01st week of 2022 patent applcation highlights part 47 |
Patent application number | Title | Published |
20220004609 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM - An authentication device includes an image acquisition unit, an identification unit, and an authentication unit. The image acquisition unit acquires an image of an eye of a subject. The identification unit identifies the colored pattern of a colored contact lens worn by the subject by comparing a reference image with the image of the eye. The authentication unit identifies the subject, using a feature in a region other than a colored region of the colored pattern in the iris region of the eye. | 2022-01-06 |
20220004610 | BIOMETRIC BASED SELF-SOVEREIGN INFORMATION MANAGEMENT - The present teaching relates to method, system, medium, and implementations for authenticating a user. A first request is received to set up authentication information with respect to a user, wherein the first request specifies a type of information to be used for future authentication of the user. It is determined whether the type of information related to the user poses risks based on a reverse information search result. The type of information for being used for future authentication of the user is rejected when the type of information is determined to pose risks. | 2022-01-06 |
20220004611 | IDENTIFYING AND AUTHENTICATING USERS BASED ON PASSIVE FACTORS DETERMINED FROM SENSOR DATA - The disclosed embodiments relate to a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to detecting a trigger event, the system collects sensor data from one or more sensors in the electronic device. Next, the system extracts a feature vector from the sensor data. The system then analyzes the feature vector to authenticate and/or identify the user, wherein the feature vector is analyzed using a model trained with sensor data previously obtained from the electronic device while the user was operating the electronic device. | 2022-01-06 |
20220004612 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - An authentication system includes user information acquisition circuitry configured to acquire user information of a user, the user information including image information of the user or voice information of the user; authentication information extraction circuitry configured to extract, from the user information, authentication information corresponding to a plurality of types of authentication; and authentication circuitry configured to perform an authentication procedure, using the authentication information, to authenticate the user. | 2022-01-06 |
20220004613 | SYSTEM AND METHOD FOR AFFIXING A SIGNATURE USING BIOMETRIC AUTHENTICATION - A system and method for affixing a signature using biometric authentication, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1), receiving a document signing request from an application. Once the user is registered, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may capture the user's approval to affix the user's signature to the document and transmit the user's signature to the application upon successful authentication of the user. | 2022-01-06 |
20220004614 | MULTI-LEVEL AUTHENTICATION FOR SHARED DEVICE - A computer system is provided for protecting access to one or more hardware devices with a hardware device password that is invisible to a user, the system comprising a mobile device and the hardware device, the mobile device including: a memory, the memory storing one or more invisible passwords; an application in the memory; a wireless interface for communicating with the hardware device; and a processor coupled to the memory, the application and the wireless interface, the hardware device including: a memory; a wireless interface for communicating with the mobile device; and a processor coupled to the memory and the wireless interface; wherein the processor in the mobile device is configured to receive a hardware device identifier from the processor in the hardware device; wherein the application in the mobile device is configured to select, based upon the hardware device identifier, the invisible password for the hardware device; and the processor in the hardware device is configured to authenticate the application upon receipt of the invisible password. | 2022-01-06 |
20220004615 | Security Mechanism for an Electronic Device - According to some aspects, disclosed methods and systems may include determining, by an electronic device, a value associated with a first parameter configured to dynamically change, and displaying, via a user interface, an object corresponding to the value associated with the first parameter. The methods and systems may also include receiving, via the user interface, an input intended to unlock the electronic device, unlocking the electronic device if the received input interacts with the object in a predefined manner, and maintaining the electronic device in a locked state if the received input does not interact with the object in the predefined manner. | 2022-01-06 |
20220004616 | ANTI-REPLAY AUTHENTICATION SYSTEMS AND METHODS - Systems and methods for authentication with resistance to replay attacks are provided. A device may be used to capture image data of a physical token to authenticate or identify a user. Authentication information may be obtained by processing and analyzing the captured image data. Data about a state of the imaging device and the captured image data may be used for fraud detection. The data may be collected when the image data is processed and analyzed. The state of the imaging device and captured image data are unlikely to be repeated. The detected repetition of a state of the imaging device and captured image data may be a cause for increasing the likelihood that a replay attack is taking place. The device may be used to perform a transaction. | 2022-01-06 |
20220004617 | PASSWORDLESS AUTHENTICATION SYSTEMS AND METHODS - A passwordless authentication method authenticates a user to access a remote computer. A mobile device receives a flash pattern included on a webpage by an authenticator. A body part of a user of the mobile device is biometrically authenticating at the mobile device. Concurrently with the authenticating, a modulated optical signal based upon the flash pattern is emit toward the body part and detected remission of the modulated optical signal by the body part is recorded as a remitted pattern. An indication of authenticity of the user, as determined by the step of biometrically authenticating, and the remitted pattern are communicated to the authenticator, and the user is authenticated to the website based upon the indication of authenticity and a match of the remitted pattern to the flash pattern. | 2022-01-06 |
20220004618 | CONTROL UNIT FOR A BATTERY SYSTEM - The present invention relates to a method for generating a security identifier for a control unit ( | 2022-01-06 |
20220004619 | SYSTEM AND METHOD FOR ENABLING A USER TO CREATE AN ACCOUNT ON AN APPLICATION OR LOGIN INTO THE APPLICATION WITHOUT HAVING THE USER REVEAL THEIR IDENTITY - A system and method for enabling a user to create an account on an application and login into the application, without having the user reveal their identity, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1). Once the user is registered, the system is configured to receive an account creation request from an application. Further, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may generate an Application User ID based on the authentication and transmit to the application a request to enable the user to create an account on the application or login to the application, wherein the request comprises the Application User ID. | 2022-01-06 |
20220004620 | SECURITY CODE SELECTION AND RECALL DEVICES AND METHODS THEREOF - A device includes a viewfinder wheel with at least one viewfinder window, two or more code wheels rotatably coupled together with the viewfinder wheel about an axis, a plurality of characters, a plurality of code symbols, and a plurality of internal windows. The characters are spaced about a circumferential outer side of the viewfinder wheel and the code wheels. The code symbols are located in regions of a surface of each of the code wheels with each of the regions spaced out a different distance from the axis. The internal windows are in at least one of the code wheels adjacent the viewfinder wheel, wherein alignment of one of the characters of each of the viewfinder wheel and the code wheels at a key sequence location reveals through the viewfinder window and one or more of the internal windows a code sequence comprising a subset of the code symbols. | 2022-01-06 |
20220004621 | DATA RECOVERY THROUGH REVERSAL OF HASH VALUES USING PROBABILISTIC DATA STRUCTURES - Systems and methods for recovering passwords from a hash value input are provided. A password space may be segmented into password sets, and a digest set may be generated for each password set. Probabilistic data structures representing the digest sets may be generated. One of the probabilistic data structures may be queried with the hash value input to determine whether the hash value input is likely included in the digest sets. In response to the hash value input being determined to be likely included in the digest set, the passwords constituting the password set corresponding to the digest set may be regenerated, and the hash values constituting the digest set may be regenerated. The generated hash values may be compared to the hash value input to determine a hash value from the digest set that matches the hash value input to recover the password associated with the matched hash value. | 2022-01-06 |
