53rd week of 2020 patent applcation highlights part 53 |
Patent application number | Title | Published |
20200410039 | DATA COMPARISON ARITHMETIC PROCESSOR AND METHOD OF COMPUTATION USING SAME - Since CPUs of the von Neumann-architecture computers perform sequential processing, comparison operations causing the combinatorial explosion lead to a very large volume of computing, making it difficult to speed up the processing even with high-performance processors. | 2020-12-31 |
20200410040 | COMPUTATION CIRCUIT FOR PERFORMING VECTOR-MATRIX MULTIPLICATION AND SEMICONDUCTOR DEVICE INCLUDING THE COMPUTATION CIRCUIT - A computation circuit includes a computing cell array configured to provide a plurality of physical values respectively corresponding to a plurality of elements of a matrix; a vector input circuit configured to provide a plurality of input voltages corresponding to an input vector to the computing cell array; and a vector output circuit configured to output a plurality of output voltages each corresponding to a dot product between the input vector and a column vector of the matrix according to the plurality of input voltages and the plurality of effective capacitances. | 2020-12-31 |
20200410041 | METHOD AND SYSTEM FOR DATA SAMPLING USING ARTIFICIAL NEURAL NETWORK (ANN) MODEL - This disclosure relates to method and system for data sampling using an artificial neural network (ANN) model. In an embodiment, the method includes identifying a plurality of numerical data columns and a plurality of categorical data columns in population dataset, determining a set of predictor variables and a set of predictand variables by applying a linear regression on the plurality of numerical data columns, generating a sequential prediction model based on the set of predictor variables and the set of predictand variables, and performing stratified sampling on the plurality of categorical data columns to generate a set of stratified samples. The method further includes generating a sample key based on the set of stratified samples and the sequential prediction model, and generating a sample dataset representative of the population dataset based on the sample key. | 2020-12-31 |
20200410042 | ABNORMALITY DETECTION DEVICE, ABNORMALITY DETECTION METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An abnormality detection device that detects an abnormality of a target device includes a processor that executes a process of acquiring a plurality of types of measured values of the target device, a process of calculating Mahalanobis distances of the acquired plurality of types of measured values, a process of extracting the plurality of Mahalanobis distances calculated in a past predetermined period from a point in time of evaluation of the target device and calculating a moving average value of a square value of each of the extracted Mahalanobis distances, and a process of determining whether or not an abnormality has occurred in the target device on the basis of the moving average value. | 2020-12-31 |
20200410043 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a memory and a processor. The processor is connected to the memory and configured to acquire correct recognition rates for frames corresponding to items contained in a form image from statistical data regarding results of recognition of images of contents of the frames, the statistical data including, in association with an attribute of each of the frames, a size of the frame and a correct recognition rate for the frame, the correct recognition rate indicating a percentage of correctly recognized images of contents of the frame; and perform control to change a display style of a frame for which the acquired correct recognition rate is less than or equal to a threshold among the frames on a form definition screen, the form definition screen being a screen on which the form image is defined. | 2020-12-31 |
20200410044 | VISUALIZED EDITION METHOD, DEVICE AND APPARATUS, AND STORAGE MEDIUM - A visualized edition method, device and apparatus are provided. The method includes: displaying an edition interface; in a page presentation state of the edition interface, displaying, on the edition interface, a structure presentation area and an edition area, wherein the structure presentation area comprises a framework structure and a hierarchy of components described with an interface presentation language, and the edition area comprises an editable attribute of each component; in response to a component selection operation, selecting a target component from the components in the framework structure and the hierarchy of the structure presentation area; and in response to an edition operation on the target component, editing logical description codes of an attribute of the target component in the edition area. Accordingly, it is possible to improve code edition efficiency. | 2020-12-31 |
20200410045 | SYSTEM AND METHOD FOR CUSTOMIZED TEXT MACROS - A method, computer program product, and computer system for encoding, by a computing device, a transcript and text macros into vector representations. A word by word report may be predicted based upon, at least in part, the encoding. An attention mechanism may be queried based upon, at least in part, a decoder state. An attention distribution may be produced over an encoder output. An interpolation of the encoder output may be produced based upon, at least in part, the attention distribution. The interpolation of the encoder output may be input into a decoder for report modeling that includes text macro location and content. | 2020-12-31 |
20200410046 | WEBPAGE MODIFICATION ALERT SYSTEM - A webpage notification control system is provided. A computing device monitors a plurality of website content stored on a database. A computing device identifies one or more anchor contents associated with the plurality of website content stored on a database. A computing device detects changes made to one or more data contents associated with the plurality of website content stored on a database. A computing device generates an alert based, at least in part, on the detection of a change made to one or more data contents associated with the plurality of website content. | 2020-12-31 |
20200410047 | SYSTEM AND METHOD FOR IN-CONTEXT DOCUMENT COMPOSITION USING SUBJECT METADATA QUERIES - Embodiments of systems and method for assistance in document composition in the context of a document editor are disclosed. Specifically, embodiments may utilize a document definition syntax that allows a user to define a document that includes a set of document sections with identifiers and definitions. A client document compositor may be integrated with the document editor and communicate with a document composition platform to obtain a data section for substitution in the document in place of a document section. | 2020-12-31 |
20200410048 | METHOD AND SYSTEM FOR DISPLAYING CONTENT FOR ACCESSIBILITY - In general, embodiments of the invention relates to methods and systems generating accessible user interfaces or graphical user interfaces. More specifically, embodiments of the invention are directed to user interfaces that display data using combinations of graphical and non-graphical cells. The graphical cells may include both a graphical component as well as a data value component, where these components do not overlap within the cell. In this manner, embodiments of the invention may provide an additional layer of accessibility and interpretability of the data values in the graphical cells. | 2020-12-31 |
20200410049 | PERSONALIZING ONLINE FEED PRESENTATION USING MACHINE LEARNING - Techniques for personalizing a user experience for a user of an online service using machine learning are disclosed herein. In some embodiments, a computer system detects a first request by a first computing device of a first user to access content of an online service, identifies at least one content item to display based on the first request, and selects a first presentation template from amongst a plurality of presentation templates based on the at least one content item and an identification of the first user. In some example embodiments, the plurality of presentation templates is stored in a database of the online service, and each one of the plurality of presentation templates is distinct from one another and defines a corresponding manner in which to display the at least one content item. | 2020-12-31 |
20200410050 | DEEP LEARNING APPROACH TO COMPUTING SPANS - A method, system, and computer program product for using a natural language processor is disclosed. Included are importing highlighted and non-highlighted training text each including training nodes, one-hot encoding the training text, training a projection model using the training text, processing the highlighted training text using the projection model, and training a classifier model using the highlighted processed training text. Also included are importing new text including new nodes, one-hot encoding the new text, processing the new text using the projection model, and determining, using the classifier model, whether one of the new nodes is in a sought-after class. | 2020-12-31 |
