52nd week of 2019 patent applcation highlights part 45 |
Patent application number | Title | Published |
20190392063 | REDUCING DATA LOSS IN REMOTE DATABASES - Systems and methods for reducing data loss in remote databases. One method includes detecting, with an electronic processor communicatively coupled to the remote database, a failure of a user session with the remote database. The method includes, in response to determining the failure of the user session, performing, with the electronic processor, an offline detection check for the user session, the offline detection check including a canary check on a known resource related to the remote database. The method includes, in response to the offline detection check indicating that the remote database is offline, setting the user session to read-only, displaying, within a graphical user interface of the user session, an offline indicator, and graphically marking the at least one outstanding request within the user session. | 2019-12-26 |
20190392064 | CYBER INTELLIGENCE SYSTEM AND METHOD - Aspects of the subject disclosure may include, for example, a device that includes a processing system including a processor, and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, where the operations include receiving intelligence requirements from sources authenticated through a blockchain distributed ledger, normalizing data received by the sources, wherein the normalized data complies with the intelligence requirements, and generating a recommendation or course of action based on the normalized data. Other embodiments are disclosed. | 2019-12-26 |
20190392065 | SYSTEMS AND METHODS FOR PROVIDING FLEXIBLE DATA ACCESS - Methods and systems are presented for accessing various data values in a record stored in a data store independently from other data values in the record and without taking computationally expensive or storage-intensive procedures such as de-serializing a record based on a primary key. A data service module is provided to access each record in a data store, and generate for the records a table including a map of key-value pairs representing the data values in the records. When the data service module receives a request from an application for accessing a first data value in a first record, the data service module may retrieve a first key-value pair corresponding to the first data value in the first record without de-serializing the record. The data service module then provides a first value of the first key-value pair to the application. | 2019-12-26 |
20190392066 | Semantic Analysis-Based Query Result Retrieval for Natural Language Procedural Queries - Various embodiments describe techniques for retrieving query results for natural language procedural queries. A query answering (QA) system generates a structured semantic representation of a natural language query. The structured semantic representation includes terms in the natural language query and the relationship between the terms. The QA system retrieves a set of candidate query results for the natural language query from a repository, generates a structured semantic representation for each candidate query result, and determines a match score between the natural language query and each respective candidate query result based on the similarity between the structured semantic representations for the natural language query and each respective candidate query result. A candidate query result having the highest match score is selected as the query result for the natural language query. In some embodiments, paraphrasing rules are generated from user interaction data and are used to determine the match score. | 2019-12-26 |
20190392067 | Automatic Query Offloading to a Standby Database - Embodiments allow a primary database system (“primary”) to automatically detect queries directed to the primary database that may be offloaded to a standby database system (“standby”), and then to automatically offload the offload-eligible queries to a standby. The primary identifies offload-eligible queries based on a record of up-to-date database objects within each standby that replicates the primary database. The record of up-to-date standby objects is updated based on heartbeat messages from each standby, and commit timestamps for transactions on the primary. Evaluation of whether a query is offload-eligible is triggered by one or more trigger conditions that include: inclusion of an offload optimizer hint in the query, an estimated run-time of the query, etc. Embodiments further allow an offloaded query over particular changed data in the primary database to access, on a standby database, uncommitted changes made to the particular data in the primary database. | 2019-12-26 |
20190392068 | HYBRID DECLARATIVE QUERY COMPILER AND OPTIMIZER FRAMEWORK - Techniques are described herein for building a framework for declarative query compilation using both rule-based and cost-based approaches for database management. The framework involves constructing and using: a set of rule-based properties tables that contain optimization parameters for both logical and physical optimization, a recursive algorithm to form candidate physical query plans that is based on the rule based tables, and a cost model for estimating the cost of a generated physical query plan that is used with the rule based properties tables to prune inferior query plans. | 2019-12-26 |
20190392069 | ADVANCED FORMULAS PLANNING SCRIPT CONVERSION PLATFORM - Some embodiments are associated with an analytics cloud environment. A user interface may facilitate generation of an advanced formulas planning script by a user. The advanced formulas planning script may be stored, for example, in a planning script data store. An analytic data cube may contain a multidimensional dataset usable for analysis via queries. A conversion platform may receive the advanced formulas planning script and automatically create a structured query language stored procedure based on the advanced formulas planning script. The conversion platform may then execute the structured query language stored procedure on the analytic data cube to calculate a result comprising a base cell and at least one cell has a different point of view associated with the analytic data cube as compared to a calculation source. The calculated result man then be provided to the user. | 2019-12-26 |
20190392070 | DATA MODEL DATABASE - Systems and methods utilize a data model database which includes a plurality of symbol data types. Each of the plurality of symbol data types have one or more symbol data fields. The data model database further includes a plurality of concrete data types. Each of the concrete data types have one or more language-agnostic concrete fields associated with each of the one or more symbol data fields. Each of the one or more language-agnostic concrete fields apply one or more concrete constraints to each of the corresponding symbol data fields. The data model database further includes a plurality of carrier data types. The plurality of carrier data types having one or more language-specific carrier fields associated with each of the one or more language-agnostic concrete fields. Each of the one or more language-specific carrier fields apply one or more carrier constraints to each of the corresponding language-agnostic concrete fields. | 2019-12-26 |
20190392071 | SYSTEM AND METHOD FOR GENERATING RESILIENCE WITHIN AN AUGMENTED MEDIA INTELLIGENCE ECOSYSTEM - Aspects of the present disclosure involve systems, methods, devices, and the like for augmented media intelligence using Artificial Intelligence (AI), Machine Learning (ML), Natural Language Processing (NLP), data analytics and data visualization. In one embodiment, a system is introduced that can retrieve real-time data from social media platforms to perform augmented media intelligence analysis and take real time actions if necessary. In another embodiment, the augmented media intelligence is design to use the machine learning and natural language processing capabilities to determine a resilience measure for determining how to respond to a media event. | 2019-12-26 |
20190392072 | KEY-VALUE REPLICATION WITH CONSENSUS PROTOCOL - A replicated key-value store is implemented using a “last-write-wins” consensus protocol. To improve throughput and latency in cross-data-center configurations, a system deploys a cross-cluster, learner-only member to a cluster of nodes (e.g., a data center). The cross-cluster, learner-only member submits key-values received at local leader members to remote clusters. Conflicts between the key-values and initial values at the remote clusters are resolved using a “last-write-wins” consensus protocol. | 2019-12-26 |
20190392073 | TAXONOMIC TREE GENERATION - A computing system generates a taxonomic tree for a domain in an unsupervised manner (e.g., without human intervention). Hierarchical structures of documents of the domain are collected from a document index. A category for each node of each of the hierarchical structures is extracted. The extracted categories are embedded as multidimensional category vectors in a multidimensional vector space. The multidimensional category vectors are grouped into multiple groups. The multidimensional category vectors of a first group satisfy a similarity condition for the first group better than the multidimensional category vectors of a second group. Each group of the multidimensional category vectors constitutes a category cluster. Each category cluster includes multidimensional category vectors for extracted categories from different hierarchical levels of the hierarchical structures. The taxonomic tree is generated with each category cluster inserted as a category node of the taxonomic tree. | 2019-12-26 |
20190392074 | SCALABLE CAPTURING, MODELING AND REASONING OVER COMPLEX TYPES OF DATA FOR HIGH LEVEL ANALYSIS APPLICATIONS - The scalable high-level fusion of structured and unstructured data includes ingesting and processing unstructured data to produce a statistical model stored as extracted entities then mapped to a collection of resource description framework (RDF) triples, and applying a semantic analysis to a set of structured data to produce a logical model stored as a collection of triples. Reasoners are applied to both models generating an extended knowledge graph of both base and inferred knowledge that is decomposed into a wide table database, with each row storing a corresponding triple, and a reasoner converting the RDF triples into associated triples by adding a new column to the database in response to detecting a new predicate for a subject already present in one of the rows of the database so that the new predicate is stored in the new column in a new row created for the subject already present. | 2019-12-26 |