20220004622 | METHOD, SYSTEM AND CIRCUIT FOR MANAGING A SECURE MEMORY PARTITION - Disclosed are methods, systems and devices for storing states in a memory in support of applications residing in a trusted execution environment (TEE). In an implementation, one or more memory devices accessible by a memory controller may be shared between and/or among processes in an untrusted execution environment (UEE) and a TEE. | 2022-01-06 |
20220004623 | MANAGED ISOLATED WORKSPACE ON A USER DEVICE - A method and system for method for providing a managed and isolated workspace on a user device are provided. The method creating a secured workspace in the user device, wherein the secured workspace is separated from a host operating system and includes a guest operating system; monitoring activity performed in the secured workspace and host operating system; determining, based on a security policy, if the monitored activity is risky; and causing execution of any determined risky activity in the secured workspace, thereby defending the host operating system from the determined risky activity, wherein the host operating system executes sensitive applications to an organization. | 2022-01-06 |
20220004624 | SYSTEM AND METHOD FOR CONTAINER ASSESSMENT USING SANDBOXING - An example method for a software container includes instantiating the following in a sandbox of a computing device: an operating system, a Berkeley Packet Filter (BPF) virtual machine within a kernel of the operating system, and a software container. The kernel monitors runtime behavior events of the software container, with the monitoring at least partially performed by the BPF virtual machine. Based on the monitoring, a respective risk score is assigned to each of the runtime behavior events that is potentially malicious, with each risk score indicating a likelihood that a corresponding behavior event is malicious. An overall risk score is assigned to the software container that indicates a likelihood that the software container is malicious based on the respective risk scores. | 2022-01-06 |
20220004625 | EMBEDDED SECURE ELEMENT - An embedded electronic system includes a volatile memory and a processor configured to execute a low-level operating system that manages allocation of areas of the volatile memory to a plurality of high-level operating systems. Each high-level operating system executes one or more of applications. The volatile memory includes a first portion reserved for execution data of a first application and a second portion intended to store execution data of a second application. The system is configured so that once the execution data of the first application are loaded in the first portion, the low-level operating system forbids unloading of the execution data of the first application from the first portion so that the execution data of the first application remain in the volatile memory in case of a deactivation or of a setting to standby of the first application. | 2022-01-06 |
20220004626 | GENERATING AN AUTOMATED SECURITY ANALYSIS FOR AN INSTALLATION - A method, with the aid of which an installation-wide security consideration may be carried out, that is not limited only to automation components of a single manufacturer, but that functions across all manufacturers, is provided. Through suitable user guidance and automated support in process-conforming execution of assessments, incident handling and the definition of security measures as well as corresponding tracking, the method has a high level of user-friendliness. A rule generator uses security criteria in order to develop user-specific analysis rules from a complex rulebook with a number of input values. All the installation-relevant data is automatically compiled in an inventory. The machine security auditor applies the user-specific rulebook to the collected installation data from the asset inventory, and from that, prepares the audit trail. | 2022-01-06 |
20220004627 | ATTESTATION WITH A QUANTIFIED TRUSTED COMPUTING BASE - An apparatus and method include generating a trusted computing base (TCB) component identifier (TCI) of a current component of a computing system, generating a compound device identifier (ID) (CDI) of the current component from a CDI of a previous component of the computing system and the TCI of the current component, and determining a size of the TCI of the current component. The system and method further include summing the size of the TCI of the current component and the cumulative size of the TCIs of previous components of the computing system to generate a current cumulative size, combining the current cumulative size and the CDI of the current component, and including the combined current cumulative size and the CDI of the current component in a chain of measurements for attestation of the computing system. | 2022-01-06 |
20220004628 | USING A CHARACTERISTIC OF A PROCESS INPUT/OUTPUT (I/O) ACTIVITY AND DATA SUBJECT TO THE I/O ACTIVITY TO DETERMINE WHETHER THE PROCESS IS A SUSPICIOUS PROCESS - Provided are a computer program product, system, and method for detecting a security breach in a system managing access to a storage. Process Input/Output (I/O) activity by a process accessing data in a storage is monitored. A determination is made of a characteristic of the data subject to the I/O activity from the process. A determination is made as to whether a characteristic of the process I/O activity as compared to the characteristic of the data satisfies a condition. The process initiating the I/O activity is characterized as a suspicious process in response to determining that the condition is satisfied. A security breach is indicated in response to characterizing the process as the suspicious process. | 2022-01-06 |
20220004629 | APPARATUSES AND METHODS FOR DETECTING MANIPULATION ON A BUS SYSTEM OF A VEHICLE - A safety device for detecting manipulations on a bus system of a vehicle includes a receiver configured to connect to the bus system of the vehicle and to receive a signal from the bus system, an analyzer configured to analyze a transition between signal states of the signal, and an evaluator configured to evaluate the signal as a manipulated signal or an unmanipulated signal based on analysis performed by the analyzer. | 2022-01-06 |
20220004630 | SYSTEMS AND METHODS FOR A MULTI-MODEL APPROACH TO PREDICTING THE DEVELOPMENT OF CYBER THREATS TO TECHNOLOGY PRODUCTS - Systems may anticipate exploitation of cyber threats to various technologies. The systems may receive threat-intelligence data from a threat intelligence source, extracting a technology identified in the threat-intelligence data, and extract a first tactic from the threat-intelligence data wherein the tactic is associated with the technology. The system may receive ground-truth data from a ground-truth data source and extract a second technology identified in the ground-truth data. The first technology may match the second technology. The system may extract a second tactic from the ground-truth data wherein the tactic is associated with the technology with the first tactic matching the second tactic. The system may train a statistical model to predict threats to at least one of the first technology or the second technology. | 2022-01-06 |
20220004631 | DISCRIMINATION APPARATUS, DISCRIMINATION METHOD AND LEARNING APPARATUS - According to the present embodiment, a discrimination apparatus includes a processor. The processor extracts a plurality of instructions from binary data. The processor generates a plurality of input data strings by padding with a fixed character on data strings of the instructions so that the data strings of the instructions each have a fixed length. The processor generates a feature vector of a program including the instructions or a classification result related to the program by using the input data strings and a trained convolutional neural network including a convolution layer that performs processing in units of the instructions. | 2022-01-06 |
20220004632 | MALWARE DETECTION BASED ON USER INTERACTIONS - A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware. | 2022-01-06 |
20220004633 | APPARATUS, METHOD AND COMPUTER PROGRAM FOR DETECTING MALWARE - Examples of the disclosure can provide an apparatus for detecting malware. The apparatus can comprise means for: selecting one or more tasks to be performed by a user device during charging of the user device; enabling a power trace to be obtained wherein the power trace provides an indication of the power consumed by the user device while the one or more tasks are being performed; and enabling the power trace to be analysed to provide an indication of the presence of malware. | 2022-01-06 |
20220004634 | ELECTRONIC DEVICE FOR PROVIDING SECURITY-REQUIRED SERVICE THROUGH SECURE ELEMENT, AND METHOD FOR CONTROLLING SAME ELECTRONIC DEVICE - Disclosed is an electronic device comprising: a touchscreen display; a first processor operatively connected to the touchscreen display; a first memory operatively connected to the first processor so as to store a first application; and a secure element operatively connected to the touchscreen display; the first processor, and the first memory, wherein the secure element comprises a second processor, and a second memory configured to store a first framework, a plurality of second frameworks, and a first applet associated with the first application. In addition, various embodiments identified through the specification are possible. | 2022-01-06 |
20220004635 | COMPUTING PERIPHERAL INTERFACE MANAGEMENT MECHANISM - An apparatus is disclosed. The apparatus comprises a trusted device including a first integrated circuit (IC) die comprising a first plurality of hardware devices and a second IC die comprising a second plurality of hardware devices and cryptographic processor to operate as a root of trust to manage an input/output (I/O) functional state of each of the hardware devices. | 2022-01-06 |
