43rd week of 2021 patent applcation highlights part 46 |
Patent application number | Title | Published |
20210334328 | QUERY PROCESSING TO RETRIEVE CREDIBLE SEARCH RESULTS - A computer system processes a query to retrieve credible search results. One or more data sources are searched to retrieve search results pertaining to the query. Analytics are performed on the search results to produce a score for the search results, wherein the score indicates credible information within the search results and the analytics include one or more from a group of natural language processing and emotion analytics. In response to the score indicating a lack of credible information within the search results, the search results are analyzed to determine a consensus within the search results, wherein the consensus indicates credible information within the search results. The credible information of the search results is presented. Embodiments of the present invention further include a method and program product for processing a query to retrieve credible search results in substantially the same manner described above. | 2021-10-28 |
20210334329 | System and Method for Ethical Collection of Data - A computerized system automatically ensures that data from a data partner has been ethically sourced. The system reviews websites associated with URLs provided by the data provider, and privacy policy data is extracted and captured. A keyword set is used to analyze the privacy terms of websites associated with the URLs. URLs associated with websites that ethically collect data are stored in a URL database, or the URLs are given a flag or score, such that these URLs need not be checked each time a new data partner identifies these URLs as the source of its data. The system may periodically re-check the URLs to ensure that no changes have been made to the corresponding website's data collection practices. | 2021-10-28 |
20210334330 | ENCODING-FREE JAVASCRIPT STRINGIFY FOR CLIENTLESS VPN - A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content. | 2021-10-28 |
20210334331 | SYSTEMS AND METHODS FOR SOLVING UNRESTRICTED INCREMENTAL CONSTRAINT PROBLEMS - We present the architecture of a high-performance constraint solver R-Solve that extends the gains made in SAT performance over the past fifteen years on static decision problems to problems that require on-the-fly adaptation, solution space exploration and optimization. R-Solve facilitates collaborative parallel solving and provides an efficient system for unrestricted incremental solving via Smart Repair. R-Solve can address problems in dynamic planning and constrained optimization involving complex logical and arithmetic constraints. | 2021-10-28 |
20210334332 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING PROGRAM - A method includes: acquiring, from a search node configured to perform a search for a ground state represented by plural state variables included in an energy function by using plural temperature values and hold a value of the energy function for the plural state variables, a value of the energy function obtained for the plural state variables at a first temperature value among the plural temperature values; determining whether the value acquired is smaller than a smallest value of the energy function obtained for the plural state variables before reaching the first temperature value; recording update information indicating that the smallest value has been updated at the first temperature value in a case where the value is smaller than the smallest value; and outputting a second temperature value based on the first temperature value at which the update information has been recorded among the plural temperature values. | 2021-10-28 |
20210334333 | VERIFICATION METHOD AND SYSTEM FOR OPERATION RESULT BASED ON RECONFIGURABLE BUTTERFLY UNIT - The present application discloses a verification system and method for an operation result based on a reconfigurable butterfly unit. The system is applicable to a digital signal processing (DSP) chip. The DSP chip includes a reconfigurable butterfly unit. The reconfigurable butterfly unit may be reconfigured into two modes: a first verification mode and a second verification mode. The system includes: a controller, a memory, a verification unit, a first data gating unit, and a second data gating unit. The technical solution in the present application is used to overcome the disadvantage that an existing verification system and an existing verification method consume large hardware resources, thereby reducing the implementation costs of operation result verification. | 2021-10-28 |
20210334334 | TWIDDLE FACTOR GENERATING CIRCUIT FOR AN NTT PROCESSOR - A circuit for generating twiddle factors for an NTT processor. The circuit includes a cache management manager, a modular multipliers bank, and a central controller. The cache management module includes a local controller and a cache memory in which operands are stored for calculating future twiddle factors. The modular multipliers bank includes an interconnection matrix at the input distributing operands on the modular multiplier inputs. The circuit can be configured to minimise the size of the cache memory and/or reduce the latency of the twiddle factor sequence calculation. Finally, the generating circuit may include several calculation management modules sharing the same modular multipliers bank to generate sequences of twiddle factors on several finite fields. | 2021-10-28 |
20210334335 | CROSSBAR ALLOCATION FOR MATRIX-VECTOR MULTIPLICATIONS - Repeating patterns are identified in a matrix. Based on the identification of the repeating patterns, instructions are generated, which are executable by processing cores of a dot product engine to allocate analog multiplication crossbars of the dot product engine to perform multiplication of the matrix with a vector. | 2021-10-28 |
20210334336 | FUNCTION GENERATION DEVICE, FUNCTION GENERATION METHOD, AND STORAGE MEDIUM - A function generation apparatus includes a function setter, a data string selector, and a matrix generator. The function setter sets a target function in an apparatus to be controlled. The data string selector selects, from among data strings indicating a plurality of combinations of parameters that can be reflected in control in the apparatus to be controlled, data strings according to the function set by the function setter. The matrix generator generates a transformation matrix according to the target function using the data strings selected by the data string selector as elements. | 2021-10-28 |
20210334337 | Implementing Fundamental Computational Primitives Using A Matrix Multiplication Accelerator (MMA) - A method for performing a fundamental computational primitive in a device is provided, where the device includes a processor and a matrix multiplication accelerator (MMA). The method includes configuring a streaming engine in the device to stream data for the fundamental computational primitive from memory, configuring the MMA to format the data, and executing the fundamental computational primitive by the device. | 2021-10-28 |
20210334338 | Hardware Accelerated Discretized Neural Network - An innovative low-bit-width device may include a first digital-to-analog converter (DAC), a second DAC, a plurality of non-volatile memory (NVM) weight arrays, one or more analog-to-digital converters (ADCs), and a neural circuit. The first DAC is configured to convert a digital input signal into an analog input signal. The second DAC is configured to convert a digital previous hidden state (PHS) signal into an analog PHS signal. NVM weight arrays are configured to compute vector matrix multiplication (VMM) arrays based on the analog input signal and the analog PHS signal. The NVM weight arrays are coupled to the first DAC and the second DAC. The one or more ADCs are coupled to the plurality of NVM weight arrays and are configured to convert the VMM arrays into digital VMM values. The neural circuit is configured to process the digital VMM values into a new hidden state. | 2021-10-28 |
20210334339 | MULTIMEDIA NETWORK SYSTEM WITH CONTENT IMPORTATION, CONTENT EXPORTATION, AND INTEGRATED CONTENT MANAGEMENT - This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet. | 2021-10-28 |
20210334340 | METHOD AND APPARATUS FOR PORTABLY BINDING LICENSE RIGHTS TO CONTENT STORED ON OPTICAL MEDIA - There is provided a method for use by a playback system to play back encrypted content associated with a first globally unique identifier (ID). The method includes storing an encrypted content in a memory being under control of a memory controller having a second globally unique ID, storing the first globally unique ID, transmitting a request from the memory controller to a license server, the request comprising the first globally unique ID, the second globally unique ID and a request for a content license to play back the encrypted content, receiving the content license enabling a right for the playback of the encrypted content, the content license including content keys and being encrypted to be decryptable according to a memory controller secret associated with the second globally unique ID, decrypting the content license, according to the memory controller secret to recover the content keys to a playback module. | 2021-10-28 |
20210334341 | BARCODE-BASED LICENSE CONFIGURATION FOR AIR-GAPPED SYSTEMS - Example implementations include a method, apparatus and computer-readable medium of configuring a license for a component configurable with a computer system, comprising storing the component on the computer system. The implementations further include encoding computer system information corresponding to the computer system into a barcode, such as a Quick Response (QR) code. Additionally, the implementations further include displaying the barcode and a license identifier field. Additionally, the implementations further include receiving a license identifier in the license identifier field, wherein the license identifier is based on the barcode. Additionally, the implementations further include decoding the license for the component based on the license identifier. | 2021-10-28 |