20190392075 | EFFICIENT DATA RELATIONSHIP MINING USING MACHINE LEARNING - Techniques and solutions are described for determining relationships in data with improved efficiency, including computing resource use. A plurality of attributes are selected for analysis. The attributes can be processed, such as to facilitate relationship determination. Relationships between attribute values are determined. Redundant relationships can be removed. Distances are determined between relationships and used to select a sample of relationships. The sample is labelled by a user and used to train a machine learning classifier. The machine learning classifier labels determined relationships. | 2019-12-26 |
20190392076 | INTELLIGENT PLANT OPERATOR LOG BOOK INFORMATION RETRIEVAL MECHANISM USING LATENT SEMANTIC ANALYSIS AND TOPIC MODELING FOR CONNECTED PLANTS - This disclosure provides an apparatus and method for intelligent data access using latent semantic analysis and topic modeling. A method includes receiving, by a semantic query processing engine, a set of operator logbooks that include computer-readable text, receiving a natural language query, performing latent semantic analysis on the set of operator logbooks that include computer-readable text and the natural language query, and generating an ordered list of operator logbooks from the set of operator logbooks that include computer-readable text, wherein the ordered list of operator logbooks is ordered by relevance to the natural language query as determined using the latent semantic analysis. | 2019-12-26 |
20190392077 | FACET-BASED QUERY REFINEMENT BASED ON MULTIPLE QUERY INTERPRETATIONS - Facet-based query refinement based on multiple query interpretations is provider through a process that includes receiving a query for querying documents, of a whole document set, that deviate by one or more facet values. The process generates different query interpretations from query text of the query. The process executes the different query interpretations to obtain resulting document sets. For each different query interpretation, the executing executes the query interpretation to obtain a resulting document set corresponding to that query interpretation, and identifies facet values represented in the resulting document set. The process builds and presents to a user a query refinement interface, presenting the different query interpretations and properties of the resulting document sets, as well as, for each of the one or more facet values, and relative to each other, facet value representation of the facet value in each of the resulting document sets. | 2019-12-26 |
20190392078 | TOPIC SET REFINEMENT - A computing system including one or more processors generates a topic set for a domain. A taxonomic evaluator is executed by the one or more processors to evaluate a set of category clusters generated from domain-specific textual data against a domain-specific taxonomic tree based on a coherency condition and to identify the category clusters that satisfy the coherency condition. The domain-specific taxonomic tree is generated from hierarchical structures of documents relating to the domain. Each identified category cluster is labeled with a label. A topic set creator is executed by the one or more processors to insert the labels of the set of identified category clusters into the topic set for the domain. | 2019-12-26 |
20190392079 | HOLISTIC MAPPING AND RELOCATION OF SOCIAL MEDIA ASSETS - A method, computer program product, and system for generating holistic maps and relocating social media assets. The computer may receive a plurality of social media assets to be relocated or merged from a user. A snapshot of each asset within the plurality of social media assets may be generated. The snapshot may be a record of the plurality of social media assets at any one time. A machine learning model may be generated for the plurality of social media assets based on the generated snapshot. A projected location may be identified based on the generated machine learning model. A new snapshot may be generated based on the projected location. It may be determined whether a transaction was successful based on a comparison of the snapshot with the new snapshot. An action may be performed based on the determination. | 2019-12-26 |
20190392080 | METHOD AND COMPUTING DEVICE FOR FILTERING A SET OF RECORDS ON A USER INTERFACE - A method for filtering a set of records on a user interface involves displaying a set of records, each record of the set comprising a first field and a second field; removing, from the displayed set, one or more records according to a filter of the first field, thereby leaving a subset of the set of records displayed; displaying filters for the second field; and for at least one of the displayed filters, visually indicating that, due to a currently-applied filter, the at least one displayed filter does not apply to any of the records of the subset. | 2019-12-26 |
20190392081 | SYSTEM AND METHOD FOR SEARCHING INFORMATION ACROSS MULTIPLE DATA SOURCES - A system and method are provided for constructing query links which produces executable predefined hypertext links useful for mining data. Simple inputs (such as search terms) are converted into executable hypertext links. Searches can be automatically executed from the touch of a button or the like across multiple search engines and publicly accessible databases, from a centralized master console. The generated output code allows exhaustive internet searches to be performed in a remote automated manner quickly and easily through massive amounts of data with a high degree of accuracy. Furthermore, a complete end-to-end data mining solution is disclosed that includes processes that occur prior to construction of the query links as well as those that occur afterwards, including employing artificial intelligence techniques so as to return more meaningful and relevant data. | 2019-12-26 |
20190392082 | COMPREHENSIVE SEARCH ENGINE SCORING AND MODELING OF USER RELEVANCE - A query for one or more resources is received. One or more tokens associated with the query is identified based on running the query through a learning model. The one or more tokens correspond to one or more terms that the query shares context similarity to based on a history of user selections. One or more search result candidates are scored based at least on the context similarity between the one or more tokens and the query. | 2019-12-26 |
20190392083 | WEB CONTENT CAPTURE AND VALIDATION CRYPTOGRAPHY - A method and system for web content capture and validation. The method includes receiving navigation instructions from a user to capture web content, automatically executing the navigation instructions along with content specific plug-in algorithms to arrange content for capture through a secure server, packaging the captured content along with the instructions, making the package available for download and encrypting the package with a digital signature such that a user may independently verify the integrity of the package. Additionally, the method includes a cloud component such that a user may optionally store captured content in the cloud and download the content at any time. | 2019-12-26 |
20190392084 | DIGITAL SUPPLEMENT ASSOCIATION AND RETRIEVAL FOR VISUAL SEARCH - Systems and methods for identification and retrieval of content for visual search are provided. An example method includes receiving data specifying a digital supplement. The data may identify a digital supplement and a supplement anchor for associating the digital supplement with visual content. The method may also include generating a data structure instance that specifies the digital supplement and the supplement anchor and, after generating the data structure instance, enabling triggering of the digital supplement by an image based at least on storing the data structure instance in a database that includes a plurality of other data structure instances. The other data structure instances may each specify a digital supplement and one or more supplement anchors. | 2019-12-26 |
20190392085 | SEARCH EXPLORATION USING DRAG AND DROP - A method and system for search exploration in a mobile application environment as well as a desktop environment is provided. The method and system utilize at least one computer processor to perform the steps of selecting a virtual object on a display interface via an indicator positioned within and associated with the virtual object. The computer processor provides dragging the indicator out of a home area and displaying at least one related property associated with the virtual object on the display while dragging outside of the home area. The computer processor provides dragging the indicator onto one or more of the at least one related property associated with the virtual object and a pausing of the indicator over at least one related property causes the computer processor to select the related property as a search parameter of a search query. Dropping the dragged indicator initiates a search based on said search query and the search is initiated based on the search query as a result of said dropping. | 2019-12-26 |
20190392086 | Methods and Systems to Model Undiscovered Accumulations - Methods and systems to spatially model individual features or accumulations which are undiscovered but conceptualized or expected to exist sporadically within areas. These include physical properties, materials, minerals, environmental contamination, organisms, and energy of all types. The model(s) may be used to optimize technical concerns with respect to these features such as hydrocarbon accumulations. The resulting model(s) may improve efficiency of investments in acquisition of mineral interests, exploration well locations among other uses. | 2019-12-26 |
20190392087 | METHOD FOR CONSTRUCTING A 3D DIGITAL MODEL FROM A 2D PLAN - A method, implemented by a computer, for constructing a 3D digital model of a building from a 2D plan of the building, the building having a geometry defined by at least one geometric parameter, the method comprising a plurality of steps, at least one of the steps requiring an input of at least one internal parameter, the method being wherein it comprises a step of selecting a set of parameter values without human intervention. | 2019-12-26 |
