suggestions. As command fulfillment data is provided by the server, the command fulfillment data can be available to a corresponding application(s) in order that any corresponding actions can be at least partially fulfilled prior to user selection. | 2021-12-23 |
20210397789 | CONTACTS AUTOCOMPLETE KEYBOARD - Private and secure autocomplete suggestions are enabled based on a user contacts database, even when an application has not been granted access to the user contacts database. A keyboard process can receive and display suggestions based on input provided via the keyboard. The suggestions are generated based on a contacts database of a user. The suggestions are generated without exposing the contacts database to the application. Suggestions are then displayed to the user without exposing the suggestions to the application. Once a suggestion is selected by a user, the selected suggestion is provided to the application for insertion into a text field. | 2021-12-23 |
20210397790 | Method of training a natural language search system, search system and corresponding use - The invention provides a method and system for training a machine learning-based patent search or novelty evaluation system. The method comprises providing a plurality of patent documents each having a computer-identifiable claim block and specification block, the specification block including at least part of the description of the patent document. The method also comprises providing a machine learning model and training the machine learning model using a training data set comprising data from said patent documents for forming a trained machine learning model. According to the invention, the training comprises using pairs of claim blocks and specification blocks originating from the same patent document as training cases of said training data set. | 2021-12-23 |
20210397791 | LANGUAGE MODEL TRAINING METHOD, APPARATUS, ELECTRONIC DEVICE AND READABLE STORAGE MEDIUM - The present disclosure provides a method for training language model, and associated apparatus, electronic device and readable storage medium, which relates to the technical field of deep learning and the technical field of natural language processing. A specific implementation solution is as follows: sampling a paragraph of text from each article in a plurality of articles respectively, to obtain multiple paragraphs of text; concatenating the multiple paragraphs of text to obtain a concatenated text; inputting the concatenated text into a language model, a prediction value of the number of articles being output via the language model; training the language model based on the actual number of articles in the plurality of articles and a prediction value of the number of articles, until a preset training completion condition is satisfied. In the present disclosure, the classification of the entire paragraph of text content by the language model may be implemented and the effect of recognizing the text content by the language model may be enhanced by training the language model using texts sampled from the plurality of articles. | 2021-12-23 |
20210397792 | Automatic Synonyms Using Word Embedding and Word Similarity Models - A method processes natural language commands (e.g., for data visualization). The method includes obtaining word embeddings (e.g., word vectors) for a set of words (or phrases) of a natural language. In some implementations, the set of words includes high-frequency or common words of the natural language. The method also includes training a word similarity model to identify similar words based on the word embeddings and a synonym database (a large lexical database, such as a thesaurus). The method also includes generating semantic annotations for a published data source using the trained word similarity model, based on the synonym database, and the word embeddings. The method also includes generating a semantic interpretation for a natural language command based on the semantic annotations for the published data source. The method also includes querying the published data source based on the sematic interpretation, thereby retrieving a dataset. | 2021-12-23 |
20210397793 | Intelligent Tone Detection and Rewrite - A method and system for providing tone detection and modification for a content segment may include receiving a request to detect a tone for the content segment, inputting the content segment into a first machine-learning (ML) model to detect the tone for the content segment, obtaining the detected tone as a first output from the first ML model, inputting the content segment into a second ML model for modifying the tone from the detected tone to a modified tone, obtaining at least one rephrased content segment as a second output from the second ML model, the rephrased content segment modifying the tone of the content segment from the detected tone to the modified tone, and providing at least one of the detected tone or the at least one rephrased content segment for display to a user. | 2021-12-23 |
20210397794 | METHOD AND APPARATUS FOR IMPROVING MODEL BASED ON PRE-TRAINED SEMANTIC MODEL - Embodiments of a method and an apparatus for improving a model based on a pre-trained semantic model are provided. The method may include: based on the pre-trained semantic model, obtaining an initial improved model, where semantic result information of an input vector is determined in the initial improved model based on a hash search method; and based on a model distillation method, training the initial improved model to obtain an improved model. Some embodiments can obtain the semantic result information of the input vector by performing the hash search method on the input vector, replace the original complex iterative calculation process of a semantic model, and obtain the improved model with few model parameters and high compression ratio. | 2021-12-23 |