20210334342 | PROCEDURAL CODE GENERATION FOR CHALLENGE CODE - A method by one or more computing devices for obfuscating challenge code. The method includes obtaining challenge code for interrogating a client, inserting, into the challenge code, code for obfuscating outputs that are to be generated by the client, where the code for obfuscating the outputs includes code for applying a first chain of reversible transformations to the outputs using client-generated random values, interning strings appearing in the challenge code with obfuscated strings, inserting code for deobfuscating the obfuscated strings into the challenge code, inlining function calls in the challenge code, removing function definitions that are unused in the challenge code due to the inlining, reordering the challenge code without changing the functionality of the challenge code, and providing the challenge code for execution by the client. | 2021-10-28 |
20210334343 | METHOD FOR PERFORMING PASSWORD TRANSITIONS - A method for changing a security credential, such as a password, for secure user authentication with respect to user access to an application is provided. The method includes: receiving, from a vault that is configured to periodically generate and change a credential for accessing the application, a current credential and a first future credential that is designated as a next credential; transmitting, to a user that has access to the vault, the current credential; when a first interval that corresponds to a periodicity of a changing of the credential elapses, receiving, from the vault, a message indicating that the current credential has expired and that the next credential has been redesignated as the current credential, and providing a newly designated next credential, and transmitting, to the user, a message indicating that the previous current credential has expired and providing the redesignated current credential. | 2021-10-28 |
20210334344 | SELECTIVE-ACCESS DATA-CENTER RACKS - Provided is a rack, comprising: a plurality of rack units; and a plurality of lockers each housing a different respective subset of the rack units, wherein respective lockers among the plurality comprise: a first respective barrier disposed between a respective pair of the rack units; a second respective barrier disposed between another respective pair of the rack units; a third respective barrier that is orthogonal to the first barrier and the second barrier, the third respective barrier being moveably or removeably coupled to the rack; a respective volume configured to receive one or more computing devices; and a respective lock configured to secure the third respective barrier to the rack in the closed position when in a locked state. | 2021-10-28 |
20210334345 | ELECTRIC DEVICE AND CONTROL METHOD THEREOF - Provided are an electronic device performing complex biometric authentication and a control method thereof. The electronic device includes: a sensor unit including at least one sensor configured to detect biometric information, a security module to extract a genuine score from the detected biometric information and generate a biometric authentication model for determining an authentication threshold score based on the extracted genuine score at the time of user registration, and perform user authentication based on feature points acquired from the detected biometric information and the biometric authentication model at the time of the user authentication, and a controller to control an operation of the electronic device based on a result of the user authentication, wherein the security module determines whether or not the biometric information used for the user authentication is biometric information acquired from a genuine user when the user authentication fails, and updates the biometric authentication model based on the genuine score extracted from the acquired biometric information when the biometric information used for the user authentication is biometric information acquired from the genuine user. The present invention may provide an electronic device performing complex biometric authentication by using IOT (Internet of Things). | 2021-10-28 |
20210334346 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING THE SAME - Provided is an electronic device including: first and second terminals each of which includes multiple sensors formed to detect biometric information and which are configured to receive different types of pieces of biometric information, respectively; a controller that selects one or several pieces of user information from among multiple preregistered pieces of user information using the biometric information which is input from the first terminal unit; and that forms a comparison group for user authentication; and a security module that compares the comparison group and the biometric information which is input from the second terminal unit and thus performs the user authentication, in which the second terminal unit receives the biometric information from a user after a predetermined time elapses from when the biometric information is input from the first terminal unit. | 2021-10-28 |
20210334347 | METHODS AND SYSTEMS FOR ENSURING A USER IS PERMITTED TO USE AN OBJECT TO CONDUCT AN ACTIVITY - A method for ensuring a user is permitted to conduct an activity is provided that includes the steps of capturing, using a computing device, data for a biometric modality of a user and identifying information of an object. The method also includes transmitting, via a network, the captured biometric modality data and identifying information to a computer and conducting a verification transaction based on the captured biometric modality data to verify the identity of the user. When the identity of the user is successfully verified, a verification transaction is conducted based on the captured object identifying information and the user is permitted to use the object to conduct the activity when the object is successfully verified. | 2021-10-28 |
20210334348 | BIOMETRIC AUTHENTICATION APPARATUS AND OPERATION METHOD THEREOF - A biometric authentication apparatus is provided. The biometric authentication apparatus includes one or more converters that convert a transmit signal of an electrical signal into a vibration signal of a mechanical signal and transmit the vibration signal vibrating within a set frequency range to a user, one or more sensor that receive a biometric signal corresponding to the vibration signal from the user and convert the biometric signal into a receive signal of an electrical signal, an authentication module that extracts anatomical feature information of the user from the receive signal and determines whether the user is a registered user based on the anatomical feature information, and a memory that stores a database for the registered user. The biometric signal is a frequency-based signal modified to include the anatomical feature information while the vibration signal passes through at least a portion of the body of the user. | 2021-10-28 |
20210334349 | METHOD FOR THE ACQUISITION AND SUBSEQUENT GENERATION OF DATA FOR A USER OF A SELF-SERVICE TERMINAL - A self-service terminal comprises at least one display and at least one input field. A plurality of different products and/or services stored in an internal or external database are displayed on the display and are made available to the user for selection. At least one official photographic document and/or electronic document on an electronic medium is read by at least one reading element. At least one document-specific feature of the user is optically acquired and stored. An authenticity check is carried out in by comparing the acquired document-specific features against the original values of the user read in from the photographic document and/or the electronic document. In the case of a positive authenticity check, an electronic and/or haptic document is generated and subsequently output and/or transmitted to the user, which authorizes the user to receive and/or to access and/or to perform the product and/or service previously selected. | 2021-10-28 |
20210334350 | METHOD AND APPARATUS OF PERFORMING AUTHENTICATION - A processor-implemented method of performing authentication includes obtaining a first biometric information of a user according to a first modality; calculating a first score based on the first biometric information; filtering the first score; determining whether the filtered first score satisfies a second condition; and selectively, based on a result of the determining, authenticating the user based on the first score and a first condition corresponding to the first modality. The second condition is different from the first condition. | 2021-10-28 |
20210334351 | PASSIVE AFFECTIVE AND KNOWLEDGE-BASED AUTHENTICATION THROUGH EYE MOVEMENT TRACKING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a user based on passive affective and knowledge-based authentication (AKBA). In one aspect, a method includes data associated with eye movements and ocular dynamics of the user are captured with a camera as the user looks at a graphical user interface (GUI) of a device; an AKBA signature of the user is determined based on the captured data; the user is authenticated based on a comparison of the AKBA signature with an AKBA template associated with the user; and an access to a subset of functions of an application is granted. | 2021-10-28 |
20210334352 | MULTIFACTOR AUTHENTICATION SERVICE - A system and method for providing multifactor authentication. A disclosed method includes receiving a request at a server to launch a new session for an application on a client device, generating a plurality of codes, each of the plurality of codes associated with a respective identifier, and forwarding the plurality of codes via a short messaging service (SMS) message to a user associated with the client device. The method further includes sending the respective identifier associated with a given code of the plurality of codes to the application and receiving a submitted code entered into the application from the client device. Once received, the method compares the submitted code with the given code associated with the respective identifier and authenticates the user in response to the submitted code matching the given code. | 2021-10-28 |