20220004636 | STATISTICAL DETECTION OF FIRMWARE-LEVEL COMPROMISES - Statistical detection of firmware-level compromises can be enabled and performed on a computing system. During pre-boot, a pre-boot agent can access firmware loaded in memory and cause it to be stored in a manner that will allow the firmware to be accessed at runtime. During runtime, the firmware can be accessed and stored as files in the file system or other storage location accessible to an antivirus solution. The antivirus solution can then analyze the files using statistics-based techniques to thereby detect compromises in firmware. | 2022-01-06 |
20220004637 | PREVENTING DISCOVERY OF UNIQUE IDENTIFIERS IN FIRMWARE - Discovery of unique identifiers in firmware can be prevented. During the boot process on a computing system, and after the firmware has generated firmware tables containing unique identifiers, an anonymizer module of the firmware can generate an anonymized version of the firmware tables and cause the anonymized version of the firmware tables, rather than the original, system-unique firmware tables, to be accessible after the operating system is loaded. In this way, once the operating system is loaded, when a module attempts to read the firmware tables, the read will be performed against the anonymized version of the firmware tables thereby preventing the module from obtaining any of the computing system's unique identifiers. A copy of the firmware tables may be maintained separately from the anonymized version of the firmware tables to enable authorized utilities to obtain the computing system's unique identifiers. | 2022-01-06 |
20220004638 | SCHEME OF USING ELECTRONIC DEVICE TO ACTIVATE MASS PRODUCTION SOFTWARE TOOL TO INITIALIZE MEMORY DEVICE INCLUDING FLASH MEMORY CONTROLLER AND FLASH MEMORY - A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory includes: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file; comparing unique information of the electronic device with unique information recorded in the temporarily decrypted configuration file to determine whether the electronic device is valid/authorized; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized. | 2022-01-06 |
20220004639 | ARTIFICIAL REALITY SYSTEM WITH MULTI-STAGE BOOT PROCESS - Techniques are described for improving security of a boot sequence of a system, such as an artificial reality system. In some examples, a method includes configuring, by a boot sequencing system, attack detection circuitry based on configuration information accessed from a first storage device; after configuring the attack detection circuitry, starting, by the boot sequencing system, a root of trust processor to initiate a boot sequence; enabling access, by the root of trust processor during the boot sequence, to secret information stored in a second storage device. | 2022-01-06 |
20220004640 | OUT OF BAND MANAGEMENT OF BASIC INPUT/OUTPUT SYSTEM SECURE BOOT VARIABLES - A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot variables to a basic input/output system (BIOS) during a power on self-test, where the BIOS utilizes the secure boot variables during runtime to authenticate drivers and an operating system loader execution. In particular embodiments, the secure boot variables may be included in a white list, a black list, or a key list and, further, stored in erasable programmable read only memory. | 2022-01-06 |
20220004641 | METHOD AND APPARATUS FOR SECURE DEVICE BOOT - Introduced here are technologies for securely booting a network access device or a satellite device. A network-accessible server system may receive a boot request that includes a boot certificate to identify the network access device. The network-accessible server system may determine that the boot certificate corresponds with a verified boot certificate listed on a boot certificate registry. The network-accessible server system may determine that a geographical location of the network access device and a user electronic application executing on an electronic device are within a predetermined range. The network-accessible server system may distribute a digital certificate to the network access device based on determining that the boot certificate corresponds with any verified boot certificate listed on the boot certificate registry and determining that the geographical location of the network access device and the user electronic application executing on the electronic device are within the predetermined range. | 2022-01-06 |
20220004642 | VULNERABILITY ANALYSIS USING CONTEXTUAL EMBEDDINGS - A method, a computer system, and a computer program product for vulnerability analysis using contextual embeddings is provided. Embodiments of the present invention may include collecting labeled code snippets. Embodiments of the present invention may include preparing the labeled code snippets. Embodiments of the present invention may include tokenizing the labeled code snippets. Embodiments of the present invention may include fine-tuning a model. Embodiments of the present invention may include collecting unlabeled code snippets. Embodiments of the present invention may include predicting a vulnerability of the unlabeled code snippets using the model. | 2022-01-06 |
20220004643 | AUTOMATED MAPPING FOR IDENTIFYING KNOWN VULNERABILITIES IN SOFTWARE PRODUCTS - Systems, methods, and computer-readable for identifying known vulnerabilities in a software product include determining a set of one or more processed words based on applying text classification to one or more names associated with a product, where the text classification is based on analyzing a database of names associated with a database of products Similarity scores are determined between the set of one or more processed words and names associated with one or more known vulnerabilities maintained in a database of known vulnerabilities in products. Equivalence mapping is performed between the one or more names associated with the product and the one or more known vulnerabilities, based on the similarity scores. Known vulnerabilities in the product are identified based on the equivalence mapping. | 2022-01-06 |
20220004644 | CENTRALIZED NETWORK ENVIRONMENT FOR PROCESSING VALIDATED EXECUTABLE DATA BASED ON AUTHORIZED HASH OUTPUTS - A centralized network environment is provided for processing validated executable data based on authorized hash outputs. In particular, the system may generate cryptographic hash outputs of code or software that has been evaluated (e.g., within a virtual environment). The system may then store the hash outputs within a hash database which may be accessible by multiple entity networks, where multiple entities may upload hash output values to and/or retrieve hash output values from the hash database. Based on the data within the hash database, each entity may efficiently identify code that may be safe or unsafe to execute on certain computing systems within its network environment. The system may further comprise an artificial intelligence-powered component which may be configured to detect patterns within code that has been identified by the system as unsafe and provide notifications containing systems likely to be affected and recommended countermeasures. | 2022-01-06 |
20220004645 | SYSTEMS AND METHODS FOR AUTOMATED THREAT MODELING WHEN DEPLOYING INFRASTRUCTURE AS A CODE - Systems and methods of generating a threat model from a code file are defined. The system includes one or more data stores communicatively coupled with a processor, and storing information on a plurality of properties to be configured for one or more resources included in the code file and a plurality of security threats associated with one or more values of the plurality of properties. The system analyzes the code file to identify one or more properties associated with the one or more resources included in the code file. For each property, a value for the property defined in the code file is identified, one or more security threats are determined based on the identified value for the property, using the information stored in the data stores. The system generates a threat model for the one or more resources based on the determined one or more security threats. | 2022-01-06 |
20220004646 | METHOD AND APPARATUS FOR CLUSTERING PRIVACY DATA OF PLURALITY OF PARTIES - Embodiments of the present specification provide a method and an apparatus for clustering privacy data of a plurality of parties. The method includes: a first party determining a first data part of central data currently corresponding to a cluster of K clusters, where the first data part corresponds to a first dimension set; a second party has a second data part of the central data corresponding to a second dimension set; separately using central data of a cluster of the K clusters as target central data, and obtaining a first segment of a target distance between a sample of the N samples and the target central data through local calculation based on a first feature part of any one of N samples and the first data part of the target central data; determining a shortest target distance among target distances by performing joint comparison using the first segment of each target distance and a second segment of each target distance of the second party through secret sharing; and determining a cluster corresponding to the shortest target distance as a cluster that any sample currently belongs to. As such, leakage of privacy data can be prevented. | 2022-01-06 |