20200410051 | SYSTEM AND METHOD FOR COOPERATIVE TEXT RECOMMENDATION ACCEPTANCE IN A USER INTERFACE - Methods for cooperative text recommendation acceptance of completion options in a user interface are performed by systems and devices. A user provides inputs via a user interface (UI) that are stored in an input buffer. As a portion of a first input is received, completion options for some part of the first input are determined based on statistical probabilities and the portion. A completion option is selected and displayed via the UI as completing the first input in a differentiated manner from the user-entered input. The user then either generates an acceptance command for the completion option or continues providing the first input and the UI adapts the remaining completion option portion. Acceptance commands are accepted as space characters or as alphanumeric characters representing additional input that follows the first input and the completion option. Statistical likelihoods are used to account for typographical errors and misspellings in user inputs. | 2020-12-31 |
20200410052 | Recording and Analyzing User Interactions for Collaboration and Consumption - Disclosed herein are system, method, and computer program product embodiments for analyzing screen data to provide collaboration and consumption opportunities. An embodiment operates by receiving screen data of a visible portion of a display of a computer and metadata associated with the screen data. The screen data and the metadata are associated with a user. The embodiment extracts text from the screen data using optical character recognition. The embodiment identifies a topic associated with the screen data based on the extracted text. The embodiment stores a mapping between the topic and the user and the metadata in a database. The embodiment then provides information about the user based on the mapping. | 2020-12-31 |
20200410053 | ENHANCED NATURAL LANGUAGE QUERY SEGMENT TAGGING - Computer-implemented techniques for enhanced tagging of natural language queries that are initially segmented and tagged by a named entity recognition system. By doing so, enhanced tagging of a natural language query that represents a deeper understanding of the query is provided. The enhanced tagging improves the operation of search engines that use the enhanced tags by enabling the search engine to identify and return more relevant search results in answers to natural language queries. | 2020-12-31 |
20200410054 | NEURAL NETWORK SYSTEMS AND METHODS FOR TARGET IDENTIFICATION FROM TEXT - Neural network systems are provided that comprise one or more neural networks. The first neural network can comprise a convolutional neural network (CNN) long short-term memory (LSTM) architecture for receiving a primary data set comprising text messages and output a primary data structure comprising a text pattern-based feature. The second neural network can comprise a CNN architecture for receiving a secondary data sets derived from the primary data set and output a plurality of secondary data structures. The third neural network can combine the data structures to produce a combined data structure, and then process it to produce a categorized data structure comprising the text messages assigned to targets. The primary data set can comprise hate speech and the categorized data structure can comprise target categories, for example, hate targets. Methods of operating neural network systems and computer program products for performing such methods are also provided. | 2020-12-31 |
20200410055 | SYSTEMS AND METHODS FOR IMPROVING BUSINESS COMMUNICATIONS USING NATURAL LANGUAGE PROCESSING - Systems and methods for improving business communication are provided. The system includes a processor, a memory, and a user interface coupled to each of the processor, and the memory. The processor is configured to receive and read the text of a business communication; identify one or more words in the text of the business communication for evaluation of objectivity, apply an objectivity rule and generate an objectivity score for the one or more identified words. The method further determines whether the objectivity score is low using a control table and provides a replacement word for an identified word having a low objectivity score. | 2020-12-31 |
20200410056 | GENERATING MACHINE LEARNING TRAINING DATA FOR NATURAL LANGUAGE PROCESSING TASKS - A crowdsource pipeline manager that is capable of using a crowdsource platform to automatically generate a large amount of high-quality training examples in a timely manner for training a machine learning model for a natural language processing task. Instead of merely creating a collection job with the crowdsource platform, the crowdsource pipeline manager creates a peer-reviewed collection job. The peer-reviewed collection job is created with the crowdsource platform such that execution of a corresponding judging job by the crowdsource platform is automatically triggered after the crowdsource platform executes the peer-reviewed collection job. | 2020-12-31 |
20200410057 | USER INTERFACE FOR NATURAL LANGUAGE TRANSLATION USING USER PROVIDED ATTRIBUTES - An approach is provided to use a first translation attribute that is received at a user interface from a user to automatically translate a document. The source document that is in a source natural language is translated to a target document that is in a target natural language by using a machine translator that utilizes the first translation attribute, such as adequacy or fluency. The target document is analyzed with the analysis resulting in a second translation attribute (e.g., either adequacy or fluency, whichever is different from the first translation attribute). The target (translated) document and the second translation attribute are then provided to the user, such as at the user interface. | 2020-12-31 |
20200410058 | SELF-LEARNING INPUT-DRIVEN BROKERING OF LANGUAGE-TRANSLATION ENGINES - A self-learning translation-engine brokering system characterizes a set of language-translation engines by associating each engine with values of a set of engine parameters. The system receives a request to translate text or speech input, along with a set of weightings that identify the relative importance of each engine parameter to the translation requester. The system formats the input into a quantifiable engine-agnostic form and performs an optimization procedure that finds the best fit between the source's weightings and the sets of engine parameters. The system directs the input to the best-fitting translation engine, receives the translated output from the selected engine, directs the output to the translation requester, and then determines how well the translated output meets user expectations. This feedback used to update the best-fitting engine's parametric values and to train the system to make more accurate selections in the future. | 2020-12-31 |
20200410059 | SYSTEMS AND METHODS FOR COOLING COMPUTING DEVICE EXPANSION MODULES BASED ON AIRFLOW RATES - Systems and methods for cooling computing device expansion modules based on airflow rates are disclosed. According to an aspect, a method includes determining airflow rates in areas available for operable connection of expansion modules within a computing device during operation of the computing device. The method also includes determining expected power consumption of the expansion modules. Further, the method includes presenting placement of the expansion modules in the areas based on the determined airflow rates and the expected power consumption of the expansion modules. | 2020-12-31 |
20200410060 | MULTIPHYSICS AUTOMATED SUPPORT GENERATION FOR ADDITIVELY MANUFACTURED COMPONENTS - A method, medium, and system to execute an additive manufacturing (AM) simulation on a model of a part; determine, based on the AM simulation, a prediction of a temperature and displacement distribution in the part at a particular time in the AM process; apply the predicted temperature and displacement distributions in the part as a boundary conditions on a support design space to determine a temperature distribution throughout the support design space; and execute a thermal-structural topology optimization based on the determined temperature and displacement distributions throughout the support design space to determine a distribution of material in the design space for a thermal support structure to interface with the part that optimally reduces a thermal gradient in the part with a minimum of material and results in the generation of an optimized AM support structure. | 2020-12-31 |
20200410061 | HYBRID SUPPORT STRUCTURES FOR ADDITIVELY PRINTED PARTS - A method, medium, and system to receive a specification defining a model of a part to be produced by an additive manufacturing (AM) process; execute an AM simulation on the model of the part to determine a prediction of thermal distortions to the part; execute a topology optimization (TO) to create TO supports that counteract the predicted thermal distortions; generate at least one rule-based support based on a geometry of the part to interface with the part at one or more regions other than the TO supports; combining the TO supports and the at least one rule-based support to generate a set of hybrid supports; save a record of the set of hybrid supports; and transmit the record of the set of hybrid supports to an AM controller to control an AM system to generate a support structure for an AM production of the part. | 2020-12-31 |