20210334353 | DEVICE AUTHENTICATION METHOD AND APPARATUS - This application relates to an apparatus and a non-transitory computer readable medium applying to the internet of vehicles. Embodiments of this application implement a distributed authentication process, which including sending information used to indicate a to-be-authenticated device to the to-be-authenticated device. Compared with a centralized authentication mechanism, the authentication manner in the embodiments of this application reduces load of a device because one intermediate node does not need to perform authentication on a plurality of nodes. If the to-be-authenticated device fails to be authenticated, because the authentication is an authentication process related to a first service, the determined execution policy is an execution policy related to the first service, and the determined execution policy better meets a service requirement. | 2021-10-28 |
20210334354 | DISPLAY SYSTEM, RECEPTION DEVICE, DISPLAY DEVICE AND COMMUNICATION CONNECTION METHOD - A display system includes: a transmission device that transmits image data; a reception device that is connected to the transmission device and receives the image data; and a display device that displays an image indicated by the image data received by the reception device. The reception device creates a connection code, creates a security key, which is used for connection with the transmission device, from the connection code, and transmits the connection code to the display device to cause the display device to display it. The display device displays the connection code. The transmission device creates the security key from the connection code having been inputted, and is connected to the reception device by using the security key. | 2021-10-28 |
20210334355 | MANAGEMENT OF LOGIN INFORMATION AFFECTED BY A DATA BREACH - A device determines that a data breach of an application has been reported and determines that an individual has an account with the application based on identifying an association between an application identifier and a username the individual uses to access the application. The device receives, from a user device associated with the individual, password information used to access the application. The device uses the password information and usernames for a group of applications with which the individual has accounts to perform a login procedure for the group of applications to determine that login information for one or more of the applications includes the password information used to access the application affected by the data breach. The device provides, to the user device or another device, a recommendation to change the password information used to access the application and the one or more applications. | 2021-10-28 |
20210334356 | AUTHENTICATION CREDENTIAL PROTECTION METHOD AND SYSTEM - This application provides an authentication credential protection method and system. The protection method includes the following steps: generating authentication secret information based on a lock screen password and hardware secret information of a first device; randomly generating, by the first device, a symmetric key, and using the symmetric key as an encryption key for the authentication secret information; splitting the encryption key into at least two first key segments by using a multi-party data splitting algorithm, where one of the at least two first key segments is stored on the first device; and sending, by the first device, another first key segment to a trusted device. In the foregoing technical solution, the authentication secret information is generated by using the lock screen password and the hardware secret information, increasing information complexity. In addition, different trusted devices are used to store the split key segments, improving security of the encryption key. | 2021-10-28 |
20210334357 | METHOD OF MANAGING ACCOUNT LOGIN INFORMATION - An account login information management method includes: performing, by a custom prudential provider installed in a computing device, operating system account authentication, supported by an operating system of the computing system, and alternative authentication; and changing, an account management client installed in the computing device, a password of an operating system account by updating an existing password used in the operating system account authentication with a new password. | 2021-10-28 |
20210334358 | CLOUD-BASED DYNAMIC EXECUTABLE VERIFICATION - A method and system provide the ability to dynamically verify an executable. Encrypted build data and developer permissions are received from a first developer into a build registration tool within a secure cloud computing environment. The encrypted build data includes a build identification (ID), a dynamic code signing certificate (CER), and developer credentials. The build registration tool authenticates the developer credentials based on developer permissions. A dynamic code signing tool (within the secure cloud computing environment) decrypts the encrypted build data and activates the executable by dynamically signing the executable to obtain a dynamic code signature (SEC). The SEC is delivered for runtime deployment. | 2021-10-28 |
20210334359 | MOBILE DEVICE POLICY ENFORCEMENT - In general, in one aspect, a method includes receiving software code with an invalid characteristic, repeatedly attempting to execute the software code with the invalid characteristic on a device, and in response to successful execution of the software code with the invalid characteristic, taking an action. The action may include an action to remediate the device. | 2021-10-28 |
20210334360 | METHOD FOR PROCESSING SANDBOX FILE IN QUEUE MANNER - The present invention discloses a method for optimizing a sandbox. By changing a mode of the sandbox for processing a file, the present invention optimizes original pure database processing into database and file queue processing. The novel processing manner modifies an original behavior of the sandbox, reduces a load of a built-in database, and greatly reduces a probability of suspended animation of the sandbox. | 2021-10-28 |
20210334361 | PROCESSING APPARATUS, EMBEDDED SYSTEM, SYSTEM-ON-CHIP, AND SECURITY CONTROL METHOD - A processing apparatus, an embedded system, a system-on-chip, and a security control method are disclosed. The processing apparatus includes a processor, adapted to execute a program; and a memory, coupled to the processor and adapted to provide a plurality of enclaves isolated from each other. One of the plurality of enclaves is a source enclave, another one of the plurality of enclaves is a target enclave, and the source enclave and the target enclave each are used to provide a storage space required for running a corresponding program. The processing apparatus further comprises a storage access controller, adapted to transmit specified data stored in the source enclave to the target enclave. According to the processing apparatus, the embedded system, the system-on-chip, and the security control method provided in the embodiments of the present disclosure, a storage access controller can be used to implement a data transmission process from a source enclave to a target enclave, without requiring a processor for data transferring, thereby improving efficiency of inter-enclave data transmission while ensuring security. | 2021-10-28 |
20210334362 | METHOD TO UPGRADE A TEE TRUSTED APPLICATION TO A SERVER MODE - Upgrade to a Trusted Application in a Trusted Execution Environment compliant to a Trusted Execution Environment standard to an as-a-server functioning by running, inside the Trusted Execution Environment, each instance of a Multi Instance/Single Session Trusted-Server Trusted Application compliant to the TEE standard in an infinite state-full loop polling a session of a Single Instance/Multi Session Trusted-Pipe Trusted Application, the single session of each of the instance of the Trusted-Server Trusted Application being adapted to perform a task as a server, said Trusted-Pipe Trusted Application being further polled by the Customer Application and opening session depending on command coming from the Customer Application. | 2021-10-28 |
20210334363 | SECURE AUTHENTICATION SERVER FOR SMART CONTRACT - A server which performs secure authentication on a source code for smart contract may comprise a communication unit receiving a smart contract source code from the server requesting secure authentication; and a controller checking security vulnerability based on the received smart contract source code, wherein the controller comprises a source code vulnerability checking unit reading a source code of a smart contract and checking vulnerability in the source code; a communication interval checking unit checking a communication interval for execution of the source code; an execution vulnerability checking unit checking app and web vulnerability on a browser in which the source code is executed; a certificate issuing unit issuing a certificate if it is found from a checking result that a security level satisfies a required criterion and storing the certificate together with the source code in a blockchain block where the source code of the smart contract is stored. | 2021-10-28 |
20210334364 | EVALUATION OF A PERFORMANCE PARAMETER OF A MONITORING SERVICE - In an example, a method includes analysing data collected from a service. A value representative of the number of anomalies in the data is generated, this value then being compared with a threshold. Depending on whether the value is greater or less than the threshold, a performance parameter of the monitoring service may be evaluated. | 2021-10-28 |