20220004647 | BLOCKCHAIN IMPLEMENTATION TO SECURELY STORE INFORMATION OFF-CHAIN - A processor may define a datastore connection object. The datastore connection object may include information regarding an off-chain datastore. The processor may associate the identifier to the datastore connection object. The processor may store the datastore connection object with the identifier in the blockchain network. The processor may identify that a request is being sent within the blockchain network. The request may include private information. The processor may determine whether to allow the request access to the off-chain datastore. | 2022-01-06 |
20220004648 | METHOD AND SYSTEM FOR SECURING DATA USING RANDOM BITS - Securing data using random bits uses a TRNG disk with a plurality of random bits and a universally unique identifier (UUID). At least one TRNG disk copy is created, which is identical to the TRNG disk. The TRNG disk copy is stored in a separate physical location than the TRNG disk. Source data is received and encrypted with a block of random bits of the TRNG disk to produce encrypted data. The block of random bits of the TRNG disk has a bit offset which is a positional address of the block of random bits within the TRNG disk. The encrypted source data, the UUID, and the bit offset of the TRNG disk are communicated from a first location to at least a second location. The encrypted source data is decrypted at the second location using the UUID, the offset of the TRNG disk, and the TRNG disk copy. | 2022-01-06 |
20220004649 | SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA - Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The. intelligent cipher transfer object includes a set of participants protected by cloaking patterns. A portable dynamic rule set, which includes executable code for managing access to the protected set of participants, is included within the intelligent cipher transfer object. For a given user, the intelligent cipher transfer object may provide access to some of the participants while preventing access to other participants, based on the portable dynamic rule set therein. | 2022-01-06 |
20220004650 | DATA MANAGEMENT SYSTEM AND DATA MANAGEMENT METHOD - A data management system includes: a device capable of operating in accordance with each operational data among multiple operational data; a first setting means for setting a security policy for each operational data among the multiple operational data; a second setting means for setting security setting data for each operational data among the multiple operational data, the security setting data satisfying the security policy set to the operational data; an authentication means for performing authentication by matching input data with the security setting data set to target operational data; and a control means for causing the device to perform an operation in accordance with the target operational data, when the authentication is successful. This can reduce the time and labor required to set the security policy. | 2022-01-06 |
20220004651 | MANAGEMENT OF COMPUTING SECRETS - A method can include receiving a read request from a client program. The method can further include obtaining, in response to receiving the read request, one or more secrets from a secrets store. The obtaining can include storing the one or more secrets in a storage location. The method can further include initiating, in response to the read request, a transmission of the one or more secrets to the client program. The method can further include deleting the one or more secrets from the storage location. | 2022-01-06 |
20220004652 | PROVIDING IMAGES WITH PRIVACY LABEL - A method for providing images, comprising: performing authentication of an entity ( | 2022-01-06 |
20220004653 | Apparatus and Method for Securing Web Application Server Source Code - Systems, related methods and other means for providing the securing of web site source code are provided herein. The system and methods may be configured to poll a client device and/or to otherwise determine whether a debugging console is active on a client device and deny access to the JavaScript and source code if the debugging console is active. Additionally or alternatively, the system and methods may receive a request to access the source code form a client device, and may determine whether the request is from a trusted referrer and whether the debugging console is active. When the request is from an untrusted referrer, and/or when the debugging console is active the system and method can deny access to the source code. When the request is from a trusted referrer and the debugging console in inactive, the system and method can grant access to the source code. | 2022-01-06 |
20220004654 | SECURITY MEASURES FOR DETERMINATION OF PRIVATE SET INTERSECTIONS - Systems, methods, devices, and other techniques for preserving privacy when comparing private datasets from first and second computing systems. The second computing system identifies a first set of identifiers corresponding to records in a private database of the second computing system. The second computing system receives blinded versions of a set of identifiers corresponding to records in a private database of the first computing system. The second computing system determines an intersection or characteristic thereof of the records in the private database of the first computing system and the records in the private database of the second computing system based on matches between the blinded versions of the first and second sets of identifiers. | 2022-01-06 |
20220004655 | DATABASE ACCESS CONTROL SERVICE IN NETWORKS - A system supporting a networked database service includes a controller configured to receive one or more data request and authenticate the one or more data request. A gateway (GW) in communication with the controller, is configured to receive at least one of the one or more data request from the controller, perform data classification on data received in the request, and generate a cryptographic key based on the data classification, a hardware-protected key of the GW, and a second (encryption) key. The cryptographic key is for accessing a database. The controller and the GW are operated by different parties. | 2022-01-06 |
20220004656 | MULTI-USER ACCESS CONTROLS IN ELECTRONIC SIMULTANEOUSLY EDITABLE DOCUMENT EDITOR - A system with an interactive user interface for a plurality of users to author an electronic document simultaneously is described. The system displays visual feedback on the interface to prevent the users from interfering with one another. The system displays data from a remote database linked into the document based on unique identifiers. The data is displayed as an “artifact.” The system monitors and tracks each user's access category level, as well as the access category level of each piece of data pulled from the remote database. The system compares a user's category level to the data from the database to make visible only the portions of the document the user has the appropriate access category level to view and/or modify. The portions of the document that have a higher category level than the user will be hidden from the user either in part or completely. Also, there may be an indicator to the user of such redacted or hidden content from the user's viewer. | 2022-01-06 |
20220004657 | SECURE AND ACCOUNTABLE DATA ACCESS - Methods and systems for controlling access to data. One method includes storing, by an electronic processor, a registration record for a user in a database identifying a first user device associated with the user. A data access request from the first user device is authenticated by the electronic processor based on the registration record. A key is provided by the electronic processor to the first user device responsive to authenticating the data access request. Data obfuscated with the key is sent to the first user device. A consumption record is stored in the database responsive to an employing of the key to de-obfuscate the data. | 2022-01-06 |
20220004658 | CARDIAC MONITORING SYSTEM - An identification system including a first biometric identifier, a second biometric identifier, a first cardiac identifier logically related to the first biometric identifier, a second cardiac identifier logically related to the second biometric identifier, where the identity of a user is verified using the biometric identifiers and the cardiac identifiers. | 2022-01-06 |
20220004659 | DATA SUBJECT ACCESS REQUEST PROCESSING SYSTEMS AND RELATED METHODS - In particular embodiments, computer-implemented data processing, systems, and method configured to: receive a request to initiate a transaction between an entity and a data subject, generate (i) a consent receipt for the transaction comprising at least a unique subject identifier and a unique consent receipt key and (ii) a unique cookie to identify the data subject's transaction initiated by the data subject, store the consent receipt for the transaction and the unique cookie, receive a data subject access request from the data subject, verify an identity of the data subject based at least in part on the unique cookie process the request, process the request by identifying one or more pieces of personal data associated with the data subject, and taking one or more actions based at least in part on the data subject access request. | 2022-01-06 |
20220004660 | UNSUBSCRIBE AND DELETE AUTOMATION - Methods, computer-readable media, software, and apparatuses may assist a consumer in deleting personal information held by a data broker Entities holding the consumer's personal information may be discovered and automated actions for purging or deleting the consumer's personal information may be determined. The methods, computer-readable media, software, and apparatuses may assist the consumer in updating privacy settings associated with accounts at various entities. | 2022-01-06 |