20200410062 | SYNTHETIC SCENARIO GENERATOR BASED ON ATTRIBUTES - A vehicle can capture data that can be converted into a synthetic scenario for use in a simulator. Objects can be identified in the data and attributes associated with the objects can be determined. The data can be used to generate a synthetic scenario of a simulated environment. The scenarios can include simulated objects that traverse the simulated environment and perform actions based on the attributes associated with the objects, the captured data, and/or interactions within the simulated environment. In some instances, the simulated objects can be filtered from the scenario based on attributes associated with the simulated objects and can be instantiated and/or destroyed based on triggers within the simulated environment. The scenarios can be used for testing and validating interactions and responses of a vehicle controller within the simulated environment. | 2020-12-31 |
20200410063 | SYNTHETIC SCENARIO SIMULATOR BASED ON EVENTS - A vehicle can capture data that can be converted into a synthetic scenario for use in a simulator. Objects can be identified in the data and attributes associated with the objects can be determined. The data can be used to generate a synthetic scenario of a simulated environment. The scenarios can include simulated objects that traverse the simulated environment and perform actions based on the attributes associated with the objects, the captured data, and/or interactions within the simulated environment. In some instances, the simulated objects can be filtered from the scenario based on attributes associated with the simulated objects and can be instantiated and/or destroyed based on triggers within the simulated environment. The scenarios can be used for testing and validating interactions and responses of a vehicle controller within the simulated environment. | 2020-12-31 |
20200410064 | CONVERSION OF POINT CLOUD DATA POINTS INTO COMPUTER-AIDED DESIGN (CAD) OBJECTS - Aspects include a system and method for converting from point cloud data to computer-aided design (CAD) objects. A method includes providing a point cloud and a catalog of CAD objects. One of a plurality of points in the point cloud representing an item is selected. A CAD object in the catalog that corresponds to the item is selected. The CAD object is aligned to the item in the point cloud. A position and orientation of the aligned CAD object is output. The position and orientation are expressed in a coordinate system of the point cloud. | 2020-12-31 |
20200410065 | DETERMINISTIC TEST PATTERN GENERATION FOR DESIGNS WITH TIMING EXCEPTIONS - Systems and methods for a deterministic automatic test generation (ATPG) process including Timing Exception ATPG (TEA). A method includes performing an automated test pattern generation (ATPG) process that uses timing exception information to generate a test pattern for a targeted fault of a circuit design with at least one timing exception path. The method includes testing the targeted fault of the circuit design using the test pattern to produce a test result for the targeted fault. | 2020-12-31 |
20200410066 | SYSTEMS AND METHODS FOR INTELLIGENTLY ACCESSING MEDIA CONTENT BASED ON RIGHTS - Systems and methods are provided for intelligently accessing media content based on rights. This may be accomplished by a media guidance application that generates a DRM score associated with a first copy of the media asset. The media guidance application determines that plurality of alternative copies of a media asset are available from other sources and determines DRM scores for the alternative copies. The media guidance application determines that one of the alternative copies has a lower digital rights management score as compared to the first copy of the media asset and stores the alternative copy instead of the first copy of the media asset. | 2020-12-31 |
20200410067 | LICENSE MANAGEMENT SYSTEM, LICENSE MANAGEMENT METHOD, NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM STORING AND LICENSE MANAGEMENT PROGRAM - A license management system subtracts, a number of rights corresponding to a number of users set by a number of users setter from a number of owned rights for each unit period, and uses a first unit period that is an earliest unit period, in which the number of owned rights is expected to be insufficient with respect to a number of rights in a unit period, as a last unit period, in which content can be used by a plurality of users, to set same expiration of a valid period for all of the plurality of users. | 2020-12-31 |
20200410068 | INTERNET OF THINGS DEVICES AND SERVICES SOFTWARE MANAGEMENT - Novel tools and techniques for an IoT shell are provided. A system includes an internet of things (IoT) device, a database, and a license manager. The database may include one or more sets of authorized licenses, each set of authorized licenses associated with a respective vendor software. The license manager may be in communication with the IoT device and the database, and further include a processor and a non-transitory computer readable medium comprising instructions executable by the processor. The license manager may be configured to receive a request to reserve a license for a first vendor software, determine an availability of the license associated with the first vendor software, register a unique identifier of the IoT device in association with the license, and grant the license to the IoT device. | 2020-12-31 |
20200410069 | PROACTIVE SECURITY SYSTEM BASED ON CODE POLYMORPHISM - A method, and processor for securing a host platform of a computing device are presented. The method includes generating, by a security processor, a first graph based on at least a portion of executable code, wherein the executable code is executed by a main processor of the host platform; generating a metadata file based on the generated first graph; polymorphing the executable code based on the generated metadata file; generating a second graph based on the polymorphed code; creating slices of the polymorphed code; executing at least one slices of the created slices by the security processor, wherein the security processor is apart from the main processor; polymorphing the at least one of executed slice; and pairing the least polymorphed slice with the polymorphed code. | 2020-12-31 |
20200410070 | DUAL-FREQUENCY ULTRASONIC SENSOR SYSTEM WITH FREQUENCY SPLITTER - An apparatus may include an ultrasonic sensor system having a first layer stack and a second layer stack. The first layer stack may include a first ultrasonic transmitter and the second layer stack may include a second ultrasonic transmitter. The first layer stack and/or the second layer stack may include an ultrasonic receiver. A frequency splitting layer may reside between the first layer stack and the second layer stack. | 2020-12-31 |
20200410071 | VOICE RECOGNITION ALERTS(V.R.A) - Voice Recognition Alerts is designed to combat an unauthorized online account usage and transactions. It is an additional transaction and account management security system that will be required by the various financial institutions, online payment systems, online healthcare accounts and other online accounts that contain or require user personal information such as, full name, date of birth, social security and driver's license to confirm the validity of all transactions as well as account authentication before granting access. The verification process involves making a voice recording of an answer to a selected security question on file. The account holder will then be asked to confirm transactions by verbally providing an answer to the security question. If the answer and the voice match the one recorded on file, account access or transaction will be approved. If neither the voice nor the answer matches the one file, account or transaction will be declined. | 2020-12-31 |
20200410072 | Radar-Based Authentication Status Feedback - This document describes techniques and systems that enable radar-based authentication status feedback. A radar field is used to enable an electronic device to account for the user's distal physical cues to determine and maintain an awareness of the user's location and movements around the device. This awareness allows the device to anticipate some of the user's intended interactions and provide functionality in a timely and seamless manner, such as preparing an authentication system to authenticate the user before the user touches or speaks to the device. These features also allow the device to provide visual feedback that can help the user understand that the device is aware of the user's location and movements. In some cases, the feedback is provided using visual elements presented on a display. | 2020-12-31 |
20200410073 | AUTHENTICATION CONTROL DEVICE AND AUTHENTICATION CONTROL SYSTEM - An authentication control device includes a control unit that notifies to change related information when, after a first authentication by a first authentication device is successful and the priority level of the related information associated with the authenticated user is subsequently raised, the number of unsuccessful attempts of a second authentication performed by a second authentication device based on the related information reaches or exceeds a predetermined number. | 2020-12-31 |