20210334365 | SYSTEMS AND METHODS FOR REMOTE ANOMALY DATA SCANNER FOR CYBER-PHYSICAL SYSTEMS - Disclosed are methods, systems, and non-transitory computer-readable medium for detecting data anomalies on a device. For instance, the method may include: receiving an initial data measurement transmitted by the device, wherein the initial data measurement includes a measurement of data stored in the device using a unique key associated with the device; transmitting a request for a subsequent data measurement of data stored in the device; receiving the subsequent data measurement transmitted by the device; comparing the subsequent data measurement to the initial data measurement; and determining whether an anomaly exists in the data stored in the device based on the comparison. | 2021-10-28 |
20210334366 | Embedded Threat Detector - A method for detecting a threat to an avionics system includes an Embedded Threat Detector (ETD) providing a non-bypassable module which compares run time signatures of each running application with pre-defined database of signatures. Any variation outside of pre-defined bounds implies an existence of malware. The ETD is located in a root Virtual Machine (VM0) and has two modes of operation. A learning mode in a controlled environment generates a database of controlled signatures for each software thread as the software is executed. Conversely, in the run mode during operations, the ETD generates signatures in real time and compares the real time signatures with the controlled signatures. A mismatch exceeding specified limits generates an alert and notifies a user. | 2021-10-28 |
20210334367 | AUTOMATED SECURITY ALGORITHM IDENTIFICATION FOR SOFTWARE DISTRIBUTIONS - Providing automated security algorithm identification in software distributions is disclosed herein. In one example, a processor device receives a source code fragment representing a difference between a given source code file of a first software distribution and a corresponding source code file of a second software distribution. The processor device determines whether the source code fragment matches any security profile of one or more security profiles that each corresponds to an approved security algorithm. If so, the processor device generates an approval notification to indicate that the source code fragment comprises the approved security algorithm. However, if the processor device determines that the source code fragment does not match any security profile of the one or more security profiles, the processor device generates a warning notification. In this manner, preparation of software distributions may be performed more efficiently and reliably, and with decreased overhead relative to manual security algorithm identification. | 2021-10-28 |
20210334368 | METHODS AND SYSTEMS FOR SECURE MESSAGE TRANSMISSIONS BETWEEN TRUST DOMAINS - A computer device for routing communications from a low-trust domain to a high-trust domain is provided. The computer device includes a first processor and a second processor. The first processor is programmed to receive a packet from the low-trust domain to be transmitted to the high-trust domain and compare the source address to a white list of source addresses. If the source address matches the white list, the first processor is programmed to compare the message to one or more messaging requirements. If the message meets the one or more messaging requirements, the first processor is programmed to write the message to a memory. The second processor is programmed to read the message from the memory and compare the message to a plurality of stored values. If the message matches the plurality of stored values, the second processor is programmed to act upon the message. | 2021-10-28 |
20210334369 | SYSTEM FOR EVALUATION AND WEIGHTING OF RESOURCE USAGE ACTIVITY - Embodiments of the present invention provide systems and methods for evaluating and weighting resource usage activity data. The system may establish a communicable link to a user device via a user application to receive resource activity data and historical data from one or more users or systems via multiple communication channels. The system may evaluate the historical data and determine evaluation criteria based on perceived chance of loss associated with particular metadata characteristics, and use the evaluation criteria as weighted metrics for determining an overall evaluation score for the user based on indication from resource activity data that the user has conducted resource transfers with entities or channels identified in the historical data. | 2021-10-28 |
20210334370 | SYSTEMS AND METHODS FOR EMBEDDED ANOMALIES DETECTOR FOR CYBER-PHYSICAL SYSTEMS - Disclosed are methods, systems, and non-transitory computer-readable medium for detecting data anomalies on a device. The method may include determining data patterns for data input to the device, data output from the device, and/or data stored in a memory of the device; monitoring the data input, data output, and the data stored in the memory at least based on the determined data patterns in parallel with processing of the data input, data output, and/or the data stored in the memory; and detecting whether an anomaly exists in the data input, data output, and/or the data stored in the memory of the device based on the monitoring. | 2021-10-28 |
20210334371 | Malicious File Detection Technology Based on Random Forest Algorithm - The present invention discloses a malicious file detection technology based on a random forest algorithm. In order to solve the shortcomings or defects of detecting a malicious file by using a feature matching method in the conventional art, a solution of extracting an effective feature and detecting the malicious file by using a machine learning algorithm is adopted, and thus the purpose of accurately and effectively identifying known and unknown malicious file is achieved. | 2021-10-28 |
20210334372 | METHODS AND SYSTEMS FOR DETECTING A RANSOMWARE ATTACK USING ENTROPY ANALYSIS AND FILE UPDATE PATTERNS - This disclosure and the exemplary embodiments described herein, provide methods and systems for detecting a ransomware infection in one or more files. According to an exemplary embodiment, a low frequency encryption analysis and a high frequency encryption analysis of a plurality of received files is performed to determine if the one or more of the files are encrypted. If a file is encrypted, a watcher is utilized to monitor file events associated with the files for determining if one or more of the files are infected with ransomware. | 2021-10-28 |
20210334373 | MODERATOR SYSTEM FOR A SECURITY ANALYTICS FRAMEWORK - A moderator system that can receive outputs of various stages of the security analytic framework and can receive input from external sources to provide information about emerging styles of attacks. One or more models/behavioral profiles can be curated by the moderator system, and the moderator system can provide updates to components of the security analytics framework. | 2021-10-28 |
20210334374 | SYSTEMS AND METHODS FOR PROTECTING AGAINST MALWARE ATTACKS - A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks (e.g., ransomware attacks) and mitigating data loss. In one or more embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file. If the file associated with a malware attack risk, an entry for the file is added to a file log. The agent may analyze the chi-square values for data written to the files, the file log, and the file format to determine whether a malware attack is underway. | 2021-10-28 |
20210334375 | Malicious Event Detection in Computing Environments - Methods and systems for detecting malicious events in computing systems are described herein. Relationships between events occurring at computing systems are identified. The identified relationships are compared to a series of events previously determined to be a malicious activity to determine whether the identified relationship is potentially malicious activity. If the identified relationship is determined to be potentially malicious, actions can be taken to mitigate damages caused by the events in the identified relationship. | 2021-10-28 |
20210334376 | ANTI-VIRUS CHIP AND ANTI-VIRUS METHOD - An anti-virus chip includes a first connection terminal, a second connection terminal, a detection unit and a processing unit. The first connection terminal and the second connection terminal are respectively coupled to a connection port and a system circuit of an electronic device. The detection unit detects whether the connection port is connected to an external device via the first connection terminal. When the detection unit detects that the connection port is connected to the external device, the processing unit performs a virus-scan program on the external device to determine whether a virus exists in the external device. When determining that a virus does not exist in the external device, the processing unit establishes a first transmission path between the first connection terminal and the second connection terminal. When determining that a virus exists in the external device, the processing unit does not establish the first transmission path. | 2021-10-28 |
20210334377 | METHOD FOR DYNAMICALLY ESTABLISHING A SECURE COMPUTING INFRASTRUCTURE - A method and system are disclosed in which a secure computing infrastructure is established and maintained. The method requires that upon any attestation event, a component to be added or newly activated (i.e., used the first time) be checked for its trustworthiness, where the checking includes cryptographic proof of the trustworthiness of the component. If the component is not trustworthy, then security precautions are taken to protect the secure computing infrastructure. Those precautions include refusing to accept the component, quarantining the component, encrypting and decrypting all traffic to and from the component, or allowing the component to perform only non-secure operations. | 2021-10-28 |