20190392088 | SMART CONSTRUCTION WITH AUTOMATED DETECTION OF ADVERSE STRUCTURE CONDITIONS AND REMEDIATION - Methods and apparatus for smart construction with automated detection of adverse structure conditions and remediation. A sensor cluster may be inserted into the walls of a smart structure (during construction or afterwards) to detect an array of conditions, such as temperature, humidity, and the presence of undesirable insects (which may be accomplished through, for example, vibration sensors). The sensor cluster may also have a remedial action device capable of resolving any undesirable conditions. For example, upon detection of wood-destroying organisms via vibration sensors, the remedial action device may deploy ultraviolet light or insecticide to automatically exterminate the wood-destroying organisms. In some embodiments, data from the sensor cluster may be displayed on a graphical user interface. | 2019-12-26 |
20190392089 | AUTOMATED REGION BASED OPTIMIZATION OF CHIP MANUFACTURE - Technical solutions are described herein for fabrication of a chip with optimized chip design during the logical synthesis phase of the fabrication. An example method includes optimizing, by a physical synthesis system, a chip design for a chip to be fabricated, the optimization performed according to a first performance metric for the entire chip. The method further includes receiving, by the physical synthesis system, a feedback input comprising a region of the chip and a second performance metric associated with the region. The method further includes modifying, by the physical synthesis system, the chip design by optimizing the region of the chip according to the second performance metric. The method further includes sending, by the physical synthesis system, the modified chip design for fabrication of the chip. | 2019-12-26 |
20190392090 | TECHNIQUE FOR DESIGNING ACOUSTIC MICROWAVE FILTERS USING LCR-BASED RESONATOR MODELS - A method for designing a narrowband acoustic wave microwave filter including: generating a modeled filter circuit design having circuit elements including an acoustic resonant element defined by an electrical circuit model that includes a parallel static branch, a parallel motional branch, and one or both of a parallel Bragg Band branch that models an upper Bragg Band discontinuity and a parallel bulk mode function that models an acoustic bulk mode loss; and generating a final circuit design. Generating the final circuit design includes optimizing the modeled filter circuit design to generate an optimized filter circuit design; comparing a frequency response of the optimized filter circuit design to requirements; selecting the optimized filter circuit design for construction into the actual acoustic microwave filter based on the comparison; and transforming the optimized filter circuit design to a design description file for input to a construction process. | 2019-12-26 |
20190392091 | BENEFIT APPORTIONING SYSTEM AND METHODS FOR VEHICLE PLATOONS - The systems and methods described herein disclose vehicle positioning and benefit distribution in a vehicle platoon. As described here, vehicles are organized in the platoon based on maximum benefit to the platoon as a whole. The systems and methods then determine the difference in benefit received between each platoon member and equalize between members. The systems and methods can include determining cumulative travel benefits for a group of vehicles. A platoon organization can then be created to achieve the cumulative travel benefits. A platoon can then be created using the platoon organization. The benefit distribution of the platoon can then be determined. Then, the actualized benefits can be apportioned to the one or more platoon members based on the benefit distribution. | 2019-12-26 |
20190392092 | Method and System for Generating Simulation Grids by Mapping a Grid from the Design Space - Geologic modeling methods and systems disclosed herein employ an improved simulation gridding technique. For example, an illustrative geologic modeling method may comprise: obtaining a geologic model representing a faulted subsurface region in physical space; mapping the physical space geologic model to a design space model representing an unfaulted subsurface region; gridding the design space model to obtain a design space mesh; partitioning cells in the design space mesh with faults mapped from the physical space geologic model, thereby obtaining a partitioned design space mesh; mapping the partitioned design space mesh to the physical space to obtain a physical space simulation mesh; and outputting the physical space simulation mesh. | 2019-12-26 |
20190392093 | Methods and Systems for Simulation Gridding with Partial Faults - Geologic modeling methods and systems disclosed herein employ an improved simulation meshing technique. One or more illustrative geologic modeling methods may comprise: obtaining a geologic model representing a faulted subsurface region in physical space; providing a set of background cells that encompass one or more partial faults within the subsurface region; defining a pseudo-extension from each unterminated edge of said one or more partial faults to a boundary of a corresponding background cell in said set; using the pseudo-extensions and the background cell boundaries to partition the subsurface region into sub-regions; deriving a simulation mesh in each sub-region based on the horizons in each sub-region; and outputting the simulation mesh. | 2019-12-26 |
20190392094 | WATERSHED MARCHING-DELINEATION ALGORITHM - The constrained watershed boundary (CWB), defined as a polygon containing all the flow direction grid cells with a surface flow distance less than a user prescribed threshold uses an algorithm that builds upon the HSM algorithm proposed and augments the data structure with a flow distance grid calculated directly from the original flow direction grid. | 2019-12-26 |
20190392095 | INTER-ARTIFACT GENERATION FOR INTERFACES OF A MODELED SYSTEM - Systems and methods may support inter-artifact generation for interfaces of a modeled system. In some implementations, a system may include an inter-artifact model repository that stores system model data of a model system as well as an artifact extraction engine configured to extract system model data from a system artifact that represents the modeled system and store the extracted system model data in the inter-artifact model repository. The system may further include an artifact generation engine configured to generate a different system artifact that represents the modeled system using at least some of the extracted system model data extracted from the system artifact. | 2019-12-26 |
20190392096 | HYBRID MODELING FOR A DEVICE UNDER TEST ASSOCIATED WITH A TWO-PHASE COOLING SYSTEM - Techniques that facilitate hybrid modeling for a device under test associated with a cooling system (e.g., a two-phase cooling system) are provided. In one example, information indicative of a first model of a device under test associated with a cooling system is determined. Second information indicative of constraints that define values for an operational quantity related to the cooling system is also determined. Information indicative of a second model for the device under test is generated based on the information indicative of the first model and the second information indicative of the one or more constraints. In an aspect, a first simulation process is performed to determine first thermal properties for a first simulation domain associated with the device under test. In another aspect, a second simulation process is performed to determine second thermal properties for a second simulation domain associated with the device under test. | 2019-12-26 |
20190392097 | SIMULATION METHOD AND SYSTEM FOR REAL-TIME BROADCASTING - Provided is a simulation method and system for real-time broadcasting. A simulation method may include verifying an action set for a mechanical object, and displaying a movement of the mechanical object in response to the action using a line that connects a start location of the movement and an end location of the movement. | 2019-12-26 |
20190392098 | Learning Expected Operational Behavior Of Machines From Generic Definitions And Past Behavior - In an embodiment, a data processing method comprises storing one or more generic machine operating definitions, wherein each of the generic machine operating definitions describes expected operational behavior of one or more types of machines during one or more operating states; analyzing operating data that describes past operation of a plurality of machines of a plurality of types; based at least in part on the operating data and the one or more generic machine operating definitions, generating and storing one or more machine operating models that describe expected operational behavior corresponding to a plurality of operating states of the plurality of machines; wherein the one or more machine operating models comprise a plurality of data patterns, wherein each of the data patterns is associated with a different set of one or more operating states of one or more machines; wherein the method is performed by one or more computing devices. | 2019-12-26 |
20190392099 | METHOD AND APPARATUS FOR MODELING ELECTROMAGNETIC FIELDS USING HERMITE FINITE ELEMENTS - Embodiments of the innovation relate to, in a modeling apparatus, a method of identifying electromagnetic behavior of an electronic component. The method includes receiving, by the modeling apparatus, geometric design criteria and material property criteria for the component; defining, by the modeling apparatus, a set of finite elements representing the component based upon the geometric design criteria and material property criteria; applying, by the modeling apparatus, a Hermite finite element method function to each finite element to define an electromagnetic field for each finite element; applying, by the modeling apparatus, a divergence-free condition at each node of each finite element to define an electromagnetic field at each node; and based upon application of the Hermite finite element method function and the divergence free condition to generate the electromagnetic fields, generating, by the modeling apparatus, a model of the electromagnetic behavior of the component. | 2019-12-26 |