20200410074 | IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM - An identity authentication method and apparatus, and a storage medium are provided. The identity authentication method includes: performing, by means of a first neural network, face detection on an image to be processed to obtain a face detection result, and performing, by means of a second neural network, document detection on the image to be processed to obtain a document detection result; determining whether the image to be processed is a valid identity authentication image according to the face detection result and the document detection result; and in response to determining that the image to be processed is a valid identity authentication image, performing identity authentication according to the face detection result and the document detection result to obtain an identity authentication result of the image to be processed. | 2020-12-31 |
20200410075 | System and Method for Authentication Across Multiple Platforms Using Biometric Data - A system and method for authenticating a system user across multiple digital systems using a single biometric key employs a scanning device to preclude the use of passwords and login identifiers when signing into secured digital environments. The scanning device performs a primary biometric scanning operation to obtain a primary multipoint digital image for an anatomical feature of the system user. The primary multipoint digital image is then associated with a system password and username for each of a plurality of secured digital systems. By connecting the scanning device to an external computing device and performing a subsequent biometric scanning operation, the scanning device is able to authenticate the system user and retrieve the system password and username for a specific secured digital system from the plurality of secured digital systems. A data vault is provided to back-up data and restore the scanning device when the system user is authenticated. | 2020-12-31 |
20200410076 | METHOD AND APPARATUS FOR USER VERIFICATION WITH BLOCKCHAIN DATA STORAGE - Systems and methods for enrolling and authenticating a user in an authentication system via a camera of a computing device include capturing and storing biometric information from at least one first image and at least one second image of the user taken via the camera. Prior to use, the user answers personal questions and the answers are stored as stored answer data. Later, such as at a business, the questions are presented to the user and the user provides their personal answers via a computing device. The answers are processed and uploaded to an authentication server where a comparison occurs against the stored answer data. If a match does not occur, then the authentication/identity verification processes ends. If a match does occur, then the authentication process continues. The questions match may serve as a gate function for accessing authentication data stored in a blockchain. | 2020-12-31 |
20200410077 | METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING BIOMETRIC USER AUTHENTICATION FOR ACCESSING A COMMUNICATION DEVICE - Improved user authentication of a communication device is provided by expanding voice biometric authentication with a dynamically updated user profile formed of non-voice usage parameters. The non-voice usage parameters are collected during successful voice authentications to establish non-voice compensation controls. When a failed voice biometric authentication attempt is followed by a valid PIN entry, then a false rejection is determined, and a voice biometric threshold is adjusted to reduce the individual user-based false rejection rate along with the enablement of the non-voice usage controls. | 2020-12-31 |
20200410078 | APPARATUSES, SYSTEMS, AND METHODS FOR PROVIDING ACCESS SECURITY IN A PROCESS CONTROL SYSTEM - Apparatuses, systems, and methods of the present disclosure may provide access security in a process control system. For example, current biometric data representative of a user may be acquired and compared to stored biometric data representative of previously identified users. Access to the process control system may be authorized when the current biometric data matches stored biometric data. | 2020-12-31 |
20200410079 | WEARABLE DEVICE HAVING HIGHER SECURITY AND DETECTING BLOOD PRESSURES - A wearable device including a skin sensor and a processor is provided. The processor is configured to receive an authentication data for authenticating a user when a wearing state of the wearable device is adjacent to a skin surface of the user, execute a predetermined function in response to a request when the authentication data matches a pre-stored data and the skin sensor determines that the wearable device does not leave the skin surface after the authentication data is received, and reject or ignore the request when the skin sensor determines that the wearable device leaves the skin surface before the predetermined function is executed. The processor further calculates blood pressures according to PPG signals detected by a PPG sensor of the skin sensor. | 2020-12-31 |
20200410080 | Project-Oriented Certificate Management - A method for project-oriented authentication of a device in a control system for a technical installation as part of an engineering project, wherein the control system includes at least one local registration service, at least one software inventory and a certification center, where information by the at least one local registration service with respect to what communication protocols and/or applications are supported by the device and/or are active is ascertained during authentication of the device within the control system, a project-oriented device certificate is requested from the first hierarchy of the certification center by the local registration service, and the project-oriented device certificate is deposited in an inventory element, associated with the engineering project, of the software inventory of the control system, the device certificates being issuable by the first hierarchy of the certification center have a unique project identifier. | 2020-12-31 |
20200410081 | VOLUMETRIC DISPLAY-BASED CAPTCHA SYSTEM - A method, apparatus and computer program product for using a volumetric CAPTCHA display to verify that a human is present at a computer. Responsive to a request for a computer resource, a volumetric CAPTCHA is displayed in a user interface at the computer. The volumetric CAPTCHA has a first three dimensional (3D) feature and a second 3D feature. The user is prompted to answer a question about the first 3D feature of the volumetric CAPTCHA display. The received user response to the question is evaluated for correctness in describing the first 3D feature of the volumetric CAPTCHA. In response to the received user response being correct, the user is allowed access to the computer resource. The first 3D feature and the second 3D feature have a relationship with each other in the volumetric CAPTCHA. | 2020-12-31 |
20200410082 | IMAGE RECOGNITION REVERSE TUNING TEST SYSTEM - Computer implemented methods and systems are provided for controlling access to one or more computational resources by discriminating between a human user or an automated process. An example system comprises one or more computer processors operating in conjunction with computer memory and data storage to render a set of question images including at least two images having one or more inter-image visually ascertainable relationships, and at least one image having one or more intra-image visually ascertainable relationships, the inter-image visually ascertainable relationships and the intra-image visually ascertainable relationships having one overlapping visually ascertainable relationship. The system further renders a set of candidate answer images including at least an incorrect subset of images and a correct subset of images portraying the overlapping visually ascertainable relationship, and determines whether to grant access to the one or more computational resources based upon a user selection from the set of candidate answer images. | 2020-12-31 |
20200410083 | CONTROLLING USE OF INFORMATION SUBMITTED TO COMPUTING SYSTEMS - A method for controlling use of information is proposed. The method comprises detecting relevant information contained in information submitted to a primary computing system, determining one or more secondary computing systems which may receive the relevant information from the primary computing system, and controlling the use of the relevant information by the primary/secondary computing system accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a control computing system for implementing the method is proposed. | 2020-12-31 |
20200410084 | Safe Battery Authentication - In some examples, an apparatus to authenticate a battery includes a battery voltage monitor to monitor a voltage of the battery. The apparatus to authenticate the battery also includes a voltage source regulator to filter the voltage of the battery and provide the filtered voltage to turn on circuitry to be used to authenticate the battery. | 2020-12-31 |