20210334378 | SYSTEM AND METHOD OF AUTHENTICATING FIRMWARE - In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: receive firmware of an integrated circuit (IC) of an information handling system; receive a digital signature of the firmware, where the digital signature includes an encrypted hash value, encrypted with a private encryption key; determine a first hash value of the firmware; decrypt the encrypted hash value, via a public encryption key associated with the private encryption key, to obtain a second hash value; determine if the first hash value matches the second hash value; if so, permit the information handling system to boot an operating system; and if not, prevent, by the authentication device, the information handling system from booting the operating system. | 2021-10-28 |
20210334379 | SYSTEMS AND METHODS FOR ACCESS CONTROL OF BIOS PROTOCOL NOTIFICATION - A BIOS may include a plurality of protocol drivers and a protocol notification manager configured to receive a protocol notification registration from a consumer driver of the plurality of protocol drivers, receive a unique key associated with the consumer driver, receive a pre-authorized list from a producer driver of the plurality of protocol drivers, the pre-authorized list comprising one or more signed consumer identifiers, each of the one or more signed consumer identifiers identifying a respective one of the plurality of protocol drivers authorized to receive a protocol notification from the producer driver, determine if the unique key successfully decrypts a signed consumer identifier associated with the consumer driver, and perform access control of protocol notification from the producer driver to the consumer driver based on whether the unique key successfully decrypts the signed consumer identifier associated with the consumer driver. | 2021-10-28 |
20210334380 | TRUSTED FIRMWARE VERIFICATION - Disclosed are various examples for verification and management of firmware for client devices enrolled with a management service of an enterprise. The firmware verification includes a verification process using multiple checkpoints for determining whether status responses associated with firmware installed on and received from a managed client device can be trusted. The multiple checkpoints can include verifying certificate data, signature data, and an exit code included in status responses received from managed devices. In the event that one of the verification steps fails, the device can be considered compromised and subject to various compliance actions. The compliance actions can include limiting access to enterprise data, limiting access to one or more applications, wiping a device clean to reset the devices to the original factory settings, sending a notification to an enterprise administrator providing an indication of the detected compromise, and other types of compliance actions. | 2021-10-28 |
20210334381 | METHOD AND ELECTRONIC DEVICE CAPABLE OF SECURELY STORING AND LOADING FIRMWARE - A method capable of securely storing and loading firmware includes: dividing operating system environment into a secure world and a non-secure world wherein the secure world includes read-only memory and one-time programmable circuit configured within electronic device while non-secure world includes flash memory externally coupled to electronic device; reset handler of read-only memory performs boot up when system is powered up and is used to load initialization program code; using specific initialization program code to initialize decryption engine; obtaining key from one-time programmable circuit and loading key to configure decryption engine; reading cipher text of firmware from flash memory; decrypting cipher text of firmware to generate plain text of firmware; and determining whether secure boot procedure successfully completes according to cipher text and plain text. | 2021-10-28 |
20210334382 | COMPUTING APPARATUS CONFIGURABLE FOR SECURED BOOT - Methods, apparatus, and computer program products for configurable secure boots are disclosed. One method includes determining, by a processor of a computing apparatus, whether a geographical location of the computing apparatus corresponds to a predetermined location, performing a boot process for booting up the computing apparatus in response to the geographical location of the computing apparatus corresponding to the predetermined location, and disabling the boot process from booting up the computing apparatus in response to the geographical location of the computing apparatus failing to correspond to the predetermined location. Computing apparatus and computer program products for performing the method are also disclosed. | 2021-10-28 |
20210334383 | SECURE BOOT METHOD FOR TERMINAL DEVICE, TERMINAL DEVICE AND MEDIUM - The invention discloses a secure boot method for a terminal device, a terminal device and a medium, relates to the technical field of secure boot, and is used for solving a problem of low system boot security caused by lack of protection for system boot in the related art. The terminal device includes a first processor, a second processor and a shared memory. The method includes: acquiring, by the first processor, an SPL image file; acquiring, by the first processor and the second processor, a third duration and starting timing synchronously; in a case that the third duration expires, transmitting, by the first processor, the SPL image file to the second processor via the shared memory; and booting, by the first processor and/or the second processor, a system of the terminal device cooperatively based on the SPL image file received by the second processor. | 2021-10-28 |
20210334384 | DETECTING A POTENTIAL SECURITY LEAK BY A MICROSERVICE - Embodiments described herein are generally directed to testing a microservice to determine whether the microservice leaks sensitive information. According to an example, prior to deployment of a microservice within a production environment, a test suite for the microservice is generated based at least in part on a specification of an application programming interface (API) of the microservice defining operations supported by the API and information regarding parameters of each of the operations. The microservice is subjected to the test suite. A potential security leak by the microservice is then detected by analyzing a dataset to which the microservice outputs information, including applying security rules to the dataset. | 2021-10-28 |
20210334385 | GREYBOX FUZZING FOR WEB APPLICATIONS - A method may include sending, to an entry point of an instrumented web application, a first request including a first value of a parameter. The first value may correspond to a first vulnerability category. The method may further include receiving, from the instrumented web application, first taint analysis results, determining that the first taint analysis results include a sink function corresponding to a second vulnerability category, and sending, to the entry point, a second request including a second value of the parameter. The second value may correspond to the second vulnerability category. The method may further include receiving, from the instrumented web application and in response to sending the second request, second taint analysis results including the sink function, and detecting, in the instrumented web application and using the second taint analysis results, a vulnerability corresponding to the sink function and the second vulnerability category. | 2021-10-28 |
20210334386 | METHOD AND SYSTEM FOR ASSESSING EFFECTIVENESS OF CYBERSECURITY CONTROLS IN AN OT ENVIRONMENT - A cybersecurity solution for monitoring and assessing an overall cybersecurity posture level of an operation technology environment to increase the level when it is determined to be below a setpoint value for the operation technology environment. The solution includes, among other things, receiving metrics data for a corresponding one of each of a plurality of cybersecurity posture indices for the operation technology environment, determining a cybersecurity posture index value for each of the plurality of cybersecurity posture indices based on the metrics data, applying a weight to each of the plurality cybersecurity posture index values to calculate a respective weighted cybersecurity posture index value, and determining an overall cybersecurity posture level of the operation technology environment based on a sum of each weighted cybersecurity posture index value. | 2021-10-28 |
20210334387 | System and Method for Scalable Cyber-Risk Assessment of Computer Systems - A method of cyber risk assessment includes receiving request for a quantitative cyber risk assessment from an entity associated with a domain name. Entity information is non-intrusively gathered from a plurality of data sources about the entity based on the domain name. A digital footprint of the entity is discovered based the associated domain name using non-intrusive information gathering. At least one characteristic of the entity is classified to determine an entity classification and at least one entity risk quantification parameter. At least one control item is fetched from the knowledge database. An entity technical finding is determined based on the fetched at least one control item and based on the discovered digital footprint. At least one industry-related quantification parameter is fetched based on the entity technical finding and based on the entity classification. A quantitative risk value is calculated from a determination of loss frequency and loss magnitude. | 2021-10-28 |
20210334388 | METHODS AND APPARATUS TO ENCRYPT MEDIA FOR IDENTIFICATION - Methods, apparatus, systems and articles of manufacture are disclosed to encrypt media for identification. An example apparatus includes a mesh generation controller to generate a mesh based on an encryption matrix; an overlap controller to eliminate overlapping ones of edge connections of the mesh; an edge labelling controller to generate random labels for the edge connections based on a number of remaining ones of the edge connections of the mesh; an encrypted value controller to generate encrypted values based on the random labels; and an encryption controller to encrypt an input matrix with the encrypted values to enable identification of the input matrix. | 2021-10-28 |