20190392100 | STORAGE MEDIUM WHICH STORES INSTRUCTIONS FOR A SIMULATION METHOD IN A SEMICONDUCTOR DESIGN PROCESS, SEMICONDUCTOR DESIGN SYSTEM THAT PERFORMS THE SIMULATION METHOD IN THE SEMICONDUCTOR DESIGN PROCESS, AND SIMULATION METHOD IN THE SEMICONDUCTOR DESIGN PROCESS - A non-transitory computer-readable storage medium stores instructions. When executed by a computer, the instructions cause the computer to perform a method for a semiconductor design simulation. The method may include generating first polygon meshes, transforming the first polygon meshes to first level sets, performing logical operations on the first level sets to generate second level sets, and transforming the second level sets to second polygon meshes. | 2019-12-26 |
20190392101 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processing device includes: a memory; a processor coupled to the memory and configured to: perform, based on input descriptions of a first circuit module that performs a first task and a second circuit module that receive data output from the first circuit module and performs a second task, high-level synthesis of the first circuit module and the second circuit module; synthesize an interface circuit that includes a memory that performs data transfer between the circuit modules based on write information of the data and read information of the data; calculate a minimum operation start interval of the interface circuit based on the write information of the data and the read information of the data; and provide, when the calculated minimum operation start interval is larger than a minimum operation start intervals of the first circuit module and the second circuit module, a storage element in the interface circuit. | 2019-12-26 |
20190392102 | UNIFIED GEOMETRIES FOR DYNAMIC HIGH-PERFORMANCE COMPUTING - A simulation system receives a request to perform a function for a model having a specified geometry. The function is received as an interface that is not geometry specific. The simulation system determines the type of geometry of the model. If the simulation system determines that the geometry of the model is structured, a simulation engine of the simulation system executes a structured geometry specific implementation of the function. The structured geometry specific implementation of the function procedurally determines simulation data associated with the model. If the simulation system determines that the geometry of the model is not structured, or if the simulation system determines that the geometry of the model is unstructured, the simulation engine of the simulation system executes an unstructured geometry specific implementation of the function. The unstructured geometry specific function access a memory of a computing device for obtaining the simulation data associated with the model. | 2019-12-26 |
20190392103 | Error Detection Technique Based on Identifying Data Trend Issues - Various implementations described herein are directed to a system and methods for validating data points associated with an integrated circuit. In one implementation, the method may include retrieving data table associated with an integrated circuit, wherein the data table includes characterized electrical data associated with one or more cells of the integrated circuit. Further, the method may include converting the data table to one or more relative matrices. The one or more relative matrices are analyzed to determine a trend formed by entries of the one or more relative matrices. Further, the method may include determining whether one or more entries of the one or more relative matrices deviate from the trend. In response to the determination, the data table is flagged. | 2019-12-26 |
20190392104 | Systems and methods for inter-die block level design - An integrated circuit and a method for designing an IC where the smallest repeatable block is selected, designed and tested to span across multiple die levels. The block is configured to be timing closed at the block level thereby reducing the overall complexity of the design and avoiding the limiting effects of the constrained EDA tools. The block may subsequently be repeated on multiple die to be stacked in an IC. | 2019-12-26 |
20190392105 | SYSTEMS AND METHODS FOR OBFUSCATING A CIRCUIT DESIGN - Systems and methods for obfuscating a circuit design are described. One of the methods includes receiving the circuit design from a user computing device. The circuit design includes a plurality of circuit components. The method further includes obfuscating each of the circuit components by transforming layout features associated with the circuit design into a generic layout feature representation. The generic layout feature representation excludes scaled representations of the layout features. The method also includes generating a visual representation of the obfuscated designs. Each of the obfuscated designs has an input port and an output port. The method further includes enabling placement of the obfuscated designs and routing between the input ports and the output ports of the obfuscated designs. The method includes generating an obfuscated integrated circuit design having a master input port, a master output port, the obfuscated designs, and the routing between the obfuscated designs. | 2019-12-26 |
20190392106 | OPTIMIZING LIBRARY CELLS WITH WIRING IN METALLIZATION LAYERS - Original cell design rule violations with respect to a second wiring layer are identified, while conductors of the second wiring layer are in an original position. The conductors of the second wiring layer are offset into different offset positions, and then the process of identifying violations is repeated for each of the offset positions. With this, metrics are generated for the original cell for the original position and each of the offset positions. Then, the original cell or the pitch of the second wiring layer are altered to produce alterations. The processes of identifying violations, offsetting conductors in the second wiring layer, repeating the identification of violations for all offsets, and generating metrics are repeated for each of the alterations. The original cell or one of the alterations is then selected, based on which cell produces the lowest number of violations of the design rules. | 2019-12-26 |
20190392107 | ACCESS AND PORTABILITY OF USER PROFILES STORED AS TEMPLATES - A system to access one or more user profiles that govern one or more vehicle functions. The system cooperates with a processor and verification module which are adapted to verify, using one or more of biometric information, gesture recognition, facial recognition and device identification information, that a user has authority to access the one or more user profiles, where the one or more profiles are stored in one or more of a vehicle, a cloud and a communications device. An edit module is further provided and adapted to allow the user to make one or more edits to the one or more user profiles. | 2019-12-26 |
20190392108 | METHOD AND LAYOUT OF AN INTEGRATED CIRCUIT - A method of manufacturing an integrated circuit includes identifying a first cell of a layout, placing a first pair of conductive patterns on a first set of routing tracks, placing a second pair of conductive patterns on a second set of routing tracks, and forming, by a first mask, a first set of conductive structures based on the first pair or second pair of conductive patterns. The first cell abuts a second cell. The first cell has a first set of routing tracks. The second cell has a second set of routing tracks. The first and second cell have a same cell height that is a non-integer multiple of a minimum pitch. A top and bottom boundary of the first cell overlaps a pair of the first set of routing tracks. A top and bottom boundary of the second cell overlaps a pair of the second set of routing tracks. | 2019-12-26 |
20190392109 | Clock tree synthesis method - The invention discloses a clock tree synthesis method including steps of: determining a driving strength of a clock cell; determining a reserved space corresponding to the clock cell according to the driving strength; generating the clock cell and the reserved space, wherein the reserved space is adjacent to the clock cell; setting a decoupling capacitor filler cell in the reserved space, wherein the area and/or capacitance of the decoupling capacitor filler cell are/is associated with the driving strength; and fixing the attribute(s) of the clock cell and the attribute(s) of the decoupling capacitor filler cell. | 2019-12-26 |
20190392110 | MODIFYING LAYOUT BY REMOVING FILL CELL FROM FILL-DENSE REGIONS AND INSERTING DUPLICATE IN TARGET FILL REGION - The disclosure provides a method including: identifying a fill-dense region of an integrated circuit (IC) layout having a plurality of fill cells, and a target fill region of the IC layout adjacent to the fill-dense region and free of fill cells; modifying the IC layout by removing a fill cell from the fill-dense region and inserting a duplicate of the removed fill cell within the target fill region to at least partially fill the target fill region; and providing instructions to manufacture an IC using the modified IC layout. The method may reduce a feature density of the fill-dense region to less than an allowable feature density, while adding fill features to otherwise unfillable regions. | 2019-12-26 |
20190392111 | HYBRID DESIGN LAYOUT TO IDENTIFY OPTICAL PROXIMITY CORRECTION-RELATED SYSTEMATIC DEFECTS - Defects can be identified using a hybrid design layout that includes a printable layer and a non-printed layer. The hybrid design layout can be generated by incorporating at least a portion of the non-printable layer layout with the printable layer layout. Defects can be identified using optical or scanning electron beam images. | 2019-12-26 |
20190392112 | Systems and Methods Calculating Particle-Level Chemical Engineering and Spectrometry by Orthogonal Segments of Subatomic Particles Calculating Specialized Anisotropic Force Based upon Rotatable Axis for Such Subatomic Particles - Prior art methods of calculating chemical bonds, and chemical reactions utilize empirical or statistical methods. My prior filing teachings describe a magnetic-like field, called ‘nucleomagnetics’, for each particle, which aids calculations of the position, velocity, bonding strength, and other attributes gets calculated by previous filings in this series. The prior filings allow three-dimensional calculations for electrons relative to a nucleus, its particles, and its nucleomagnetics axis, as a set, in that frame of reference. My prior filings focused on methods related to that nucleomagnetics field from the nucleus particles. From that basis, the electron positions, shells, subshells, and bonding angles calculate. This filing adds the systems and methods a) to calculate forces from or to other particles with their nucleomagnetics axis, beyond the nucleus upon which filings previously focused, b) methods to calculate derivative force, including surface-force-differential tensors at the particle level using that nucleomagnetics invention; c) multiple-atom and multi-molecules interactions such as chemical reactions, and d) determine a time-sequence based upon those other particles operating freely, including their rotation, and d) include calculation of external forces, including traditional magnetics and gravity, and e) create engineering systems, including software for all steps and processes. Further, this adds f) other particles with no electrostatic charge, such as photons and neutrinos. | 2019-12-26 |