20200410085 | USB MASS STORAGE DEVICE ACCESS CONTROL METHOD AND ACCESS CONTROL APPARATUS - A USB mass storage device access control method and access control apparatus, a terminal device, and a computer readable storage medium. Said access control method includes: in response to detecting that a USB mass storage device is inserted into a macOS, completing matching between an application and the USB mass storage device; controlling the macOS to release an access control permission for the USB mass storage device; and controlling the application to obtain the access control permission for the USB mass storage device. Said solution can solve the problem in the prior art that an application cannot be controlled to implement, on a macOS, access control over a USB mass storage device. | 2020-12-31 |
20200410086 | METHOD AND SYSTEM FOR SSIS PASSWORD MANAGEMENT INTEGRATION - A method for facilitating credential management in a Structured Query Language (SQL) Server Integration Services (SSIS) environment is provided. The method includes identifying a credential update trigger event; accessing a user credential at an electronic password vault (EPV) in response to the credential update trigger event, the user credential including at least one string; parsing the user credential to identify a username and a password that are associated with the user credential; splitting the user credential into the username and the password; updating the password; and storing the updated password in a SSIS database. | 2020-12-31 |
20200410087 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a rewrite request receiving unit configured to receive a rewrite request for rewriting an execution module, an update module determination unit configured to determine whether an update module that issues the rewrite request is an authorized module, a first falsification detection unit configured to detect falsification of a whitelist, an unauthorized-rewriting prevention unit configured to prevent unauthorized rewriting while maintaining a function of the information processing apparatus by rejecting the rewrite request without stopping the function of the information processing apparatus, in a case where the execution module for which the rewrite request is issued is registered in a whitelist for which the first falsification detection unit determines that no falsification is made and where the rewrite request is issued by an update module for which the update module determination unit determines to be an unauthorized update module. | 2020-12-31 |
20200410088 | MICRO-INSTRUCTION CACHE ANNOTATIONS TO INDICATE SPECULATIVE SIDE-CHANNEL RISK CONDITION FOR READ INSTRUCTIONS - An apparatus ( | 2020-12-31 |
20200410089 | Container Escape Detection Method, Apparatus, and System, and Storage Medium - A container escape detection method includes receiving information that is about a plurality of system calls triggered by a monitored container, and matching an occurrence order of the plurality of system calls with at least one group of preset system call orders in an escape detection rule, and determining, based on a matching result, whether the monitored container escapes. | 2020-12-31 |
20200410090 | ROBUST VON NEUMANN ENSEMBLES FOR DEEP LEARNING - Computer-implemented systems and methods build and train an ensemble of machine learning systems to be robust against adversarial attacks by employing a probabilistic mixed strategy with the property that, even if the adversary knows the architecture and parameters of the machine learning system, any adversarial attack has an arbitrarily low probability of success. | 2020-12-31 |
20200410091 | Threat Detection Using Machine Learning Query Analysis - Within an organization, numerous different persons can access data. But a user account with database access may be compromised, leading to data theft and data destruction. Database queries used to access data may vary in length, content, and formatting. Features of these queries can be extracted to train a machine learning classifier. Queries for users can be mapped to a vector space and when a new sample query is received, it can be assessed using the classifier to determine its level of similarity with previous queries by that user and other users. By analyzing the results of this assessment on the new query, it can be determined if this new query represents a data access anomaly—e.g. a particularly unusual query for a user, given his or her past, that may indicate user credentials have been compromised. When a data access anomaly exists, a remedial action may be take. | 2020-12-31 |
20200410092 | REAL-TIME DETECTION AND LOCALIZATION OF DoS ATTACKS IN NoC BASED SoC ARCHITECTURES - Various examples are provided related to software and hardware architectures that enable lightweight and real-time Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attack detection. In one example, among others, a method for detection and localization of denial-of-service (DoS) attacks includes detecting, by a router of an intellectual property (IP) core in a network-on-chip (NoC) based system-on-chip (SoC) architecture, a compromised packet stream based at least in part upon a packet arrival curve (PAC) associated with the router; identifying, by the IP core, a candidate IP core in the NoC as a potential attacker based at least in part upon a destination packet latency curve (DLC) associated with the IP core; and transmitting, by the router, a notification message indicating that the candidate IP core is the potential attacker to a router of the candidate IP core. | 2020-12-31 |
20200410093 | AUTHENTICATION DEVICE - An authentication device ( | 2020-12-31 |
20200410094 | HARDWARE LOAD HARDENING FOR SPECULATIVE SIDE-CHANNEL ATTACKS - Embodiments of methods and apparatuses for hardware load hardening are disclosed. In an embodiment, a processor includes safe logic, data forwarding hardware, and data fetching hardware. The safe logic is to determine whether a load is safe. The data forwarding hardware is to, in response to a determination that the load is safe, forward data requested by the load. The data fetching logic is to fetch the data requested by the load, regardless of the determination that the load is safe. | 2020-12-31 |
20200410095 | A METHOD FOR FAST AND INTELLIGENT COMPARISON AND SECURITY DETECTION OF MOBILE MALWARE BIG DATA - A method for detecting mobile malware, including step S | 2020-12-31 |
20200410096 | SYSTEM AND METHOD OF DETERMINING A TRUST LEVEL OF A FILE - Disclosed herein are systems and methods for determining trust levels of files on a computing device. In one aspect, an exemplary method comprises, selecting file names which are stable, generating at least one group of files from at least two files of the selected file names, the at least two files being components of a same application, searching for a presence of a dominant developer such that at least one private key of the dominant developer has been used to sign at least one file of the group of files that is generated, when a dominant developer is found, determining a trust level for all files of the group in accordance with verdicts associated with the dominant developer, and when the dominant developer is not found, determining the trust level for all the files of the group based on verdicts of outside services that have been assigned to the files of the group. | 2020-12-31 |
20200410097 | CONFIRMING A VERSION OF FIRMWARE LOADED TO A PROCESSOR-BASED DEVICE - Apparatus and method for verifying firmware used by a programmable processor in a processor-based device, such as but not limited to a solid-state drive (SSD). In some embodiments, the firmware is stored in a device memory and is accessed to generate an output value using a suitable mathematical function, such as a cryptographic function, a cyclic redundancy check (CRC) function, etc. The output value is used to verify a state of the firmware, such as by ensuring a proper version of firmware has been loaded, that an attacking party has not tampered with the firmware, etc. The firmware may be subsequently loaded and executed by the programmable processor responsive to successful verification. A nonce value supplied by a host can be incorporated into the output value generation process. | 2020-12-31 |
20200410098 | SYSTEM AND METHOD FOR DETECTING BACKDOOR ATTACKS IN CONVOLUTIONAL NEURAL NETWORKS - Described is a system for detecting backdoor attacks in deep convolutional neural networks (CNNs). The system compiles specifications of a pretrained CNN into an executable model, resulting in a compiled model. A set of Universal Litmus Patterns (ULPs) are fed through the compiled model, resulting in a set of model outputs. The set of model outputs are classified and used to determine presence of a backdoor attack in the pretrained CNN. The system performs a response based on the presence of the backdoor attack. | 2020-12-31 |
20200410099 | PARAMETRIC BEHAVIORAL PATTERN DEFINITION - A security agent implemented on a monitored computing device is described herein. The security agent has access to parametric behavioral pattern definitions that, in combination with canonical patterns of behavior, configure the security agent to match observed behavior with known computing behavior that is benign or malignant. This arrangement of the definitions and the pattern of behavior allow the security agent's behavior to be updated by a remote security service without updating a configuration of the security agent. The remote security service can create, modify, and disseminate these definitions and patterns of behavior, giving the security agent real-time ability to respond to new behaviors exhibited by the monitored computing device. | 2020-12-31 |