20210334389 | SECURE CONTENT SHARING - Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple applications in aggregate form to another user, e.g., using a secure messaging service. In scenarios where data access is restricted, a server may check the recipient's access privileges prior to forwarding the information to her. | 2021-10-28 |
20210334390 | System for on-demand capture and exchange of media items that are not recorded at the point of capture - According to one embodiment, a system for secured unidirectional media exchange comprising a first user interface device, a second user interface device, a server, and an application having a user interface. Wherein said application comprises code capable of receiving a first unique user identifier associated with a first instance of the user interface through a second instance of the user interface. Wherein said second instance of the user interface is associated with a second unique user identifier and executes on said second user interface device. Capturing a media item set through the second instance of the user interface using media sensor hardware of said second user interface device, and storing said media item set in a database such that said media item set is securely deleted from the second user interface device after being stored. Associating said first unique user identifier with each media item in the media item set; storing, in the database, said associated first unique identifiers. Receiving, from the first instance of the user interface, a unique user identifier associated with said first instance of the user interface, wherein said first instance of the user interface executes on said first user interface device, and sending the media item set to said first instance of the user interface. | 2021-10-28 |
20210334391 | LOGIC CIRCUITRY - In an example, a method comprises, by logic circuitry associated with a replaceable print apparatus component, responding to a first validation request sent via an I2C bus to a first address associated with the logic circuitry with a first validation response; and responding to a second validation request sent via the I2C bus to a second address associated with the logic circuitry with a second validation response. | 2021-10-28 |
20210334392 | LOGIC CIRCUITRY - In an example, a logic circuitry package is configured to communicate with a print apparatus logic circuit. The logic circuitry package may be configured to respond to communications sent to a first address and to at least one second address. The logic circuitry package may comprise a first logic circuit, wherein the first address is an address for the first logic circuit. The package may be configured such that, in response to a first command indicative of a task and a first time period sent to the first address, the package is accessible via at least one second address for a duration of the time period. | 2021-10-28 |
20210334393 | AUTHORIZED PRINTING - In some examples, a memory resource may store non-transitory machine-readable instructions executable by a processing resource to authenticate a user, authorize the authenticated user at an imaging device for a finite amount of time and during the finite amount of time, automatically route a plurality of print jobs to a queue and automatically release the plurality of print jobs. | 2021-10-28 |
20210334394 | IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM FOR IMPLEMENTING THE METHOD - An image processing apparatus capable of reducing the frequency of a user's inputting work for authentication information to improve the convenience. When the number of the logged-in users is one, the logged-in user is set as an executor of the predetermined function, and when the number of the logged-in users is two or more, the user is caused to select one of the logged-in users to set the selected one as the executor of the predetermined function. | 2021-10-28 |
20210334395 | System and Method for Implementing and testing Security Protections in Computer Software - A computer implemented method of applying a technical application security posture to a software project is described. The method allows an industry or corporate wide technical security posture to be enumerated. It further allows multiple software applications to be represented based on existing or proposed software (source code) producing a model representation of the application. Implementations of the technical security posture can then be combined with the software application model to ensure the necessary technical security posture is applied to the application implementation. | 2021-10-28 |
20210334396 | CREATING VENDOR-NEUTRAL DATA PROTECTION OPERATIONS FOR VENDORS' APPLICATION RESOURCES - Creating vendor-neutral data protection operations for vendors' application resources is described. Capabilities specified for data protection operations by a vendor of an application are input from a host of the application. Any capabilities specified for the data protection operations are used to create a vendor-neutral version of a data protection operation for a resource of the application. The vendor-neutral version of the data protection operation for the application resource is output to the host. A result of performing the vendor-neutral version of the data protection operation on the application resource is input from the host. | 2021-10-28 |
20210334397 | PROCESSING SECURE CONTENT ON A VIRTUAL REALITY SYSTEM - Described herein are techniques and technologies to identify an encrypted content within a field of view of a user of a VR/AR system and process the encrypted content appropriately. The user of the VR/AR technology may have protected content in a field of view of the user. Encrypted content is mapped to one or more protected surfaces on a display device. Contents mapped to a protected surface may be rendered on the display device but prevented from being replicated from the display device. | 2021-10-28 |
20210334398 | TRAVEL DISTANCE INDICATION DEVICE AND METHOD - Provided is a travel distance indication device including a controller, wherein the controller includes: storage including a first memory for storing a cumulative travel distance and a second memory for storing a cumulative travel distance encoded value; a processing unit including a trusted processor for verifying whether the cumulative travel distance is valid, based on the cumulative travel distance encoded value; a display for displaying the cumulative travel distance when the cumulative travel distance is valid, wherein the storage and the display are accessible only by the trusted processor. | 2021-10-28 |
20210334399 | UNLOCKING ACCESS OF INFORMATION RESPONSIVE TO VALIDATION OF PROGRAM CODES OF VIRTUAL ENTITIES - In some examples, a management controller includes a communication interface to communicate with a computing device, where the management controller is separate from a processor of the computing device. The management controller includes a management processor to perform a validation of program codes of virtual entities of the computing device, and in response to the validation of the program codes, unlock access of information in an information store to allow access of the information by the computing device, wherein the information is for use by the virtual entities of the computing device, and wherein the management processor is to block access of the information in the information store prior to the validation. | 2021-10-28 |
20210334400 | RETRIEVAL SYSTEM, RETRIEVAL DEVICE AND RETRIEVAL METHOD - A retrieval system includes a first management unit which stores, in a first storage area that cannot be browsed by an administrator of a provider machine, management information in which an encrypted retrieval keyword used for a retrieval performed by the provider machine, and an encrypted ID, which is associated with the encrypted retrieval keyword, are associated and, of the management information, decrypts, and then once again encrypts, the encrypted retrieval keyword corresponding to the encrypted query from a browsing machine and the encrypted ID corresponding to the encrypted retrieval keyword, and a second management unit which stores, in a second storage area, index information in which the encrypted retrieval keyword used for the retrieval performed by the provider machine, and one or more encrypted IDs associated with the encrypted retrieval keyword, are associated, and, of the index information, updates the encrypted retrieval keyword and the encrypted ID. | 2021-10-28 |
20210334401 | METHODS AND SYSTEMS FOR PRIVACY PROTECTION VERIFICATION - Systems and methods for verifying requests for personal information are described. A server computing system may receive a request for personal information associated with a requester, the request sent based on a government regulation related to consumer privacy rights, the request including a first identifier provided by the requester, the personal information stored in one or more databases based on one or more past transactions engaged between the requester and an entity associated with the one or more databases. The server computing system may search the one or more databases using the first identifier to identify a second identifier related to the first identifier, the second identifier stored in the one or more databases by the entity based on the one or more past transactions. The server computing system may verify identity of the requester using at least the second identifier. Based on successfully verifying the identity of the requester, the server computing system may generate a notification indicating that the request for the personal information is accepted. | 2021-10-28 |