20210397795 | System for Processing Continuous Feedback - A system and methods of processing feedback for use by a large organization which process the information using artificial intelligence and graphically display the results is disclosed. The continuous process of refining the data of this method and system uses collective reactions to correct misinterpreted feedback to improve the quality and accuracy of future iterations. | 2021-12-23 |
20210397796 | AUTONOMOUS LEARNING OF ENTITY VALUES IN ARTIFICIAL INTELLIGENCE CONVERSATIONAL SYSTEMS - A computer system configured for autonomous learning of entity values is provided. The computer system includes a memory that stores associations between entities and fields of response data. The computer system also includes a processor configured to receive a request to process an intent; generate a request to fulfill the intent; transmit the request to a fulfillment service; receive, from the fulfillment service, response data specifying values of the fields; identify the values of the fields within the response data; identify the entities via the associations using the fields; store, within the memory, the values of the fields as values of the entities; and retrain a natural language processor using the values of the entities. | 2021-12-23 |
20210397797 | METHOD AND APPARATUS FOR TRAINING DIALOG GENERATION MODEL, DIALOG GENERATION METHOD AND APPARATUS, AND MEDIUM - The disclosure discloses a method and an apparatus for training a dialog generation model, and a dialog generation method and apparatus, and relates to the field of artificial intelligence. The method includes: encoding a context sample to obtain a first latent variable, and recognizing the first latent variable to obtain a prior latent variable; encoding a response sample to obtain a second latent variable; encoding a response similar sample to obtain a third latent variable; performing recognition according to a Gaussian mixture distribution of the first latent variable, the second latent variable, and the third latent variable to obtain a posterior latent variable; and matching the prior latent variable with the posterior latent variable, and performing adversarial training on a dialog generation model. | 2021-12-23 |
20210397798 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a receiving unit, an obtaining unit, and a translating unit. The receiving unit receives a document as a target to be translated. The obtaining unit obtains a non-target region from the document, the non-target region being a region that is not a target to be translated. The translating unit does not perform translation on the non-target region but performs translation on a portion other than the non-target region. | 2021-12-23 |
20210397799 | SYSTEMS AND METHODS FOR STRUCTURED TEXT TRANSLATION WITH TAG ALIGNMENT - Approaches for the translation of structured text include an embedding module for encoding and embedding source text in a first language, an encoder for encoding output of the embedding module, a decoder for iteratively decoding output of the encoder based on generated tokens in translated text from previous iterations, a beam module for constraining output of the decoder with respect to possible embedded tags to include in the translated text for a current iteration using a beam search, and a layer for selecting a token to be included in the translated text for the current iteration. The translated text is in a second language different from the first language. In some embodiments, the approach further includes scoring and pointer modules for selecting the token based on the output of the beam module or copied from the source text or reference text from a training pair best matching the source text. | 2021-12-23 |
20210397800 | SELF-CHECKOUT DEVICE TO WHICH HYBRID PRODUCT RECOGNITION TECHNOLOGY IS APPLIED - Disclosed in the present specification is a self-checkout device to which hybrid product recognition technology is applied and which helps a user to more conveniently and quickly make a payment. The self-checkout device according to the present specification photographs a product with a plurality of cameras, and then recognizes a barcode by detecting a barcode region from the captured images and, simultaneously, extracts a feature point of the images such that a product can be recognized through the calculation of the proportion that matches with a reference image of the product. Thus, a product can be quickly recognized through barcode recognition and packaging paper recognition in a product image. | 2021-12-23 |
20210397801 | TECHNIQUES FOR BEAMFORMING PRESSURE WAVES - Certain aspects of the present disclosure provide techniques for beamforming pressure waves. A method for operating an apparatus configured to beamform ultrasonic pressure waves may generally comprise emitting, via a pressure wave module of the apparatus, beamformed ultrasonic pressure waves through a display module of the apparatus, wherein: the display module comprises a first plurality of layers; the pressure wave module comprises a second plurality of layers; the second plurality of layers comprises at least a copolymer layer, a conductive layer, a dielectric protection layer, and a thin film transistor (TFT) glass layer; and an order of the second plurality of layers in the pressure wave module depends on an acoustic resonance value associated with the display module. | 2021-12-23 |