20200410100 | SYSTEM AND METHOD OF CATEGORIZATION OF AN APPLICATION ON A COMPUTING DEVICE - Disclosed herein are systems and methods for categorizing an application on a computing device. In one aspect, an exemplary method comprises, obtaining results of a classification of an application from a security server, when the results of the classification satisfy rules of relevance, designating the results of the classification as relevant and determining a category of the application based on the designation of the results as relevant, and when the results of the classification do not satisfy the rules of relevance, performing at least one of: terminating the categorization of the application, and updating the classification of the application based on a set of attributes of the application. | 2020-12-31 |
20200410101 | DATA LINEAGE MANAGEMENT - A device may log update information associated with an operation, wherein the update information identifies one or more changes made to the dataset during the operation and a source of the operation. The device may identify, based on identification information associated with the dataset, a lineage record identifier associated with the dataset. The device may generate a lineage record associated with the operation, wherein the lineage record includes the lineage record identifier and the update information. The device may send a request for validation to an authorized node to validate the lineage record, wherein the authorized node is authorized to access the dataset. The device may store, based on the lineage record being validated by the authorized node, the lineage record in a distributed ledger, wherein the distributed ledger is accessible to a plurality of nodes to enable the plurality of nodes to access the update information. | 2020-12-31 |
20200410102 | Randomizing Firmware Loaded to a Processor Memory - Apparatus and method for protecting firmware and other types of control data used in a processor-based device, such as but not limited to a solid-state drive (SSD). In some embodiments, the firmware is stored in a firmware store as a plurality of program instructions in a first sequence. The program instructions are loaded to a local memory in a different, second sequence. In some cases, a random number is generated and the second sequence is selected using the random number. A translation table may be generated and used by a programmable processor to locate the various program instructions in the second sequence. In other cases, instructions with calls and other references to other instruction lines are modified based on the order in the local memory. Other forms of control data may also be generated and stored to the local memory in a random order and interspersed with the firmware. | 2020-12-31 |
20200410103 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a verification unit configured to verify, using a method starting with hardware verification at a time of startup of a system, partial software which is divided into a plurality of parts and gradually started up, a second verification unit configured to verify another partial software based on the verified partial software, and a third verification unit configured to verify software to be executed at an arbitrary timing prior to execution of the software. In a case where the third verification unit is in operation at a time of update of the partial software, the operation of the third verification unit is stopped, and restart is performed after completion of the update, so that a sequence of verification processes starting with the hardware verification up to a result of verification at a time of execution is applied. | 2020-12-31 |
20200410104 | SECURE BOOT PROCESS - Described herein is a framework for secure boot process. In accordance with one aspect, in response to detecting a power signal, a first boot software component according to a boot sequence is loaded. In response to determining no event has occurred, at least one additional boot software component is successively loaded according to the boot sequence in an uninterrupted boot process. In response to determining the end of the boot sequence is reached, the operating system may then be loaded. | 2020-12-31 |
20200410105 | SECURE BOOTING IN A DATA STORAGE DEVICE WITH FRONT END BUS - A data storage device can employ a front end bus for boot operations. The physical connection of a secure boot assembly to the front end bus can provide efficient and reliable booting of the data storage device without a connection to a remote host or network. A secure boot assembly can provide a security module that connects to the boot module of the data storage device to authenticate a trustworthiness of the data storage device while the data storage device is disconnected from any remote host. | 2020-12-31 |
20200410106 | Optimizing Operating System Vulnerability Analysis - Embodiments relate to an intelligent computer platform to for optimizing operating system vulnerability analysis. A build manifest is parsed and actions associated with operating system packages that contribute to an image build are identified. The identified actions are executed and a minimum build image is created. The minimum image build is scanned and evaluated to identify one or more vulnerabilities present in the minimum image build. Remedial measures are identified and applied to the identified vulnerabilities. The build manifest is executed with the applied remedial measures. | 2020-12-31 |
20200410107 | BINARY STATIC ANALYSIS OF APPLICATION STRUCTURE TO IDENTIFY VULNERABILITIES - Described are methods and devices to identify vulnerabilities in a software package that includes two or more build files. The build files include at least an application file and one or more resource files. The method includes scanning the build files to identify strings. Strings that appear in one of the resource files and are not referenced in the application file are labelled orphaned. Strings that appear in the application file and are node defined in any of the resources files are labelled hardcoded. The identity of hardcoded and orphaned strings is output as potential vulnerabilities or data leakage points. | 2020-12-31 |
20200410108 | METHODS AND DEVICES FOR CONTEXT-BASED STRING ANALYSIS FOR VULNERATBILITY DETECTION - Described are methods and computing devices for identifying potential vulnerabilities in a software package. The package includes build files that include an application file and one or more associated files. The method may include scanning the application file to identify and extract a string from the application file and determining that the string is referenced in one of the associated files and obtaining data associated with the string from the associated file. The string may then be classified based, in part, on the data obtained from the associated file, and a full context may be determined for the string based, at least in part, on the classification. A relevance rank for the string is then set based on the full context and the string and its relevance rank are output. | 2020-12-31 |
20200410109 | SECURITY EVALUATION SYSTEM, SECURITY EVALUATION METHOD, AND PROGRAM - This security evaluation system includes a first graph generation part that generates a first evaluation graph representing a connection relationship between resources as a target for security evaluation; a second graph generation part that generates a second evaluation graph representing a connection relationship between areas where the resources are located; and display part that displays the first evaluation graph and the second evaluation graph in association with each other. | 2020-12-31 |
20200410110 | SPECULATIVE SIDE-CHANNEL HINT INSTRUCTION - An apparatus comprises processing circuitry | 2020-12-31 |
20200410111 | SYSTEMS AND METHODS TO CONTROL PUBLICATION OF USER CONTENT IN A VIRTUAL WORLD - A computing system and method to implement a three-dimensional virtual reality world having user created virtual objects. During the creation of a virtual object, a user of the virtual reality world identifies components and/or resources of the virtual object, such as a mesh model defining the shape of the virtual object, an image specifying the appearance of the virtual object, and a script defining the run time behavior of the virtual object. The computer system examines the components and/or resources duration the creation process of the virtual object to detect and/or address security threats and/or performance hurdles. Before the approval of the publication of the virtual object in the virtual world, the computer system performs a simulation of the rendering of the virtual object to detect security threats and evaluate performance impacts. | 2020-12-31 |
20200410112 | DISTRIBUTED DATA SECURITY - A method includes partitioning a received data chunk into first and second data sectors to be stored in respective first and second store units. The method also includes generating first and second random keys. The method further includes encrypting the first data sector with the second random key, and encrypting the second data sector with the first random key. The first and second random keys are encoded with channel codes. Thereafter, the first encoded random key is appended to the first encrypted data sector to obtain first appended data, and the second encoded random key is appended to the second encrypted data sector to obtain second appended data. | 2020-12-31 |