20190392113 | CRYSTALLINE METALLOPHOSPHATES, THEIR METHOD OF PREPARATION, AND USE - A family of crystalline microporous metallophosphates designated AlPO-90 has been synthesized represented by the empirical formula | 2019-12-26 |
20190392114 | APPARATUS AND METHODS FOR RIGHTS-MANAGED DATA DELIVERY - Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is utilized in order for a user device to determine whether to provide content to a subscriber. The user device is first registered to content delivery the network; the device then requests a rights profile indicating the rights of the subscriber associated with the device to access content. The rights profile is transmitted to the device. The rights profile may be configured to be valid only for a pre-determined time, thus enabling a subscriber's rights to be updated (including revoked). Security mechanisms may also be utilized to ensure access to content is limited only to authorized subscribers. In another embodiment, a user-based authentication procedure is utilized, thereby making the rights determination and content provision process completely agnostic to the underlying hardware. | 2019-12-26 |
20190392115 | Code Signing System and Method - A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library. | 2019-12-26 |
20190392116 | METHOD AND SYSTEM FOR CONDITIONAL ACCESS VIA LICENSE OF PROPRIETARY FUNCTIONALITY - A method and system for securely and traceably enabling playing back of content on a playback device of a plurality of playback devices, in which each of the plurality of playback devices comprises a cryptographic function module (CFM). In one embodiment, the method comprises accepting a first input in the playback device from a content licensing agency; generating, in the device, a first output from the first input according to a proprietary cryptographic function using the CFM, the first output necessary to enable playback of the content by the playback device, the proprietary cryptographic function being one of a family of proprietary cryptographic functions executable by the CFM of each of the plurality of playback devices; and enabling the playback of the content by the device at least in part according to the first output. | 2019-12-26 |
20190392117 | SECURE SHARING OF LICENSE DATA IN COMPUTING SYSTEMS - Techniques for secure sharing of data in computing systems are disclosed herein. In one embodiment, a method includes when exchanging data between the host operating system and the guest operating system, encrypting, at a trusted platform module (TPM) of the host, data to be exchanged with a first key to generate encrypted data. The method also includes transmitting the encrypted data from the host operating system to the guest operating system and decrypting, at the guest operating system, the transmitted encrypted data using a second key previously exchanged between the TPM of the host and a virtual TPM of the guest operating system. | 2019-12-26 |
20190392118 | Blockchain Version Control - A method, computer system, and computer program product are provided for controlling access to a licensed software application. A blockchain-based version control system receives an access request from a user that requests access to the licensed software application. The version control system determines whether a user has accepted license terms for a current version of the licensed software application by querying a version control blockchain. Responsive To determining that the user has not accepted the license terms for the current version of the licensed software application, the version control system presents the user with a clickwrap agreement requiring the user to accept license terms for the current version of the licensed software application. Responsive to receiving acceptance of the license terms from the user, the user's acceptance of the license terms for the current version of the licensed software application is recorded in the version control blockchain. | 2019-12-26 |
20190392119 | BLOCKCHAIN-BASED LICENSE MANAGEMENT - Blockchain-based license management provides capabilities for managing licensable aspects of a plurality of IHSs (Information Handling Systems) participating in the blockchain comprised of individual license blocks that record licensing transactions. A licensing authority initiates the blockchain and modifies licensable aspects of a specific participating target IHS by distributing license blocks that include one or more license tokens and license logic specifying instructions for the target's evaluation of the license tokens. Each participating IHS validates the received license blocks and adds them to a local copy of the blockchain. If a participating IHS is the target, that IHS uses the license logic to determine licensing modifications indicated by the licensing token. Licensable aspects of the IHS may then be modified based on the determined licensing modifications. A participating IHSs may directly transfer licenses to another IHS through the transfer of license tokens and the corresponding license logic. | 2019-12-26 |
20190392120 | SECURE PROVISIONING AND MANAGEMENT OF DEVICES - Systems and methods for secure provisioning and management of computerized devices. The system may include a distributor appliance that is communicatively connected to the computerized device, and that is operable to receive a digital asset and to load the digital asset into the computerized device. It may include an optional digital asset management system that is connected via a secure communication channel to the distributor appliance, and that is operable to transmit the digital asset to the distributor appliance; and a provisioning controller that is connected via a secure communication channel to the distributor appliance and is connected via another secure communication channel to the optional digital asset management system, and that is operable to directly or indirectly transmit the digital asset to the distributor appliance. The computerized device is not fully functional before the digital asset is loaded into it. | 2019-12-26 |
20190392121 | USER IDENTIFICATION NOTIFICATION FOR NON-PERSONAL DEVICE - One embodiment provides a method, including: receiving, at a non-personal information handling device, user characteristic data associated with a user; determining, using a processor and based on the user characteristic data, an identity of the user; and providing, based on the determining, a user identification notification. Other aspects are described and claimed. | 2019-12-26 |
20190392122 | VERIFICATION REQUEST AUTHENTICATION MACHINE - A machine trains an artificial intelligence engine to facilitate authentication of a request to verify a user. The machine accesses a reference set of obfuscated geolocations generated from actual geolocations from which a device submitted requests to verify the user. The machine groups the obfuscated geolocations into geographical clusters based on a predetermined cluster radius value and calculates a corresponding representative geolocation for each geographical cluster and a corresponding variance distance from the representative geolocation for each geographical cluster. The machine then generates a reference location score based on the representative geolocations of the geographical clusters and on the variance distances of the geographical clusters. The machine trains an artificial intelligence engine to output that reference location score in response to the reference set being input thereto. The trained artificial intelligence engine may then be provided to one or more devices. | 2019-12-26 |
20190392123 | SYSTEMS AND METHODS FOR ESTABLISHING CONNECTIONS IN A NETWORK FOLLOWING SECURE VERIFICATION OF INTERESTED PARTIES - Systems and methods are provided for establishing personal connections in a network following secure verification of interested parties. The disclosed embodiments may involve a system comprising a memory and a processor. The disclosed embodiments may require unique sets of identification parameters of each user in order to ensure a user has been properly verified prior to use of the system. | 2019-12-26 |
20190392124 | CONTROLLING USER ACCESS TO A MEDICAL SYSTEM - Disclosed is a method for controlling user access to a medical system including a body-wearable medical device that can be, e.g., an insulin pump and/or a continuous glucose monitor. A remote controller is provided and has a user interface and can exchange data with the medical device. The remote controller is configured for entering, via the user interface, at least one command for execution by the medical device. The remote controller has a locked state in which entering medical device commands or other commands is disabled. In the locked state, the user is prompted to enter an identification code and the remote controller can be unlocked when the correct identification code is entered. In the unlocked state, entering of the medical device command is enabled. Alternatively, instead of entering a correct identification code, the remote controller can be switched to the unlocked state when a safety condition is met. | 2019-12-26 |