20210334402 | SYSTEMS AND METHODS FOR TRACKING DATA PROTECTION COMPLIANCE OF ENTITIES THAT USE PERSONALLY IDENTIFYING INFORMATION (PII) - A data management computing system for tracking data protection compliance of a plurality of entities using a data management (“DM”) server is provided. The DM server includes at least one processor programmed to: (i) receive, from a requesting entity, a personally identifying information (“PII”) consent request for access to a requested PII set of a user, (ii) determine at least one PII item associated with a reason code, (iii) compare the at least one PII item to the requested PII set, (iv) generate a consent recommendation, (v) transmit the consent recommendation to the user, (vi) receive a response indicating user consent, (vii) transmit, to the requesting entity, a notification indicating the user consent for the requesting entity to retrieve the at least one PII item from a third-party PII storage entity, and (viii) update a user profile to track the requesting entity with the at least one PII item. | 2021-10-28 |
20210334403 | GENERATION OF REPRESENTATIVE DATA TO PRESERVE MEMBERSHIP PRIVACY - Methods and systems for generating representative data. A generator is configured to create, using a learning model, one or more generated records based on a plurality of training records obtained from a sensitive database. A discriminator is trained to identify the generated records as being generated based on the training records and a privacy adversary is trained to identify a training sample as being more similar to a distribution of the generated records than a distribution of the reference records. | 2021-10-28 |
20210334404 | PRIVACY PRESERVING APPLICATION AND DEVICE ERROR DETECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting errors in a client device and its associated applications while preserving the privacy of the user of the device. Methods can include obtaining and blinding contextual application data for an application on a device. Data regarding the application's digital certificate and device trustworthiness data are obtained and provided to a trust assessment server along with the blinded data. This server can provide indications that the device is trustworthy and the application is authentic, and can digitally sign the blinded data. The digital signature can be validated and the unblinded contextual application data can be obtained. If the unblinded data matches the contextual application data, the application can provide the digital signature, the indications, and the unblinded contextual application data to an error detection server, which in turn can indicate the application does not have errors. | 2021-10-28 |
20210334405 | DATA COMPLIANCE MANAGEMENT IN RECORDING CALLS - A conference management system (“system”) facilitates data compliance in recording conversations between users. A host user can send an electronic invitation for a meeting to participants. Upon accessing the invitation, the participants can be presented with two options to join the conference—a first option using which a participant can join the meeting by providing consent to recording the meeting and a second option using which the participant can join the meeting by opting-out of recording of the meeting. When a participant opts-out of the recording of the meeting, the conference management system ensures that the recording is performed in compliance with a data compliance policy applicable to the participant who opted out of recording. | 2021-10-28 |
20210334406 | INTELLIGENT AND REVERSIBLE DATA MASKING OF COMPUTING ENVIRONMENT INFORMATION SHARED WITH EXTERNAL SYSTEMS - Described is a system for intelligent and reversible data masking of computing environment information shared with an external system. The system may leverage a secure masking agent that acts as an intermediary between a computing system (or environment) and an analytics component. The masking agent may provide real-time reversible data masking that ensures that sensitive information is not exposed outside of a secure (e.g. on-premises) environment, while at the same time ensuring the analytics component receives sufficient contextual information to perform a detailed analysis with the shared information. For example, the system may identify and mask identifying information of a particular server or host, while still retaining certain contextual information such as a network topology. | 2021-10-28 |
20210334407 | PERSONALLY IDENTIFIABLE INFORMATION STORAGE DETECTION BY SEARCHING A METADATA SOURCE - A configuration associated with locating personally identifiable information stored in a database is received. An alternate metadata source separate from the database is identified. The separate alternate metadata source is searched using the configuration to identify locations in the database that store personally identifiable information. | 2021-10-28 |
20210334408 | Private Computation of Multi-Touch Attribution - A plurality of anonymized publisher-user identifiers are received at a processor, and a plurality of anonymized advertiser-user identifiers are received from an advertiser at the processor. Without de-anonymizing any publisher-user identifiers in the received plurality of publisher-user identifiers and any advertiser-user identifiers in the received plurality of advertiser-user identifiers, the processor obliviously computes an intersection among the received publisher-user identifiers and the received ad-user identifiers to create an intersection set containing a plurality of advertiser-user identifiers matched with publisher-user identifiers. | 2021-10-28 |
20210334409 | INTEGRITY VERIFICATION IN CLOUD KEY-VALUE STORES - A computer-based system and method for verifying integrity of data in a key-value database, including assigning each key that is supported by the key-value database to a bucket in a keys database. Upon storing a pair of a value and a key in the key-value database, storing in the bucket assigned to the key a presence indicator indicative of a presence of the key in the key-value database. A bucket is assigned to a key by applying a predetermined function on the key. When reading a value from the key-value database, if the response is empty: getting from the keys database the bucket associated with the key and searching the bucket for the presence indicator associated with the key. If the presence indicator associated with the key is found in the bucket determining that the key-value database is not complete. | 2021-10-28 |
20210334410 | UPDATING A SECURITY POLICY - An example computing system is disclosed comprising storage to store a plurality of security policies for respective applications and storing, for each security policy, a respective security policy digest representing the security policy, a secure hardware component to store a digest of the security policy digests, and a processor to execute a software component to update the respective security policy digest of a first security policy of the plurality of security policies in response to an update to the first security policy, and to cause the secure hardware component to store an updated digest of the security policy digests. | 2021-10-28 |
20210334411 | CURRENT FLATTENING CIRCUIT FOR PROTECTION AGAINST POWER SIDE CHANNEL ATTACKS - Various implementations of a current flattening circuit are disclosed, including those utilizing a feedback current regulator, a feedforward current regulator, and a constant current source. | 2021-10-28 |
20210334412 | SECURED FILE STORAGE - Systems and methods may generally be used to securely store an executable file or to compile a securely stored executable file. An example method may include receiving an executable file for long-term storage, segmenting the executable file into a plurality of file segments, encrypting a file segment of the plurality of file segments, storing the plurality of file segments, and retrieving the file segment based on a segment identity for the file segment. The file segment may be output, for example to a requesting device. | 2021-10-28 |
20210334413 | STORAGE DEVICE AND SOLID STATE DRIVE DEVICE WITH STRUCTURE FOR REMOVING SECURE DATA, AND DATA CENTER INCLUDING THE SAME - A storage device includes a substrate, at least one secure element, a case and a coupling structure. The secure element is mounted on the substrate. The case surrounds the substrate and the secure element. The coupling structure integrally couples the secure element and the case, When at least a part of the case is removed, the secure element is destroyed while a connection remains between the secure element and the case by the coupling structure, and access to secure data stored in the secure element is prevented. | 2021-10-28 |
20210334414 | STORAGE DEVICE AND SOLID STATE DRIVE DEVICE WITH STRUCTURE FOR IMPROVING SECURITY PERFORMANCE AND REMOVING DATA, METHOD OF OPERATING THE SAME, AND DATA CENTER INCLUDING THE SAME - A storage device includes a substrate, at least one data storage element, a case, and at least one sensing pin. The substrate includes at least one security pad. The data storage element is mounted on the substrate. The case surrounds the substrate and the data storage element, and includes at least one contact structure for an electrical connection with the security pad. The sensing pin receives an electrical signal. A level of the electrical signal varies by detecting a change in a resistance according to whether the security pad is electrically connected to the contact structure. When at least a part of the case is removed, a level change of the electrical signal is detected, and a secure erase process for data stored in the data storage element is performed. | 2021-10-28 |
20210334415 | ANALYTICS PROCESSING CIRCUITRY FOR MITIGATING ATTACKS AGAINST COMPUTING SYSTEMS - Analytics processing circuitry can include a data scavenger and a data analyzer coupled to receive the data from the data scavenger. The data scavenger collects data from at least one element of interest of a plurality of elements of interest of an IC. The data analyzer identifies patterns in the data from the data scavenger over a time frame or for a snapshot of time based on a predefined metric. The analytics processing circuitry can further include a moderator and a risk predictor. The risk predictor generates a risk assessment regarding whether the data collected by the data scavenger is indicative of normal behavior or abnormal behavior based at least on the output of the data analyzer and a behavioral model for the IC, which can be device and application specific. A threat response can be performed based on the risk assessment. | 2021-10-28 |