20200410113 | SYSTEM AND METHOD FOR PROTECTING LOCATION DATA - Systems and methods for securing user location data are described. A method includes receiving, by a location server computer, an encrypted location from a mobile device. The encrypted location is a location of the mobile device encrypted with a public key. The method then includes receiving, by the location server computer, a location request message from an interaction processing server and partially decrypting, by the location server computer, the encrypted location with a first private key share to form a partially decrypted location. The method further includes transmitting, by the location server computer to the interaction processing server, a location response message with the encrypted location and the partially decrypted location. The interaction processing server then uses the partially decrypted location and the second private key share to form a decrypted location. | 2020-12-31 |
20200410114 | VIRTUAL STORAGE SERVICES FOR CLIENT COMPUTING DEVICES - Embodiments include apparatuses, methods, and systems including one or more servers and one or more storage devices, coupled with each other, to provide virtual storage service to store a file and meta data of the file for a client computing device. The file and the meta data of the file may be encrypted by the client computing device before providing to the virtual storage service. The file may be encrypted with a secret key of the client computing device, and the meta data of the file may be encrypted with a shared session key between the client computing device and the virtual storage service. The encrypted file may be stored in the one or more storage devices, and the encrypted meta data of the file may be stored in one or more secured areas of the one or more servers. Other embodiments may also be described and claimed. | 2020-12-31 |
20200410115 | DETERMINATION OF A MINIMAL SET OF PRIVILEGES TO EXECUTE A WORKFLOW IN A VIRTUALIZED COMPUTING ENVIRONMENT - Example methods are provided to for automated determination of a minimal set of privileges that are required to execute a workflow in a virtualized computing environment. While the workflow is being executed, interactions with a user interface are recorded. The interactions include application program interface (API) calls. The method identifies the privileges that are used to execute the API calls, and the identified privileges are combined to form the minimal set of privileges. A model is generated that associates the minimal set of privileges to the workflow, and the model is applied to determine the privileges to assign to users that will be performing the same workflow. | 2020-12-31 |
20200410116 | Sensitive Data Classification - A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion. | 2020-12-31 |
20200410117 | CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS - A consent receipt management system may, for example, be configured to track data on behalf of an entity that collects and/or processes persona data related to: (1) who consented to the processing or collection of personal data; (2) when the consent was given (e.g., a date and time); (3) what information was provided to the consenter at the time of consent (e.g., a privacy policy, what personal data would be collected following the provision of the consent, for what purpose that personal data would be collected, etc.); (4) how consent was received (e.g., one or more copies of a data capture form, webform, etc. via which consent was provided by the consenter); (5) when consent was withdrawn (e.g., a date and time of consent withdrawal if the consenter withdraws consent); and/or (6) any other suitable data related to receipt or withdrawal of consent. | 2020-12-31 |
20200410118 | METHODS FOR POLICY-BASED PRINTING OPERATIONS IN A PUBLIC DOMAIN - A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server retrieves a policy from a private policy server that configures the parameters for printing using the public domain. The print job data is provided to a public file server until the public policy server confirms that the print job can be sent to the printing device. | 2020-12-31 |
20200410119 | POLICY-BASED PRINTING SYSTEM AND METHODS USING A CODE WITH A MOBILE DEVICE - A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server receives requests from the printing device to process a print job of a document in the private domain. A mobile device is used to coordinate the retrieval and printing of the document using an application. A kiosk may be used to send the document to the printing device from the mobile device. | 2020-12-31 |
20200410120 | SYSTEM FOR SECURING AND ALLOWING ACCESS TO ELECTRONIC DATA IN A DATA STORAGE CONTAINER - Embodiments of the present invention provide a system for securing and allowing access to electronic data in a data storage container. The system is configured for identifying initiation of a connection with an data storage container, determining establishment of the connection with the data storage container, instantaneously crawling into the data storage container to access data that is associated with the data storage container, instantaneously performing one or more operations associated with the data, storing information associated with the one or more operations in a data store, identifying initiation of a connection with an entity system, determining establishment of the connection with the entity system, instantaneously transferring the information associated with the one or more operations to the entity system, and performing one or more actions, via one or more applications stored on the entity system, utilizing the information associated with the one or more operations. | 2020-12-31 |
20200410121 | SECURE DATA DELETION AND SANITIZATION IN DISTRIBUTED FILE SYSTEMS - A system deletes and sanitizes files in a distributed file system. The system also randomizes rotation of data in a distributed file system. | 2020-12-31 |
20200410122 | METHODS FOR AUTHENTICATING USER ACCESS TO A SCANNED DOCUMENT ON A CLOUD-BASED SERVER - A cloud-based server and a port monitor on a device provide authentication of a user to access scanned documents on the server. A scanning device may capture a digital image of a document. The port monitor uploads data for a scanned document to the cloud-based server. Once the data for the document is uploaded, a claim code is generated by the cloud-based server. The port monitor receives the claim code. The port monitor initiates the launch of a browser having a uniform resource locator (URL) address for the server along with the claim code. The user is authenticated using a login page and the claim code associated to the user to allow access to the document on the server. | 2020-12-31 |
20200410123 | DOCUMENT SIGNING SYSTEM FOR MOBILE DEVICES - Disclosed are various approaches for encrypting documents using mobile devices. A first application receives, from a second application a file and an identifier of a user account. The first application then sends a request for a certificate to a certificate authority and receives a certificate in response. The file is then encrypted using the certificate, and the encrypted file is returned to the second application. The second application can identify the user account as the recipient of a file. Then, the second application can send an encryption request that includes the identifier of the user account and the file to the first application. In response to the request, the second application receives the encrypted file and then provides the encrypted file to the recipient. | 2020-12-31 |
20200410124 | PRIVATE SERVER IMPLEMENTATION OF POLICY FOR PRINTING SYSTEM - A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server receives requests from the printing device to process a print job of a document in the private domain. The private server processes the requests using the policy and a ledger to determine whether to allow the print job to the printing device. | 2020-12-31 |
20200410125 | METHOD FOR DEFINING POLICY ACROSS INFORMATION MODEL EXPOSED VIA AN APPLICATION PROGRAMMING INTERFACE - A method for defining a policy for providing access to a system is provided. The method includes: identifying, for each of a plurality of information classes within an information model, at least one respective information attribute; defining, for at least one of the at least one respective information attribute, a respective predicate filter function; determining, based on the defined at least one respective predicate filter function, at least one access rule that relates to a corresponding information attribute; defining the policy with respect to each of the plurality of information classes based on the constructed API and each of the determined at least one access rule; and constructing an application programming interface (API) for the information model based on the defined policy. The API may be augmented by updating parameters based on the defined policy. | 2020-12-31 |