20210397802 | SELECTIVE FINGERPRINT SENSOR ACTIVATION - Certain aspects of the present disclosure provide techniques for selectively activating a fingerprint sensor in an electronic device. A method that may be performed by the electronic device includes detecting a finger hover above the display module, activating the fingerprint sensor based, at least in part, on the detected finger hover, and providing, in response to detecting the finger hover, feedback information to assist in scanning the finger using the fingerprint sensor. | 2021-12-23 |
20210397803 | DISPLAY DEVICE - The present disclosure provides a display device with fingerprint sensor in a manner capable of strengthening a display device integrating the fingerprint sensor. The display device includes a display panel including a display area, a cover panel, a fingerprint sensor, and a reinforcing member. The cover panel is disposed on a rear surface of the display panel and includes an opening. The fingerprint sensor is disposed on the rear surface of the display panel in the opening of the cover panel and includes a sensor layer. The reinforcing member is disposed on a rear surface of the fingerprint sensor. The reinforcing member includes a sidewall surrounding at least one area of the sensor layer while being in contact with the rear surface of the fingerprint sensor, and a bottom surface which extends from the sidewall and is spaced apart from the sensor layer. | 2021-12-23 |
20210397804 | DRIVING DEVICE FOR DRIVING TOUCH DISPLAY PANEL WITH FINGERPRINT SENSING FUNCTION AND DRIVING METHOD FOR TOUCH DISPLAY PANEL - A driving device for driving a touch display panel with fingerprint sensing function and a driving method therefore are provided. The circuit includes a plurality of touch sensing input terminals, a plurality of fingerprint sensing input terminals, a first touch sensing circuit, a fingerprint sensing circuit, and a second touch sensing circuit. The second touch sensing circuit is coupled to a plurality of second touch sensing electrodes in a fingerprint sensor array of the touch display panel through at least a part of the plurality of fingerprint sensing input terminals. The second touch sensing circuit is configured to perform the second touch sensing operation according to the second touch sensing electrodes in the fingerprint sensor array for compensating a touch sensing result of the first touch sensing operation by the first touch sensing circuit. | 2021-12-23 |
20210397805 | DETECTION DEVICE - A detection device is provided and includes substrate; drive electrode provided on substrate; detection electrode provided on substrate and capacitively coupling with drive electrode; first thin film transistor connected to drive electrode and second thin film transistor connected to first thin film transistor, first insulating film and second insulating film both stacked on substrate, wherein first thin film transistor comprises first gate electrode and first semiconductor layer, second thin film transistor comprises second gate electrode and second semiconductor layer, first semiconductor layer and second semiconductor layer are in same layer and are located between first insulating film and second insulating film, first gate electrode opposes first semiconductor layer via first insulating film, second gate electrode opposes second semiconductor layer via second insulating film, and distance from first gate electrode to first semiconductor layer is greater than distance from second gate electrode to second semiconductor layer. | 2021-12-23 |
20210397806 | DISPLAY PANEL AND DISPLAY DEVICE - Provided are a display panel and a display device. An array layer is located on a substrate. A display layer is located on a side of the array layer facing away from the substrate and includes light-emitting elements. A color filter layer is located on a side of the display layer facing away from the array layer. The color filter layer includes a light-blocking layer and color filters. The light-blocking layer includes first light-blocking portions. Each first light-blocking portion forms an imaging aperture. A protective layer is located on the color filter layer. Each first metal part overlaps the first light-blocking portion. The optical sensor layer is located on a side of the color filter layer facing away from the protective layer and configured to detect an image formed by the imaging aperture. Further provided is a display device including the preceding display panel. | 2021-12-23 |
20210397807 | OPTICAL FINGERPRINT MODULE AND SIGNAL PROCESSING METHOD - An optical fingerprint module and a method for processing a signal includes a light sensing unit, a signal processing unit and a control unit. The light sensing unit is configured to collect a light signal. The signal processing unit is connected to the light sensing unit and is configured to process the light signal collected by the light sensing unit to generate at least one of a fingerprint signal and a health signal. The control unit is connected to the signal processing unit and is configured to generate fingerprint information for fingerprint recognition based on the fingerprint signal output by the signal processing unit, and generate health parameter information based on a health signal output by the signal processing unit. | 2021-12-23 |
20210397808 | BIOMETRIC KEY INCLUDING A TEXTURED CERAMIC COVER - An electronic device is provided, the electronic device having a keyboard including a biometric input device. The biometric input device may be a biometric key or button. A cap of a biometric key or button may include a textured ceramic cover, such as a textured sapphire cover. The cap may further include a rear decorative coating and a front antireflective coating disposed on or over the textured ceramic cover. The cap may have one or more visual and or tactile properties which resemble those of an adjacent key of the keyboard. | 2021-12-23 |