20220004661 | SYSTEM AND METHOD FOR ENABLING SOCIAL NETWORK USERS TO GRANT THEIR CONNECTIONS GRANULAR VISIBILITY INTO THEIR PERSONAL DATA WITHOUT GRANTING THE SAME VISIBILITY TO THE NETWORK OPERATOR - A system and method for enabling social network users to grant their connections, granular visibility into their personal data without granting the same visibility to the network operator, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1). Once the user is registered, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may enable the set of first degree connections, the set of second degree connections, the set of third degree connections, and the set of other people to access the personal data associated with the user. | 2022-01-06 |
20220004662 | SECURE MULTI-CLIENT DATA ANALYSIS - According to a disclosed embodiment, data analysis is secured with a microservice architecture and data anonymization in a multitenant application. Tenant data is received by a first microservice in a multitenant application. The tenant data is isolated from other tenant data in the first microservice and stored separately from other tenant data in a tenant database. The tenant data is anonymized in the first microservice and thereafter provided to a second microservice. The second microservice stores the anonymized tenant data in an analytics database. The second microservice, upon request, analyzes anonymized tenant data from a plurality of tenants from the analytics database and provides an analytics result to the first microservice. | 2022-01-06 |
20220004663 | DATA PROCESSING CONSENT MANAGEMENT SYSTEMS AND RELATED METHODS - In various embodiments, a personal data processing system may require guardian consent (e.g., parental consent) for a data subject in order to collect, store, and or process the subject's personal data. The system may prompt the data subject to initiate a request for guardian consent or the system may initiate a request for guardian consent without initiation from the data subject (e.g., in the background of a transaction). In some embodiments, the system may require guardian consent when a data subject is under the age for valid consent for the particular type of personal data that will be collected as part of a particular transaction. Data processing systems may generate and store one or more consent records memorializing valid consent for data processing from data subjects and/or from guardians on their behalf (e.g., in the case of a minor data subject). | 2022-01-06 |
20220004664 | DATA INTEGRITY PROCEDURE - Techniques are disclosed relating to ensuring data integrity between database objects. A computer system may receive a data integrity request for a first set of database tables. The computer system may generate at least two work items that correspond to respective data cell groups in the first set of database tables. The computer system may then cause a plurality of processes to perform the at least two work items to generate a first plurality of hash values that includes hash values for the respective data cell groups. The first plurality of hash values may be usable to compare with corresponding ones of a second plurality of hash values generated based on corresponding data cell groups in a second set of database tables replicated from the first set of database tables. | 2022-01-06 |
20220004665 | CONSENSUS METHOD AND DATA VERIFICATION METHOD, APPARATUS, AND SYSTEM OF CONSORTIUM BLOCKCHAIN - A consensus method includes: when a first consensus node of a consortium blockchain performs a consensus operation on a consensus proposal, sending a verification signature to a second consensus node of the consortium blockchain, wherein the verification signature is configured to represent at least one consensus verification item set by the first consensus node sending the verification signature for the consensus proposal; receiving, by the first consensus node, a verification signature sent by at least one of the second consensus node or a third consensus node of the consortium blockchain for the consensus proposal; and after the first consensus node reaches a consensus on proposal data of the consensus proposal, generating a block recording the received verification signature corresponding to the consensus proposal and the proposal data, wherein the verification signature recorded in the block is configured to prove validity of the proposal data recorded in the block. | 2022-01-06 |
20220004666 | SECURE DIGITAL DATA COLLECTION - Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution. | 2022-01-06 |
20220004667 | Method for Managing Data Asset in Data Bank and Data Bank System - A method for managing data asset in a data bank is provided, including: acquiring a confirmation authentication request, wherein the confirmation authentication request includes a data asset to be confirmed, characteristic information of the data asset and characteristic information of a data provider uploaded by the data provider; performing a confirmation verification on the data asset through a confirmation blockchain based on the data asset, the characteristic information of the data asset and the characteristic information of the data provider in response to the confirmation authentication request; storing confirmation information corresponding to the data asset into the confirmation blockchain after it is determined that the data asset has passed the confirmation verification; inserting identification data for tracing a data owner into the data asset, obtaining and storing the data asset having the identification data. | 2022-01-06 |
20220004668 | LOCKABLE PARTITION IN NVME DRIVES WITH DRIVE MIGRATION SUPPORT - Methods and apparatus relating to a lockable partition in NVMe (Non-Volatile Memory express) drives with drive migration support are described. In an embodiment, a Non-Volatile Memory (NVM) device stores data and partition logic circuitry locks or unlocks a partition on the NVM device in response to a command. The NVM device is physically migratable to a different platform and the NVM device is protected after power loss during runtime. The partition logic circuitry locks or unlocks the partition in response to the command and a cryptographic key. Other embodiments are also disclosed and claimed. | 2022-01-06 |
20220004669 | Encrypting Touch Screen - In accordance with an example embodiment there is disclosed herein a method for authenticating a touch screen layout. A file containing the touch screen layout is signed by a key known to the device that is to deploy the touch screen layout, such as, for example an automated banking machine and/or a point of sale system. Before the touch screen is used by the device's user interface, the device validates the touch screen. | 2022-01-06 |
20220004670 | Flexible Manipulation Device and Method for Fabricating the Same - A manipulation device includes an appendage extending from a base, the appendage comprising a flexible material having a resting pose and adapted to be deformed into a plurality of different poses, and at least one tendon attached to an end of the appendage and passing through the base or a portion of the appendage between the base and the distal end, such that actuation of the at least one tendon causes deformation of the appendage from the resting pose to a new pose. Systems and methods for fabricating and optimizing a manipulation device are also provided. | 2022-01-06 |
20220004671 | Method and Arrangement for Creating a Digital Building Model - The disclosure relates to a method and an arrangement for creating a digital building model for an existing building, wherein location points in the building are specified by referencing official anchor points outside the building for a reference floor of the building; wherein machine-readable markers are installed in the reference floor at the specified location points; wherein the markers in the reference floor are read in by way of a correspondingly configured mobile reading device (scanning device), wherein, on the basis of the location position of the read-in markers, the geometry of the reference floor is compensated for drift; wherein a digital volume model is created for the rooms in the reference floor in a suitable notation; and wherein the digital volume model of the reference floor is used as reference volume model during the creation of digital volume models for substantially identical floors of the building. | 2022-01-06 |
20220004672 | APPARATUS FOR DISPLAYING INFORMATION ABOUT AN ITEM OF EQUIPMENT IN A DIRECTION OF INTEREST - Methods and apparatus for determining information about an item of equipment in a direction of interest based upon coordinates derived from wireless communication between wireless transceivers. A smart device assembly is operative to communicate via multiple antennas with a reference point transceiver. A set of coordinates is generated indicating a relative position and/or angle of the wireless transceiver in relation to the reference position transceiver. A query may be made based upon the relative position and angle of the wireless transceiver in relation to the reference position transceiver. A response to the query may include a human readable interface indicating one or more of: direction of travel, a virtual image based upon location and location and direction, and annotative and pictorial information. | 2022-01-06 |
20220004673 | BUILDING PERFORMANCE ASSESSMENT SYSTEM AND METHOD - A virtual data acquisition component holds a physics-based, building energy model having a plurality of predicted building performance metrics produced through a simulation of expected building performance. A physical data acquisition component obtains a plurality of trended building performance metrics during the operation of a building. An integrated interface having an analytics platform receives the plurality of predicted building performance metrics from the virtual data acquisition component and the plurality of trended building performance metrics from the physical data acquisition component and produces an analytic data product. The analytic data product can be compared to the predicted building performance metrics or the trended building performance metrics. | 2022-01-06 |