20210334416 | STORAGE DEVICE PROVIDING FUNCTION OF SECURELY DISCARDING DATA AND OPERATING METHOD THEREOF - A storage device providing a function of securely discarding data and an operating method of the storage device are provided. The storage device includes a safety pin device removably mounted on the storage device, the safety pin device configured to store first encrypted information and second encrypted information, the first encrypted information encrypted using a first key associated with a first user, and the second encrypted information encrypted using a second key associated with a second user, security circuitry configured to, receive the first encrypted information from the safety pin device, decrypt the first encrypted information, and generate a data encryption key based on results of the decrypting the first encrypted information, and a nonvolatile memory configured to store data encrypted with the data encryption key. | 2021-10-28 |
20210334417 | INFORMATION HANDLING SYSTEM HOUSING LOCK - An information handling system housing is secured against unauthorized access with a security device integrated in the housing that selectively enables and disables screw movement relative to threads disposed in the housing. For instance, a freewheeling nut in the housing interfaces with an actuator that selectively releases or holds the freewheeling nut relative to the housing. When released, a screw coupled to the freewheeling nut cannot rotate relative to the threads of the freewheeling nut so that the screw maintains the housing secured until the freewheeling nut is held in position to allow removal of the screw. | 2021-10-28 |
20210334418 | METHOD, DEVICE AND POSITIONING SYSTEM FOR POSITIONING A SENSOR - Provided is a method, a device and a positioning system for positioning a sensor at an optimized position for optimized monitoring of a technical system. The method includes providing a physical simulation model of the technical system, wherein the physical simulation model includes a virtual sensor at a given position, simulating a performance of the technical system by the physical simulation model, providing a response signal of the virtual sensor to the simulated performance at the given position, determining a first optimized position for the virtual sensor where the response signal is intensified by an optimization algorithm, and providing co-ordinates of the first optimized position for positioning a physical sensor at the technical system. | 2021-10-28 |
20210334419 | METHOD FOR EARPIECE DESIGN VIA MISFIT PARAMETERS - A method of designing an earpiece for a user, includes: obtaining 3D scan data of an ear; obtaining a model earpiece with an earpiece configuration based on the 3D scan data; determining coupling data indicative of a coupling of the model earpiece, the coupling data including misfit data including one or more misfit parameters; evaluating the earpiece configuration based on the misfit data; and determining information regarding a personalized earpiece based on a result from the act of evaluating the earpiece configuration. | 2021-10-28 |
20210334420 | DRIVING SIMULATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND COMPUTER STORAGE MEDIUM - This application discloses a driving simulation method performed at an electronic device. The method includes: receiving parameters through a first configuration interface; determining, based on the parameters, a reference vehicle-to-vehicle distance, a reference vehicle speed, and a background vehicle quantity of a target lane; determining an initial location of each of background vehicles in the target lane based on a location of a test vehicle, the reference vehicle-to-vehicle distance, and a random distance deviation; determining an initial speed of each of the background vehicles in the target lane based on the reference vehicle speed and a random speed deviation; and simulating traveling of each of the background vehicles in a simulated traffic environment based on the initial location and the initial speed of each of the background vehicles and the background vehicle quantity. | 2021-10-28 |
20210334421 | SUPPORT DEVICE AND SEARCH KEY SHAPE REGISTRATION METHOD - Generation of a search key shape for identifying a dedicated shape with respect to three-dimensional CAD data is facilitated. A shape group registration unit registers multiple pieces of three-dimensional CAD data; a feature amount computation unit computes a feature amount with respect to each of the registered pieces of three-dimensional CAD data; a clustering unit clusters the pieces of three-dimensional CAD data based on a feature amount; a cluster center computation unit determines a feature amount of a cluster center of each cluster from a feature amount of three-dimensional CAD data; and a search key shape registration unit registers feature amount data of a cluster center as feature amount data of a search key shape. | 2021-10-28 |
20210334422 | SYSTEMS AND METHODS FOR SUSTAINABILITY AND SOCIAL INTERACTION ANALYSIS IN BUILDING INFORMATION MODELING - Described herein are systems and methods for building information modeling. An embodiment of the method includes: receiving a BIM; and transforming the BIM to flatten solid-volume geometry for space bounding elements into thin-walled boundaries of the thermal zones by: determining wall volumes from the BIM; collapsing the wall volumes to provide single surface walls; determining wall center surfaces and end points from the single surface walls; aligning, and trimming or extending, the single surface walls using the wall end points to create closed spaces; connecting the closed spaces vertically to generate a single water tight volume for the closed spaces; and creating interfaces between the single water tight volume for the closed spaces to generate thermal zones. | 2021-10-28 |
20210334423 | METHOD FOR CALCULATION OF NATURAL FREQUENCY OF MULTI-SEGMENT CONTINUOUS BEAM - A displacement spring and a rotational spring are arranged on both ends of the multi-segment continuous beam to simulate arbitrary boundary conditions, and a lateral displacement function of the multi-segment continuous beam over a whole segment is constructed. A strain energy, an elastic potential energy of simulated springs at a boundary, a maximum value of a kinetic energy, and a Lagrangian function of the multi-segment continuous beam are calculated. The improved Fourier series of the displacement function is substituted into the Lagrange function. An extreme value of each undetermined coefficient in the improved Fourier series in the Lagrangian function is taken to obtain a system of homogeneous linear equations which is further converted into a matrix. An eigenvalue problem of the standard matrix is solved for to obtain the natural frequency. | 2021-10-28 |
20210334424 | METHOD AND APPARATUS FOR LAYING OUT A WINDOW STRUCTURE - In a method for laying out a window structure on a construction project, a compass direction of at least one building side of the construction project is detected, window areas of window structure associated with building sides of the construction project are determined, and design parameters of the window structure are calculated based on the collected data and a database of windows. The calculation of the design parameters may include optimizing a lighting situation of the construction project. | 2021-10-28 |
20210334425 | METHOD OF DESIGNING, CONFIGURING AND ACCESSING A MODULAR SELF-STORAGE FACILITY - A storage facility and a method of designing, configuring, reconfiguring and accessing a modular self-storage facility that utilizes shipping containers and/or other pre-fabricated portable storage containers that can be arranged next to each other and stacked on top of each other in a way that provides an efficient design and use along with easy access to the facility and units and the ability for consumers to utilize what are in-effect, internal corridors. | 2021-10-28 |
20210334426 | SECTION MEASUREMENT SYSTEM - A method is provided for dimensioning a cross section of a structural product, the cross section having an arbitrary shape. The method includes defining and thereby producing a first definition of the cross section, and accessing template cross sections of various shapes, the template cross sections having respective second definitions of the template cross sections. The method includes performing a comparison of the first definition of the cross section and the respective second definitions of the template cross sections. The method includes identifying a matching one of the template cross sections based on the comparison, the matching one of the template cross sections further having respective locations from which the matching one of the template cross sections is dimensioned. And the method includes applying the respective locations to the cross section, and dimensioning the cross section from the respective locations. | 2021-10-28 |
20210334427 | VIRTUAL THROAT INSPECTION - An improved manufacturing method includes virtually aligning scanned virtual vane components that are virtual electronic counterparts of separately manufactured and three-dimensionally scanned physical vane components used in gas turbine engines. The improved method performs virtual alignments for any of various possible virtual combinations of the virtual vane components to predict how their physical counterparts would likely behave in combination with each other before those physical counterparts are inseparably combined. One or more optimal virtual combinations are identified, in turn indicating optimal physical combinations to select to form physical vanes incorporated into one or more gas turbine engines, in turn improving the quality of the vanes and ultimately engine performance. | 2021-10-28 |