20200410126 | Database Access Method and Apparatus, Computing Device, and Computer Program Product - In a database access method, if an application needs to access a database instance, the application sends an access request of the application to the database access initiation module. The access request carries an identifier of the database instance. When receiving the access request, the database access initiation module determines a database access service engine used to access the database instance, and sends the access request to the determined database access service engine. The database access service engine is deployed independently of the application. The database access service engine is configured to establish a connection used to access the database instance. In this way, the database access initiation module may forward the access request to the database instance using the database access engine such that the database instance may process the access request. | 2020-12-31 |
20200410127 | SYSTEMS AND METHODS FOR PROVIDING CENTRALIZED AND COMMUNITY-BASED MANAGEMENT OF THREE-DIMENSIONAL PRINTABLE FILES - Systems and methods are provided for tracking processing of three-dimensional (3D) files. The system receives a request to obtain a three-dimensional file from a three-dimensional file repository. The request is transmitted from a user computer to the three-dimensional file repository. The system validates a request permission associated with the request. The system also validates an intellectual property right associated with the request by transmitting an intellectual property validation request from the three-dimensional repository to an online intellectual property repository. The system processes the request after validating the request permission and the intellectual property right. The system then assigns at least one unique identifier, associated with the processing, to the three-dimensional file. | 2020-12-31 |
20200410128 | DETECTING ATTACKS ON DATABASES BASED ON TRANSACTION CHARACTERISTICS DETERMINED FROM ANALYZING DATABASE LOGS - A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access. | 2020-12-31 |
20200410129 | MITIGATING GOVERNANCE IMPACT ON MACHINE LEARNING - A method, a computerized apparatus and a computer program product for mitigating governance and regulation implications on machine learning. A governance impact assessment is generated for a partial data set generated by applying a data governance enforcement on a data set of instances comprising valuations of a feature vector. The partial data set comprises partial instances each comprising partial feature vectors. The governance impact assessment comprises information about data excluded from the data set. A machine learning model trained based on the partial data set and configured to provide an estimated prediction for a partial instance is obtained. A set of core features is determined. A bias introduced by the data governance is identified based on a core feature being affected by the data governance. In response to identifying a bias, an anti-bias procedure is applied on the machine learning model, whereby mitigating the bias introduced by the data governance. | 2020-12-31 |
20200410130 | DATA PROCESSING SYSTEMS FOR WEBFORM CRAWLING TO MAP PROCESSING ACTIVITIES AND RELATED METHODS - In particular embodiments, a Data Access Webform Crawling System is configured to: (1) identify a webform used to collect one or more pieces of personal data; (2) robotically complete the identified webform; (3) analyze the completed webform to determine one or more processing activities that utilize the one or more pieces of personal data collected by the webform; (4) identify a first data asset in the data model that is associated with the one or more processing activities; (5) modify a data inventory for the first data asset in the data model to include data associated with the webform; and (6) modify the data model to include the modified data inventory for the first data asset. | 2020-12-31 |
20200410131 | CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS - A consent receipt management and data processing system may be configured to provide a centralized repository of consent receipt preferences for a plurality of data subjects. In various embodiments, the system is configured to provide an interface to the plurality of data subjects for modifying consent preferences and capture consent preference changes. The system may provide the ability to track the consent status of pending and confirmed consents. In other embodiments, the system may provide a centralized repository of consent receipts that a third-party system may reference when taking one or more actions related to a processing activity. | 2020-12-31 |
20200410132 | DATA PROCESSING SYSTEMS FOR CENTRAL CONSENT REPOSITORY AND RELATED METHODS - A data processing central consent repository system may be configured to, for example: (1) identify a form used to collect one or more pieces of personal data, (2) determine a data asset of a plurality of data assets of the organization where input data of the form is transmitted, (3) add the data asset to the third-party data repository with an electronic link to the form, (4) in response to a user submitting the form, create a unique subject identifier to submit to the third-party data repository and, along with the form data provided by the user in the form, to the data asset, (5) submit the unique subject identifier and the form data provided by the user to the third-party data repository and the data asset, and (6) digitally store the unique subject identifier and the form data in the third-party data repository and the data asset. | 2020-12-31 |
20200410133 | DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS - Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request. | 2020-12-31 |
20200410134 | USER EXPERIENCE USING PRIVATIZED CROWDSOURCED DATA - Embodiments described herein provide a privacy mechanism to protect user data when transmitting the data to a server that estimates a frequency of such data amongst a set of client devices. In one embodiment, a differential privacy mechanism is implemented using a count-mean-sketch technique that can reduce resource requirements required to enable privacy while providing provable guarantees regarding privacy and utility. For instance, the mechanism can provide the ability to tailor utility (e.g. accuracy of estimations) against the resource requirements (e.g. transmission bandwidth and computation complexity). | 2020-12-31 |
20200410135 | DATA SECURITY - Method and system for providing access to information comprising the steps of receiving a request for information derived from data from a requester having one or more requester properties. Determining if the one or more requester properties meet one or more predetermined criteria associated with the data, if the one or more requester properties meet the predetermined criteria then providing the requested information to the requester. Storing data describing the request within a blockchain. In another aspect, there is provided a method and system for anonymising data comprising the steps of at a first source of data determining one or more parameters of a procedure for dividing a first data set into subsets of data, such that each subset of data meets one or more criteria. Providing the parameters to a second source of data. At the second source of data amending the parameters such that the procedure will divide a second data set data into subsets of data that each meet the one or more criteria. Providing the first source of data with the amended parameters. At the first source of data dividing the first data set into subsets of data according to the procedure operating according to the amended parameters. At the second source of data dividing the second data set into subsets of data according to the procedure operating according to the amended parameters. Anonymising the subsets of data from the first source and the subsets of data at the second source. Combining the anonymised subsets of data. | 2020-12-31 |
20200410136 | Stacked Encryption - Various embodiments of the present technology generally relate to file sharing, encryption, and protection of digital assets. More specifically, some embodiments of the present technology relate to computer files comprising an unencrypted file combined with an encrypted file, and methods for creation of such combined files. The unencrypted file can be read by target applications and can present a variety of information (e.g., contact information, registration information, etc.). The encrypted data may be accessed only when the proper management software, drivers, application programming interfaces, and other components of a runtime environment have been installed on a computing device. | 2020-12-31 |
20200410137 | SECURING DATA - In some examples, securing data on a computing device includes one or more cryptographic operations on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state. | 2020-12-31 |
20200410138 | DATA STORAGE SYSTEM WITH DEVICE PROVENANCE - A data storage system can provide device provenance with a storage device encoded with a key certificate and initialized into a distributed data system. A handshake module of the data storage device may derive a secure identifier and a provenance module of the data storage device can monitor data storage device activity to maintain an in-device provenance. A trusted data pathway between the data storage device and a host of the distributed data storage system can be formed with the secure identifier. | 2020-12-31 |