20220004674 | PARALLELIZED VEHICLE IMPACT ANALYSIS - A computer-implemented method for vehicle impact analysis including obtaining a B-Rep representing an outer surface of a vehicle, the B-Rep having faces and obtaining a radius value for a contact sphere. The method also includes determining one or more two-point-contact curves of the B-Rep for the radius value. The determining includes, for each respective pair of portions of a plurality of pairs of portions of the B-Rep, applying a respective two-point-contact-curve computing algorithm. The computing algorithm is based on the respective pair of portions. The computing algorithm is parallelized over the plurality of pairs of portions. The method forms an improved solution for vehicle impact analysis. | 2022-01-06 |
20220004675 | VEHICLE IMPACT ANALYSIS WITH TWO-POINT-CONTACT CURVES - A computer-implemented method for vehicle impact analysis including obtaining a B-Rep representing an outer surface of a vehicle, the B-Rep having faces and obtaining a radius value for a contact sphere. The method also includes determining one or more two-point-contact curves of the B-Rep for the radius value. The determining includes, for each respective two-point-contact curve, solving a respective differential equation based on the B-Rep. The method forms an improved solution for vehicle impact analysis. | 2022-01-06 |
20220004676 | DESIGN ASSISTANCE DEVICE, DESIGN ASSISTANCE METHOD, AND DESIGN ASSISTANCE PROGRAM - The design assistance device includes: an acquisition unit configured to acquire system information indicating a configuration of the DC bus of the DC power supply system; and an output unit configured to output information on stability of the DC power supply system based on the system information acquired by the acquisition unit and a current value required for each operation of the one or more servo devices. With this configuration, it is possible to analyze the stability of a DC power supply system in which power is supplied from a DC power supply to one or more servo devices including an inverter circuit and an electric motor by a DC bus, in consideration of the configuration of the DC bus. | 2022-01-06 |
20220004677 | MECHANICAL PRODUCT PERSONALIZED DESIGN PATTERN MATCHING METHOD ORIENTED TO INTERNET + ENVIRONMENT - Provided is a mechanical product personalized design pattern matching method oriented to an Internet+ environment. According to the method, a user order is quantified into a feature vector, a mechanical product is decomposed into modules, a historical case library is constructed, and a design pattern scheme matched according to the user order is obtained according to the probability that a user is satisfied when different design patterns are adopted by respective modules of the mechanical product. From the perspective of probability, a personalized design pattern matching method of each design module in product customization design is researched according to the Bayesian theorem. | 2022-01-06 |
20220004678 | GENERATIVE DESIGN SHAPE OPTIMIZATION WITH DAMAGE PREVENTION OVER LOADING CYCLES FOR COMPUTER AIDED DESIGN AND MANUFACTURING - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using generative design processes. A method includes obtaining a design space for a modeled object, one or more design criteria, one or more in-use load cases, and one or more specifications of material, wherein the design criteria comprise a required number of loading cycles for the modeled object; iteratively modifying a generatively designed three dimensional shape of the modeled object, comprising: performing numerical simulation of the modeled object, finding a maximized stress or strain element for each of the one or more in-use load cases, determining an expected number of loading cycles for each of the one or more in-use load cases, redefining a fatigue safety factor inequality constraint for the modeled object, computing shape change velocities in accordance with at least the fatigue safety factor inequality constraint, and updating the level-set representation. | 2022-01-06 |
20220004679 | GENERATIVE DESIGN SHAPE OPTIMIZATION USING BUILD MATERIAL STRENGTH MODEL FOR COMPUTER AIDED DESIGN AND MANUFACTURING - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using generative design processes. A method includes performing numerical simulation of a modeled object in accordance with a current version of the three dimensional shape and the one or more in-use load cases; finding a maximized stress or strain element, for each in-use load cases; determining an expected number of loading cycles for each of the one or more in-use load cases for the physical structure using the maximized stress or strain element and data relating fatigue strength to loading cycles; redefining a fatigue safety factor inequality constraint for the modeled object; computing shape change velocities for an implicit surface in a level-set representation of the three dimensional shape in accordance with at least the fatigue safety factor inequality constraint; and updating the level-set representation using the shape change velocities. | 2022-01-06 |
20220004680 | METHOD FOR LATENCY DETECTION ON A HARDWARE SIMULATION ACCELERATOR - A method for performing automated detection of transaction latency for a processor design model running an application in a hardware simulation accelerator. The method includes loading the processor design model into the hardware simulation accelerator, loading the application into the processor design model running within the hardware simulation accelerator, simulating the processor design model running the application within the hardware simulation accelerator, and for each individual transaction of the application: establishing a first checkpoint at a start of an execution of the individual transaction by creating a breakpoint and resetting a counter, establishing a second checkpoint at a completion of the transaction by creating another breakpoint and obtaining latency information for the second checkpoint. The latencies of the individual transaction from the start to the completion are measured based on the latency information. | 2022-01-06 |
20220004681 | MULTIDIMENSIONAL PERFORMANCE OPTIMIZATION DESIGN DEVICE, METHOD AND RECORDING MEDIUM - A multidimensional performance optimization design device that includes: complement respective discrete observation values acquired by simulation for each of a plurality of performance dimensions, and output continuous prediction values and prediction errors in each of the plurality of performance dimensions; based on the prediction values and the prediction errors, compute, for each of the plurality of performance dimensions, a plurality of calculation points for searching a region where each of the plurality of performance dimensions is feasible; at the plurality of computed calculation points, compute, for each of the plurality of performance dimensions, a probability distribution for which each of the plurality of performance dimensions is feasible; and output, as a multidimensional performance feasible region, a general product from multiplying together the respective probability distributions computed for each of the plurality of performance dimensions. | 2022-01-06 |
20220004682 | GENERATIVE DESIGN SHAPE OPTIMIZATION WITH CONTROLLED CONVERGENCE FOR COMPUTER AIDED DESIGN AND MANUFACTURING - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using generative design processes. A method includes obtaining one or more design criteria for a modeled object including at least one design constraint; calculating a series of target values for the at least one design constraint, from an initial target value to a final target value; iteratively modifying a generatively designed three dimensional shape of the modeled object in the design space, wherein the iteratively modifying comprises performing numerical simulation of the modeled object, computing shape change velocities for an implicit surface in a level-set representation of the three dimensional shape in accordance with respective ones of target values in the series of target values, starting from the initial target value and ending with the final target value, and updating the level-set representation using the shape change velocities. | 2022-01-06 |
20220004683 | SYSTEM AND METHOD FOR CREATING DOMAIN SPECIFIC LANGUAGES FOR DIGITAL ENVIRONMENT SIMULATIONS - A system and methods for the creation of domain-specific languages that are both domain-agnostic and language-agnostic for use in a multi-language abstract digital simulation model generation and execution, comprising an onboarding module that creates domain specific models from declarative languages, domain-specific language engine, that uses the declarative domain-specific models to create a domain specific language, a meta-model structuring and creation system, meta-model mapping table, remote server, simulation execution process, computer domain-specific language, and methods for user-creation and editing of meta-models, simulation models, and parametrization of simulation environments, actors, objects, and events in real-time using heuristic searching. | 2022-01-06 |