20210397809 | FINGERPRINT SENSOR HOUSING WITH NON-UNIFORM THICKNESS - A sensor assembly includes a cover layer and a first sensor apparatus. The cover layer is molded from a first material to have a planar surface and non-uniform thickness, where a thickness of the first material at a first region of the cover layer is less than a thickness of the first material surrounding the first region. The first sensor apparatus is disposed beneath the planar surface of the cover layer, within the first region. The first sensor apparatus is configured to transmit and receive first capacitive sensing signals through a portion of the planar surface coinciding with the first region. For example, the first sensor apparatus may be a fingerprint sensor configured to detect a fingerprint on the portion of the planar surface coinciding with the first region based on changes in the first capacitive sensing signals. | 2021-12-23 |
20210397810 | METHODS AND SYSTEM FOR ESTIMATION OF LAMBERTIAN EQUIVALENT REFLECTANCE FOR REFLECTIVE BAND IMAGERY - A system for estimating a Lambertian equivalent reflectance for reflective band imagery is disclosed. In some embodiments, the system estimates an equivalent reflectance and performs atmospheric correction of reflective band imagery without user interaction and accounts for the effect of background reflectance mixing with individual target reflectances. Some of these embodiments use a dark pixel-based technique to improve the characterization of the atmosphere. | 2021-12-23 |
20210397811 | Obfuscating Location Data Associated with a Physical Environment - Various implementations disclosed herein include devices, systems, and methods for obfuscating location data associated with a physical environment. In some implementations, a method includes obtaining, via an environmental sensor, environmental data corresponding to a physical environment. A first portion of the environmental data that corresponds to a first location is identified. In response to the first location being of a first location type, location data indicative of the first location is obfuscated from the environmental data by modifying the first portion of the environmental data. | 2021-12-23 |
20210397812 | IMAGE PROCESSING SYSTEM FOR WILDLIFE DETECTION AND METHOD THEREOF - A system and method for image processing for wildlife detection is provided which consists of object detection and object classification. An image capturing means capture one or more images. The image taken is converted to greyscale and re-sized and passed on to a Deep Neural Network (DNN). The image classification is executed by a processor via the Deep Neural Network in two steps. The second step is carried by a custom Convolutional Neural Network (CNN). The CNN classifies the detected object with certain parameters. After classifying a particular animal species in the captured image, it sends notifications, SMS, alerts to the surrounding neighbours. For a correct image classification, the feedback data is sent to the CNN for further re-training. Periodic retraining of the model with the images captured as part of the system execution adapts the system to a specific area being monitored and the wildlife in that area. | 2021-12-23 |
20210397813 | FINGERPRINT AUTHENTICATION DEVICE, DISPLAY DEVICE INCLUDING THE SAME, AND METHOD OF AUTHENTICATING FINGERPRINT - A fingerprint authentication device includes: a sensor unit configured to output a sensing signal by sensing a fingerprint; an image processing unit configured to generate a fingerprint image based on the sensing signal; a storage unit configured to store a template including an enrolled image; and a learning unit configured to generate a first pseudo image and add the first pseudo image to the template. | 2021-12-23 |
20210397814 | Optical-Type Fingerprint Recognition Display and Operation Method Thereof - The present disclosure related to an optical fingerprint identification display and a driving method thereof. In the optical fingerprint identification display and the driving method thereof, the fingerprint identification display includes: a display panel and a processor. The display panel includes a plurality of pixels arranged in a two-dimensional matrix. The pixel includes: at least one subpixel which emits light on the basis of a first signal received from the processor; and an optical sensor which receives the light emitted from the subpixel and is reflected from a fingerprint and generates a second signal. The processor determines a touch region on the display panel, and transmits the first signal to one or more pixels included in the touch region, and identifies the fingerprint of the user on the basis of the second signal received from the pixel. | 2021-12-23 |
20210397815 | Electronic Devices and Methods for Selecting Display Locations for Content Presentation - An electronic device includes a first display on a major surface, a second display positioned on another major surface, and optionally at least one imager collocated with the second display. One or more processors identify a predefined event occurring and select whether to present content on the first display or the second display. The one or more processors can cause an imager to capture at least one image. When image matches a first predefined criterion, the one or more processors cause a presentation of content to occur on the first display. When the image matches a second predefined criterion, the one or more processors cause the presentation of the content to occur on the second display. The one or more processors can also compare sizes of the first touch sensitive display portion and the second touch sensitive display portion to select between the first display and the second display. | 2021-12-23 |