20190392125 | VARIABLE BIOMETRIC INFORMATION-BASED AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD USING THE SAME - An authentication system that uses personal variable biometric information which changes according to times and environments, and an authentication method using the same are disclosed. The variable biometric information-based authentication system includes: a mobile terminal configured to generate information regarding an ID that intends to access a facility or information requiring an access authority, and to collect variable biometric information, such that information regarding the ID and the variable biometric information are stored all together; and a variable biometric information management server configured to, when the mobile terminal requests a login command regarding the ID, verify validity of the login command regarding the ID based on the variable biometric information. Accordingly, a real data value of collected biometric information is not used in the authentication procedure, and the authentication procedure is performed only by using a figure or a form of a graph indicating a variation in a specific section or a data arithmetic value obtained by performing a predetermined arithmetic operation with respect to the real data value. Therefore, even if the biometric information used in the authentication procedure is leaked, a damage resulting therefrom can be inhibited. In addition, since a security level of the authentication procedure can be selectively determined, the security of the authentication procedure can be enhanced by combining different types of variable biometric information or by combining variable biometric information of a plurality of users. In addition, as the security level of the authentication procedure is selectively determined, the authentication procedure can be diversely utilized in an entering authentication to a facility such as an office or school or secure authentication in financial services such as account transfer, payment, etc. | 2019-12-26 |
20190392126 | Variable Biometric Information-Based Complex Authentication System and Complex Authentication Method Using the Same - A complex authentication system that uses personal variable biometric information which changes according to times and environments, and a complex authentication method using the same are disclosed. The variable biometric information-based complex authentication system includes: a mobile terminal configured to collect variable biometric information; a variable biometric information management server configured to store the variable biometric information received from the mobile terminal; and an agent server configured to, when the mobile terminal requests a login command regarding the ID, verify validity of the login command regarding the ID based on the variable biometric information. Accordingly, even if biometric information used in an authentication procedure is leaked, a damage resulting therefrom can be inhibited, and security of the authentication procedure can be enhanced by combining different types of variable biometric information or by combining variable biometric information of a plurality of users. | 2019-12-26 |
20190392127 | APPARATUS, METHOD, AND PROGRAM PRODUCT FOR CONTROLLING A BIOMETRIC READER - Apparatuses, methods, and program products are disclosed for controlling a biometric reader. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine, by use of the processor, whether a movement of the apparatus crosses a threshold. The code is executable by the processor to, in response to the movement of the apparatus crossing the threshold, adjust a biometric authentication algorithm. The code is executable by the processor to control a biometric reader based on the adjusted biometric authentication algorithm. | 2019-12-26 |
20190392128 | VERIFICATION REQUEST AUTHENTICATION MACHINE - A device authenticates a request to user. The device accesses a face image that depicts a face of the person and includes a characteristic noise pattern inserted by a camera of the device. The device also accesses a geolocation which the device captured the face image and puts the face image and the geolocation into an artificial intelligence engine that outputs a face score, device score, and a location score. The device next submits the request with the scores to a server machine and obtains an authentication score from the server machine. The device then presents an indication that the request to verify the person is authentic based on a comparison of the obtained authentication score to a threshold authentication score. | 2019-12-26 |
20190392129 | IDENTITY AUTHENTICATION METHOD - An identity authentication method verifies an identity by selecting a portion of the first biometric information and all or part of a second biometric information. The identity authentication method uses part of the biometric information of the user to perform authentication, which may improve the convenience of use. The identity authentication method adopts two biometric verifications, which may maintain the accuracy of the authentication. | 2019-12-26 |
20190392130 | AUTHENTICATION SYSTEM - An authentication system includes a user authentication unit. The user authentication unit performs User authentication by combining password authentication and handwriting authentication, the password authentication being performed by collating an entire character string of a password inputted using an operation input unit and a handwriting input unit with an entire character string of a registration password stored in storage unit, the handwriting authentication being performed by collating the handwriting information of a part of characters of the password inputted by the handwriting input unit with handwriting information of handwriting data of this inputted character stored in the storage unit. | 2019-12-26 |
20190392131 | IMAGE BASED APPARATUS AND METHOD THEREOF - A method and/or apparatus controls access to a digital resource. An image of a plurality of images is allowed to be selected, each of the images including one or more base lines, each of the base lines having a) non-linear sections, b) sections extending in multiple directions, or c) both non-linear sections and sections extending in multiple directions. Locations are determined where an alignment line intersects the one or more base lines in the selected image. Access to the digital resource is permitted if the locations are determined to be predetermined locations in the image associated with the digital resource prior to the determining. | 2019-12-26 |
20190392132 | PASSWORD AUTHENTICATION DEVICE AND ELECTRONIC APPARATUS - A password authentication device includes a display control unit that displays plurality of input key groups, an input operation unit operated by a user to select a soft key on the display screen to enable the input of a password, a sight line detection sensor that detects the direction of the line of sight of a user who operates the input operation unit, an operation target specifying part that specifies an input key group located at the end of the line of sight of the user among the plurality of input key groups, based on the direction of the line of sight detected by the sight line detection sensor, and a password acquisition part assumes an operation in the input operation unit as an operation for the input key group specified by the operation target specifying part and acquires a password inputted through the input operation unit. | 2019-12-26 |
20190392133 | SYSTEM AND METHOD FOR PRODUCING SECURE DATA MANAGEMENT SOFTWARE - A system for producing secure data management software, comprising at least one hardware processor adapted to: receive a plurality of data patterns, each comprising at least one data field identifier selected from a set of protected data field identifiers of at least one data repository, at least one output target, and an access instruction; identify in a plurality of computer instructions of the data management software one or more forbidden output instructions by matching one or more reaching definitions of some of the plurality of computer instructions with one or more of the plurality of data patterns; and remove the one or more forbidden output instructions from the plurality of computer instructions. | 2019-12-26 |
20190392134 | SECURE COMPUTER OPERATING SYSTEM THROUGH INTERPRETED USER APPLICATIONS - Systems, methods, and devices are provided for eliminating binary-level exploitable vulnerabilities in computer systems, making the computer systems more secure. Embodiments of the present disclosure can improve security using a computer system that can force user applications to be interpreted high-level language code, permitting the implementation of several well-defined security mechanisms in the computer system. | 2019-12-26 |
20190392135 | CO-EXISTENCE OF MANAGEMENT APPLICATIONS AND MULTIPLE USER DEVICE MANAGEMENT - Various examples for performing automated enrollments of client devices with a management service after being accessed by a staging user account are described. A client device can be configured to identify a user account active on the client device and determine whether the user account is a staging user account or an end user account associated with an intended recipient of the client device. In an instance in which the user account is the staging user account, the client device can create an event listener on the client device that monitors a subsequent login of a user account performed through an operating system of the client device, the subsequent login of the user account being the end user account. In an instance in which the subsequent login of the user account is detected by the event listener, the client device can perform an automated enrollment with a remote management service. | 2019-12-26 |
20190392136 | SANDBOXING OF SOFTWARE PLUG-INS - The disclosure provides an approach for installing and deploying a plug-in on a computer system so as to extend an extensible software. The plug-in is encapsulated in an installation file recognizable by the extensible software as indicating that the software modules within the installation file should be installed within their own local scope on the extensible software. The approach further provides a method for handling a request for an application programming interface by a service module of an installed plug-in. The method of handling the request includes determining whether the requested API is within a local scope of the service module, and if so, providing the API from the local scope, or otherwise, providing the API from the global scope of the extensible software. | 2019-12-26 |
20190392137 | SECURITY ANNOTATION OF APPLICATION SERVICES - Disclosed embodiments include systems, methods, and computer-readable media for maintaining and accessing security metadata associated with a micro service. Aspects include generating security metadata associated with a micro service. The security metadata may be separate from an executable portion of the micro service and define a plurality of security attributes of the micro service. Examples of security attributes include a security grade level for the micro service, a security sensitive operation that the micro service is programmed to perform, a function classification for the micro service, and an idempotence property for the micro service, among others. Aspects also include accessing the security metadata, and determining, based on the security metadata, whether to perform a control action of various different types for the micro service. | 2019-12-26 |