20220004684 | SYSTEMS AND METHODS FOR AUGMENTED REALITY FOR DISASTER SIMULATION - An augmented reality (AR) system for generating and displaying a pre-disaster Enhanced Situation Visualization (ESV) is provided. The AR system may include an ESV computing device, a user computing device operated by a user and a reference database. The user computing device may transmit a reference request message to the ESV device, the reference request message including an image and/or GPS location of a property. The ESV computing device may determine the subject of the image is the property, retrieve reference information including peril maps associated with the property from the reference database, and determine situation information specific to the subject. The reference and situation information including a loss estimate may be displayed on the user computing device to provide an ESV of the property. The ESV may be used for insurance-related activities, such as handling, adjusting, and/or generating an insurance policy, premium, and/or discount, and/or generating insurance-related recommendations. | 2022-01-06 |
20220004685 | SYSTEMS AND METHODS FOR CREATING INFRASTRUCTURE MODELS - Systems and methods are provided herein for creating and building a model of a unique infrastructure, such as a parking structure. The model may be created through the identification of various triggers by a vehicle traversing the infrastructure. The triggers may include, for example, sensors or other devices capable of sensing the vehicle within the infrastructure. The triggers may also be information received from the vehicle itself. Based on the triggers, it may be inferred that various places exist throughout the infrastructure. For example, it may be inferred through two subsequent triggers that a place exists between the two triggers. The place may be added to the model of the infrastructure in between the two triggers. The model may continue to grow in this manner. | 2022-01-06 |
20220004686 | METHOD FOR DETERMINING DESIGN PARAMETERS OF A ROTOR BLADE - The invention relates to a method for determining design parameters ( | 2022-01-06 |
20220004687 | SYSTEM AND METHODS FOR PREDICTING OVERHEATING FOR ADDITIVE MANUFACTURING USING SIMULATION - A system and method for predicting locations of overheating of one or more objects for build of the one or more objects by additive manufacturing using simulation. | 2022-01-06 |
20220004688 | Systems And Methods For Circuit Design Dependent Programmable Maximum Junction Temperatures - Systems and methods are provided for generating a circuit design for an integrated circuit using a circuit design tool. The circuit design tool determines maximum junction temperatures for circuit blocks in the circuit design for the integrated circuit. The circuit design tool determines defects values for the circuit blocks using the maximum junction temperatures for the circuit blocks. The circuit design tool determines a defects value for the circuit design based on the defects values for the circuit blocks. The circuit design tool determines a maximum junction temperature for the circuit design based on a comparison between the defects value for the circuit design and a target defects value for the circuit design. The circuit design tool can dynamically reconfigure configurable logic circuit blocks to improve the power, the performance, and the thermal profile to achieve an optimal junction temperature per circuit block. | 2022-01-06 |
20220004689 | UNIFIED MATERIAL-TO-SYSTEMS SIMULATION, DESIGN, AND VERIFICATION FOR SEMICONDUCTOR DESIGN AND MANUFACTURING - A complete, unified material-to-systems simulation, design, and verification method for semiconductor design and manufacturing may include evaluating effects of semiconductor material or process changes on software algorithms. The method may include generating primitive circuit structures using the material or process changes; performing an electrical characterization of the primitive circuit structures; providing an output of the electrical characterization to a script to generate compact models; generating a digital system based on the compact models; and evaluating a performance of a software algorithm on the digital system to determine an effect of the material or process change for the semiconductor manufacturing process. | 2022-01-06 |
20220004690 | Verification of Hardware Design for Data Transformation Pipeline - Methods and systems for verifying, via formal verification, a hardware design for a data transformation pipeline comprising one or more data transformation elements that perform a data transformation on one or more inputs, wherein the formal verification is performed under conditions that simplify the data transformations calculations that the formal verification tool has to perform. In one embodiment the hardware design for the data transformation pipeline is verified by replacing one or more of the data transformation elements in the hardware design with a function element which is treated as an unevaluated function of its combinational inputs by a formal verification tool such that during formal verification the function element will produce the same output for the same inputs, and formally verifying that for each transaction of a set of transactions an instantiation of the modified hardware design for the data transformation pipeline produces a set of one or more outputs that matches a reference set of one or more outputs for that transaction. | 2022-01-06 |
20220004691 | SEMICONDUCTOR CIRCUIT DESIGN AND UNIT PIN PLACEMENT - A semiconductor circuit design method, system and computer program product for placing a unit pin on a boundary of a unit of a semiconductor circuit to be designed may be provided. Pin position data is received, wherein the pin position data comprises a chip pin position of a chip pin within the chip area and outside of the unit of a semiconductor circuit, to which the unit pin is to be electrically connected. The coordinates of a center point of the unit are determined, as well as a line crossing the center point and the chip pin position. The unit pin is placed on an intersection of the boundary of the unit and the line crossing the center point. | 2022-01-06 |
20220004692 | INTEGRATED ROUTING ASSEMBLY AND SYSTEM USING SAME - A routing assembly for an electronic device has a plurality of connectors ports and each of the connector ports contains a first connector connected to one or more cables. Cables are directly terminated, at first ends thereof, to terminals of the first connectors and the cables can be embedded in a routing substrate. The routing substrate has an opening which accommodates a chip package. Second ends of the cables are terminated to second connectors arranged in the package opening and the second connectors are in turn connected to the chip package. | 2022-01-06 |
20220004693 | INCREMENTAL ROUTING BASED PIN ASSIGNMENT - The present disclosure relates to a chip design layout process. More specifically, the present disclosure is directed to an incremental routing-based pin assignment technique. One example method generally includes: performing routing and pin assignment for a chip design layout, one or more objects of the chip design layout being associated with a routing engine and a pin assignment engine stored in memory; detecting a change associated with the one or more objects of the chip design layout; updating, via one or more processors, at least one of the routing engine or the pin assignment engine stored in the memory in response to the detected change and based on the association between the one or more objects and the routing engine or pin assignment engine; and performing another routing and pin assignment based on the updated at least one of the routing engine or the pin assignment engine. | 2022-01-06 |
20220004694 | Methods, Systems, and Apparatus for Email to Persistent Messaging - A chat-based persistent messaging platform that can seamlessly convert messages from different modalities (e.g., email clients and text message clients) into persistent messages and vice versa is described herein. The platform can include a parsing processor to convert messages into standard format data. A message classifier can process the standard format data into different subcomponents. These subcomponents can be translated into persistent messaging content via one or more content processing engines. The persistent messaging content can be converted into a persistent message via the parsing processor. The message classifier can also add messages into a persistent thread so that message history between two or more users can be maintained in perpetuity. | 2022-01-06 |
20220004695 | Methods, Systems, and Apparatus for Email to Persistent Messaging - A chat-based persistent messaging platform that can seamlessly convert messages from different modalities (e.g., email clients and text message clients) into persistent messages and vice versa is described herein. The platform can include a parsing processor to convert messages into standard format data. A message classifier can process the standard format data into different subcomponents. These subcomponents can be translated into persistent messaging content via one or more content processing engines. The persistent messaging content can be converted into a persistent message via the parsing processor. The message classifier can also add messages into a persistent thread so that message history between two or more users can be maintained in perpetuity. | 2022-01-06 |
20220004696 | MESSAGE INPUT AND DISPLAY METHOD AND APPARATUS, ELECTRONIC DEVICE AND READABLE STORAGE MEDIUM - Disclosed are a message input and display method, apparatus, electronic device, and readable storage medium. The message input method may comprise: displaying a session interface corresponding to a communication session; in a normal input mode, displaying a communication message in a first sub-area of a content display area of the session interface, and displaying a message input interface in a second sub-area; and in a full-screen input mode, displaying the message input interface in the content display area. | 2022-01-06 |