20190392138 | System and Method for Protecting Unknown Vulnerabilities in Smart Contracts - The invention relates to a system and method for injecting protection mechanisms into a smart contract code that may have unknown vulnerabilities. More specifically, the invention identifies key lines of code/commands that execute critical functions in a smart contract and injects additional code to monitor and prevent unwanted execution of said key lines of code/commands. | 2019-12-26 |
20190392139 | SYSTEM FOR PREVENTING MALICIOUS OPERATOR PLACEMENT IN STREAMING APPLICATIONS - In preventing malicious operator placement in a streaming application, a stream computing management system receives a submission of an operator graph for the streaming application. A scheduler of the stream computing management system places the operators across a plurality of computing nodes. A threat detector of the stream computing management system monitors placements of the operators during the submission of the operator graph and a runtime of the streaming application. The threat detector further monitors runtime activities of the operators of the streaming application. The threat detector compares the runtime activities of the operators of the streaming application with stored activities patterns. The threat detector determines whether any anomalies identified based on the comparing exceeds a risk tolerance threshold. In response to an anomaly exceeding the risk tolerance threshold, the scheduler changes a placement of at least one of the operators. | 2019-12-26 |
20190392140 | SECURITY INFORMATION ANALYSIS DEVICE, SECURITY INFORMATION ANALYSIS METHOD, SECURITY INFORMATION ANALYSIS PROGRAM, SECURITY INFORMATION EVALUATION DEVICE, SECURITY INFORMATION EVALUATION METHOD, SECURITY INFORMATION ANALYSIS SYSTEM, AND RECORDING MEDIUM - Provided is a security information analysis device. This security information analysis device is provided with: one or more security information collection units for acquiring security information, which indicates information pertaining to a certain security concept, from an information providing source capable of providing security information; and a learning unit for creating an analysis model for calculating the importance of the one or more security information collection units according to security information received as an input. The learning unit learns an analysis model according to security information included in one of training data by using training data including multiple pieces of security information, which is pre-collected and pertains to the certain security concept, such that the importance of a security information collection unit capable of acquiring another piece of security information included in the training data is increased. | 2019-12-26 |
20190392141 | SAFE GUARD DETECTION FOR UNEXPECTED OPERATIONS IN A MES SYSTEM - A method for performing a safe guard detection of unexpected operations launched by an operator for a manufacturing execution system (MED system) is based on a first database containing a set of operations, a set of operators, calendar information for a shift and calendar information for the equipment of the MES-system. The MES-systems further has a second database containing a login history of carried out logins of the operator. The detection of a malicious operation is carried out as to whether the operation complies with a set of rules defining allowed operations or with a learning module, in which specific roles of operators are contained and whether an operation complies with a specific role. In case of non-compliance, the operation is stored as an entry in an event trace file for generating alerts. | 2019-12-26 |
20190392142 | ANOMALY DETECTION FOR VEHICULAR NETWORKS FOR INTRUSION AND MALFUNCTION DETECTION - A security monitoring system for a Controller Area Network (CAN) comprises an Electronic Control Unit (ECU) operatively connected to the CAN bus. The ECU is programmed to classify a message read from the CAN bus as either normal or anomalous using an SVM-based classifier with a Radial Basis Function (RBF) kernel. The classifying includes computing a hyperplane curvature parameter γ of the RBF kernel as γ=f(D) where f( ) denotes a function and D denotes CAN bus message density as a function of time. In some such embodiments γ=f(Var(D)) where Var(D) denotes the variance of the CAN bus message density as a function of time. The security monitoring system may be installed in a vehicle (e.g. automobile, truck, watercraft, aircraft) including a vehicle CAN bus, with the ECU operatively connected to the vehicle CAN bus to read messages communicated on the CAN bus. By not relying on any proprietary knowledge of arbitration IDs from manufacturers through their dbc files, this anomaly detector truly functions as a zero knowledge detector. | 2019-12-26 |
20190392143 | SECURE MEMORY IMPLEMENTATION FOR SECURE EXECUTION OF VIRTUAL MACHINES - Secure memory implementation for secure execution of virtual machines. Data is processed in a first mode and a second mode, and commands are sent to a chip interconnect bus using real addresses, wherein the chip interconnect bus includes a number of bits for the real addresses. A memory controller is operatively coupled to a memory component. A secure memory range is specified by using range registers. If the real address is detected to be in the secure memory range to match a memory component address, a real address bit is inverted. If the real address is in the secure memory address hole, a security access violation is detected. If the real address is not in the secure address range and the real address bit is set, the security access violation is detected. | 2019-12-26 |
20190392144 | Managing Virus Scanning of Container Images - Virus scanning of container images can be managed. For example, container images can be received in a sequential order. The container images can then be analyzed to determine the contents of the container images. The container images can be arranged in a virus-scanning queue in an order that is different from the sequential order in which the container images were received based on the contents of the container images. The container images can then be scanned for viruses in the order in which the container images are arranged in the virus-scanning queue. | 2019-12-26 |
20190392145 | DETECTION OF PRINT-BASED SPOOFING ATTACKS - A method of assessing the possibility of an iris print-attack includes measurement of the eye movement of a person. One or more values (e.g., a feature vector) are determined based on the measured eye movements. Based on the determined values, an assessment is made of whether or not the person is engaging in an iris print-attack. | 2019-12-26 |
20190392146 | INTELLIGENT EVENT COLLECTION FOR CLOUD-BASED MALWARE DETECTION - An anti-malware application detects and remediates malware. The anti-malware application detects an event associated with a process and determines if the event matches an entry in an exclusions list. If the event is absent from the exclusions list, the anti-malware application monitors the operation of the process, logs the event data in an event log, and sends the event to a server to determine whether the process corresponds to malware. The anti-malware application updates the exclusions list based on the logged event if the process does not correspond to malware. The anti-malware application restores a file edited by the process to the saved copy of the original file prior to the file being edited by the process if the process corresponds to malware. | 2019-12-26 |
20190392147 | INTELLIGENT EVENT COLLECTION FOR ROLLING BACK AN ENDPOINT STATE IN RESPONSE TO MALWARE - An anti-malware application detects and remediates malware. The anti-malware application detects an event associated with a process and determines if the event matches an entry in an exclusions list. If the event is absent from the exclusions list, the anti-malware application monitors the operation of the process, logs the event data in an event log, and sends the event to a server to determine whether the process corresponds to malware. The anti-malware application updates the exclusions list based on the logged event if the process does not correspond to malware. The anti-malware application restores a file edited by the process to the saved copy of the original file prior to the file being edited by the process if the process corresponds to malware. | 2019-12-26 |
20190392148 | VALIDATION OF INSTALLATION OF REMOVEABLE COMPUTER HARDWARE COMPONENTS - Installation errors for removable hardware components are typically identified only after placing an IHS (Information Handling System) back into service. Upon servicing a removeable hardware component and powering the IHS, a hardware validation request may be issued during booting of the IHS. In certain instances, a technician may trigger a hardware validation request via keyboard inputs during booting. If a hardware validation request is detected, the IHS is diverted from booting to a hardware validation process that identifies the removeable hardware components coupled to the hardware connectors supporting removeable hardware and determines a support level for the removeable hardware components at their installed connector locations. If performance issues are indicated by the support level for the hardware component, a hardware installation recommendation is displayed. The technician may resume booting or perform additional service on the IHS based on the recommendation. | 2019-12-26 |
20190392149 | INFORMATION PROCESSING APPARATUS FOR DETECTING TAMPERING WITH SOFTWARE EXECUTED AT BOOT TIME, METHOD FOR REBOOTING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus includes a detector configured to detect tampering with at least one of a plurality of software components to be executed in accordance with a boot instruction, a storage unit configured to store information for enabling or disabling a function of detecting the tampering, and a rebooter configured to reboot the information processing apparatus on the basis of the information stored in the storage unit and on the basis of a time that elapses after receipt of the boot instruction. | 2019-12-26 |
20190392150 | NETWORK-ACCESSIBLE COMPUTING SERVICE FOR MICRO VIRTUAL MACHINES - An administrative agent running at a virtualization host of a network-accessible virtualized computing service determines that a first virtual machine is to be instantiated. The agent initiates at least a first configuration operation to enable connectivity for at least a portion of network traffic associated with the first virtual machine. The first configuration operation is performed at least in part using a first virtualization offloading card of the virtualization host. The agent causes a virtualization intermediary process of the virtualization host to launch one or more execution threads of the virtualization intermediary process to implement the first virtual machine. The intermediary process may be swapped to persistent storage, e.g., based on an analysis of resources of the virtualization host. | 2019-12-26 |
20190392151 | AUTOMATIC VERIFICATION METHOD AND SYSTEM - The application provides an automatic verification method and system, with the method executing in a startup procedure of a host electronic device and including: calculating specific to system information to obtain a set of verification values in the startup procedure when the host electronic device is booted up; comparing a verification value from the set of verification values with a preset verification value from a set of preset verification values according to a preset condition and obtaining a comparison result; decapsulating a key to substitute for a step of manually inputting a password when the comparison result indicates conformity; and decrypting the host electronic device with the key to complete the startup procedure. If the system information is desired to be changed, a proxy device is required to re-calculate according to the changed system information to obtain a new set of verification values to substitute the original preset verification values. | 2019-12-26 |
20190392152 | DEVICE LEVEL SECURITY - A method for implementing device level security is disclosed. The method involves detecting a device that has a security profile. The security profile has an incomplete parameter (or field) (e.g., make, model, device serial number, FDA class, protected health information, or operating system of the device). The method also includes receiving feedback from a first user to supply a data value for the incomplete parameter. The data value from the first user is validated by a second user (but can require multiple validations). The validated data value is used to identify on the device, potential attack vectors and associated vulnerabilities. The method also includes implementing a security measure based on the identified potential attack vectors and associated vulnerabilities and updating the security profile of the device accordingly. | 2019-12-26 |
20190392153 | Method and System for Verifying a Data Erasure Process - A method of erasing data from a data storage apparatus comprising a memory, the method comprises writing a known data pattern to a plurality of known memory locations of the data storage apparatus, causing the data storage apparatus to perform a data erasure procedure, reading data stored at the known memory locations after completion of the data erasure procedure, comparing the read data and the data of the known data pattern, and determining a verification result based at least in part on the result of the comparison between the read data and the data of the known data pattern. | 2019-12-26 |
20190392154 | SYSTEMS AND METHODS FOR MANAGING DATA INCIDENTS - Systems and methods for managing a multi-region data incident are provided herein. Example methods include receiving, via a risk assessment server, in response to an occurrence of the data incident, data incident data that including information corresponding to the data incident, wherein the data incident has a plurality of facets with each facet having any of unique and overlapping set of privacy data and media type and associated risk factors requiring facet specific incident risk assessment, automatically generating, via the risk assessment server, a risk assessment and decision-support guidance whether the facet is reportable, from a comparison of the facet to privacy rules, the privacy rules define requirements associated with data incident notification obligations, and providing, via the risk assessment server, the risk assessment to a display device that selectively couples with the risk assessment server. | 2019-12-26 |
20190392155 | CREATING SOFTWARE PACKAGES FOR PERFORMING SECURE COMPUTATIONS - This disclosure is related to devices, systems, and techniques for automatically generating software packages to provide Secure Computation as a Service (SCaaS). For example, a computing device includes processing circuitry configured to receive a set of information comprising an indication of a first party and an indication of a second party. Additionally, the processing circuitry is configured to generate, based on the set of information, a first software package corresponding to the first party, the first software package configured to implement a secure computation, and generate, based on the set of information, a second software package corresponding to the second party, the second software package configured to implement the secure computation. Additionally, the processing circuitry is configured to export the first software package and export the second software package, enabling the first party device and the second party device to perform the secure computation. | 2019-12-26 |
20190392156 | Configuring, Enforcing, And Monitoring Separation Of Trusted Execution Environments - The present invention extends to methods, systems, and computer program products for configuring, enforcing, and monitoring separation of trusted execution environments. Firmware images consistent with configuration of multiple separate execution domains can be generated without requiring changes to existing application source code. A cryptographically signed firmware image can be loaded at a processor to form multiple separate execution domains at the processor. Communications can be secured across separate execution domains without using shared memory. | 2019-12-26 |
20190392157 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM - The present technology relates to an information processing device, an information processing method, and a program that allow authority to be delegated without bothering the user. Provided are an acquisition unit that acquires information for receiving delegation of an authority that is predetermined, a change unit that changes a level of the authority when a predetermined condition is satisfied, and a processing unit that performs a process using the authority that is predetermined. The acquisition unit acquires first information, an inquiry is made to a server using the first information to acquire second information from the server, and the authority that is predetermined is delegated by acquiring the second information. The present technology can be applied to, for example, an agent device to which the authority to access predetermined information is delegated from a user. | 2019-12-26 |
20190392158 | MESSAGE EMISSION METHOD, RECEIVING METHOD, EMITTING DEVICE, RECEIVING DEVICE AND ASSOCIATED COMMUNICATION SYSTEM - The invention relates to a method for emitting a message comprising data frames numbered and grouped into at least one block, the emission method being implemented by an electronic emission device and comprising:
| 2019-12-26 |
20190392159 | BLOCKCHAIN UNIVERSAL RFID TRANSLATOR - An example operation may include one or more of: receiving, via an input/output interface, an encrypted RF signal from an RF identification device; decrypting, via a processing unit, the received encrypted RF signal to generate decrypted data; modifying, via the processing unit, the decrypted data to generate modified data; maintaining, via a memory, a cryptographic distributed ledger based on the decrypted data and the modified data; encrypting, via the processing unit, the modified data to generate encrypted data; updating, via the memory, the cryptographic distributed ledger based on the encrypted data; and transmitting, via the input/output interface, an updated encrypted RF signal, based on the encrypted data, to the RF identification device. | 2019-12-26 |
20190392160 | SECURING DIGITAL CONTENT ON MOBILE DEVICES - Embodiments include method, systems and computer program products for securing content. Aspects include accessing, by a first user device, content, wherein the content includes a security profile associated with the content. The content is displayed on a display for the first user device. An input is received by the first user device. The input is analyzed to determine that the input is in compliance with the security profile associated with the content and based at least in part on determining the input is not in compliance with the security profile associated with the content, a portion of the content is transmitted to a second user device. | 2019-12-26 |
20190392161 | EVENT PREMISES MEDIA CONTROL FOR TRAINING AND PERFORMANCE - A system can include a server connected to a public media system in a public event premises. The system can provide a relatively large number of mobile devices access to and control of one or more public media systems. A permissioned user of the system can monitor performance by and enforce behaviors of other users through management of public media systems at remote public event premises. | 2019-12-26 |
20190392162 | DYNAMIC CONSENT ENFORCEMENT FOR INTERNET OF THINGS - A verification system enforces consent verifications on attempts to forward data collected by wireless devices associated with users of the verification system. Responsive to receiving a request from a third-party system to access personal data associated with a user, the verification system determines a required level of user consent based on the type of requested data and queries a permissions data store to determine whether the user has provided the required level of consent. If a consent verification obtained from the user permits disclosure of the requested data at the required level of consent, the verification system instructs the wireless device to send the data to the third-party system. Conversely, if no active consent verification permits disclosure, the verification system sends a consent request to the user via a client device prompting the user to authorize disclosure of the requested data to the third-party system. | 2019-12-26 |