20220004697 | MOBILE DEVICE AND METHOD - A computer device comprises a display and a processor. The processor is configured to: intercept information sent from an application, to be displayed on the display; identify an information entity in the intercepted information, comprised in a predefined set of information entity types; reformat appearance of the identified information entity to be displayed on the display; forward the intercepted information including the reformatted appearance of the identified information entity to be displayed on the display. The display is configured to: present the identified information entity with the reformatted appearance to the user of the computer device. Also a corresponding method is disclosed. | 2022-01-06 |
20220004698 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus is configured to execute an application containing a first component for displaying a web page and a second component different from the first component. The information processing apparatus selects, in a case where a plurality of external fonts that is externally acquired is determined to be used in a web page displayed in the first component, a font for used in the second component from the plurality of external fonts based on a usage pattern of each of the plurality of external fonts in the web page. | 2022-01-06 |
20220004699 | INTEGRATION OF CONTENT IN NON-BROWSER APPLICATIONS - In a general aspect, a computer-implemented method can include executing, on a computing device, a non-browser application; displaying, by the non-browser application on a display of the computing device, a link to web content; and receiving an indication that the link has been selected. In response to the indication that the link has been selected, the method can include, allocating a tab of a browser application to the non-browser application; displaying the allocated browser tab within a user interface of the non-browser application; and displaying, by the allocated browser tab, the web content within the user interface. | 2022-01-06 |
20220004700 | SYSTEM AND METHOD FOR PRODUCING TRANSFERABLE, MODULAR WEB PAGES - A system and method of producing a web page by at least one processor may include: receiving at least one web page component (WPC), associated with one or more WPC attributes; producing at least one first scheme, comprising a representation of the at least one WPC, in a unified scheme format; interpreting the at least one scheme to produce at least one second scheme, comprising a representation of one or more instantiations of WPCs in an interpreted format; and producing a web page comprising one or more instantiations of WPCs of the at least one second scheme. | 2022-01-06 |
20220004701 | ELECTRONIC DEVICE AND METHOD FOR CONVERTING SENTENCE BASED ON A NEWLY COINED WORD - Provided is an electronic device including a communication module, a memory, and at least one processor operatively connected to the communication module and the memory, and the memory stores instructions configured to, when executed, enable the at least one processor to: receive a first sentence via the communication module; identify a first newly coined word included in the first sentence; obtain a second sentence by identifying a first alternative word corresponding to the first newly coined word, and replacing the first newly coined word in the first sentence with the first alternative word; obtain a third sentence by correcting a grammatical error in the second sentence based on the first alternative word occurring the grammatical error when replacing the first newly coined word; and transmit the third sentence to an external device via the communication module. Other embodiments can be made. | 2022-01-06 |
20220004702 | ROBUST EXPANDABLE DIALOGUE SYSTEM - An automated natural dialogue system provides a combination of structure and flexibility to allow for ease of annotation of dialogues as well as learning and expanding the capabilities of the dialogue system based on natural language interactions. | 2022-01-06 |
20220004703 | ANNOTATING A COLLECTION OF MEDIA CONTENT ITEMS - Various embodiments provide for systems, methods, and computer-readable storage media for annotating a collection of media items, such as digital images. According to some embodiments, an annotation system automatically determines one or more annotations for a plurality of media content items, and generates a collection of media content items that associates the determined annotations with the plurality of media content items. Depending on the embodiment, annotations that may be determined for the plurality of media content (and associated with the collection for the media content items) can include, without limitation, a caption, a geographic location, a category, a novelty measurement, an event, and a highlight media content item representing the collection. | 2022-01-06 |
20220004704 | METHODS FOR DOCUMENTING MODELS, AND RELATED SYSTEMS AND APPARATUS - Methods for automatically generating documentation for a computer-implemented model are provided. In some embodiments, automatically generating documentation for a computer-implemented model includes receiving user input indicative of selection of the computer-implemented model, receiving user input indicative of selection of a documentation template including synthetic content placeholders, and automatically generating documentation for the computer-implemented model by automatically generating synthetic content for each of the synthetic content placeholders based on one or more characteristics of the computer-implemented model, and automatically populating the synthetic content placeholders with the synthetic content. | 2022-01-06 |
20220004705 | PERSONALIZATION OF CONTENT SUGGESTIONS FOR DOCUMENT CREATION - The present disclosure relates to processing operations that generate and present personalized content suggestions to assist a user with document creation. Machine learning modeling may be trained and implemented to evolve pre-canned suggestions for document creation into highly personalized content suggestions, thereby improving the document creation process and user interface experience for users of applications/services that are utilized to create digital documents. As an example, signal data may be detected and analyzed, identifying a specific user's intent to create a digital document. Machine learning modeling may be implemented to evaluate different aspects of collected signal data and identify content from previously created documents, associated with a user account, that may be most relevant to the real-time document creation experience of the user. Personalized contextual suggestions may be presented to a user through a user interface. Examples described herein may be extensible across any type of application/service configured for document creation. | 2022-01-06 |
20220004706 | MEDICAL DATA VERIFICATION METHOD AND ELECTRONIC DEVICE - The present disclosure provides a medical data verification method, apparatus and an electronic device, related to a field of artificial intelligence technologies, such as AI (artificial intelligence) medical treatment, deep learning, knowledge graphs, natural language processing. A specific implementation is: obtaining medical data to be verified and a candidate document; obtaining feature vectors respectively corresponding to the medical data to be verified and the candidate document by processing the medical data to be verified and the candidate document by using a nature language processing model; obtaining N correlation vectors by calculating correlation between the medical data to be verified and the candidate document based on the feature vectors by using N methods, N being a positive integer greater than 1; and determining a confidence degree of the medical data to be verified to the candidate document by performing fusion calculation on the N correlation vectors. | 2022-01-06 |
20220004707 | Targeted Natural Language Responses For Electronic Communications - A device receives an electronic communication from another device, such as an email. The communication is addressed to multiple recipients and the device determines an association of content in the communication to a user of the device. This association of content to a user can be determined in various manners, such as by identifying one of multiple portions of the communication that is directed to the user rather than other recipients of the communication, determining whether the user is a primary recipient or a secondary recipient of the communication, and so forth. The device generates a set of natural language responses to the communication for the user based at least in part on this association. The device displays the set of natural language responses and receives user selection of one of the natural language responses, then sends the selected natural language response to at least the other device. | 2022-01-06 |
20220004708 | METHODS AND APPARATUS TO IMPROVE DISAMBIGUATION AND INTERPRETATION IN AUTOMATED TEXT ANALYSIS USING STRUCTURED LANGUAGE SPACE AND TRANSDUCERS APPLIED ON AUTOMATONS - Methods and apparatus for automated processing of natural language text is described. Received text can be preprocessed to produce language-space data that includes descriptive data elements for words. Source code that includes linguistic constraints, and that may be written in a programming language that is user-friendly to linguists, can be compiled to produce finite-state transducers and bi-machine transducers that are used by a language-processing virtual machine to process the language-space data. The language-processing virtual machine selects and executes code segments in accordance with path transitions of the transducers when applied on automatons to disambiguate meanings of words in the received text. | 2022-01-06 |