05th week of 2021 patent applcation highlights part 49 |
Patent application number | Title | Published |
20210034675 | SPACE ACCOUNTING FOR DATA STORAGE USAGE - An aspect of space accounting includes providing a counter for each of a plurality of key/value pairs for storage system operations. The key uniquely identifies a logical storage unit on which operations associated with the key are performed, the value identifies an amount of data usage with respect to the operations performed on the logical storage unit, and the counter tracks a type of the operations. An aspect also includes tracking, via corresponding counters, updates to a read/write (RW) tablet associated with a Cuckoo tree. The tracking includes updating a filter to include instances of key/value pairs and the RW tablet in which the pairs are stored. An aspect further includes tracking a plurality of read-only (RO) tablets associated with the Cuckoo tree. The tracking includes updating the filter to include instances of key/value pairs and one or more of the RO tablets in which the pairs are stored. | 2021-02-04 |
20210034676 | SEMANTIC RELATIONSHIP SEARCH AGAINST CORPUS - Methods, systems, and computer program products for semantic search are provided. Aspects include receiving a query, the query comprising one or more search concepts, determining a semantic type from a plurality of semantic types for each of the one or more search concepts, analyzing the one or more search concepts to determine one or more relationships associated with the one or more search concepts, and determining one or more search results from a corpus based at least in part on the one or more relationships and the one or more search concepts. | 2021-02-04 |
20210034677 | METHOD AND ELECTRONIC DEVICE FOR QUANTIFYING USER INTEREST - An electronic device includes a memory configured to store a plurality of types of user data, and a processor configured to be operatively connected to the memory, wherein the processor is configured to generate an embedding vector through text embedding using first text data which is included in the user data and is related to content of the user data for each type of the user data; calculate a weight for the embedding vector using information which is included in the user data and is related to usability of the user data for each type of the user data; when a query is input, generate a query vector through the text embedding using second text data included in the query; and quantify user interest in the query for each type of the user data based on the embedding vector, the weight for the embedding vector, and the query vector. | 2021-02-04 |
20210034678 | DIALOGUE SERVER - Provided is a dialogue server capable of simply reducing the amount of dialogue without manually constructing a database for reduction of dialogue in advance. | 2021-02-04 |
20210034679 | System for Physical-Virtual Environment Fusion - A semantic augmentation system includes a sensor with a computing system and a memory in communication with the computing system, the memory storing a plurality of endpoints. The computing system is configured to infer a first and a second semantic identity for an object, based on inputs from the sensor, project a coherent narrative and perform semantic augmentation towards a user. In further examples, the system infers a first narrative comprising two semantic identities and a second narrative wherein the system infers that a user observing view didn't infer the second semantic identity and further doesn't use the second semantic identity in the second narrative. It further, uses the corresponding narrative to remind the user to carry an item and/or credential in order to start an activity. | 2021-02-04 |
20210034680 | DIALOGUE SERVER - An object is to provide a dialogue server capable of removing an unnecessary keyword from a truth table. | 2021-02-04 |
20210034681 | METHOD AND SYSTEM FOR EMBEDDING HYPERLINKS IN LEGAL DOCUMENTS - A method for embedding hyperlinks in legal documents. The method can include receiving input including docx and PDF documents, converting the input into text, parsing the converted text by pattern recognition, and generating an output of a parent PDF document containing attached documents with hyperlinks, the hyperlinks identifying between the attached documents. | 2021-02-04 |
20210034682 | THEME RECOMMENDATION ENGINE - A computer-implemented method and system may include identifying, by a recommendation engine, at least a first image; determining a first vector representation of the first image using an image processing model, wherein the image processing model has been trained at least in part on images used in relation to e-commerce; identifying at least a second image related to a candidate e-commerce recommendation; determining a second vector representation of the second image using the image processing model; computing a first vector difference between the first vector representation and the second vector representation; and determining an e-commerce recommendation based on the computed first vector difference. | 2021-02-04 |
20210034683 | METHODS AND APPARATUS FOR AUTOMATICALLY PROVIDING PERSONALIZED SEARCH RESULTS - This application relates to apparatus and methods for generating preference profiles that may be used to rank search results. In some examples, a computing device obtains browsing session data and determines items that were engaged, such as items that were viewed or clicked. The computing device obtains item property data, such as product descriptions, for the items, and applies a dependency parser to the item property data to identify portions that include certain words, such as nouns or adjectives, which are then identified as attributes. The computing device generates attribute data identifying portions of the item property data as item attributes. In some examples, the computing device applies one or more machine learning algorithms to the session data and/or search query to identify item attributes. The computing device may generate a profile that includes the item attributes, and may rank search results based on the attribute data, among other uses. | 2021-02-04 |
20210034684 | PERSONALIZED RANKING USING DEEP ATTRIBUTE EXTRACTION AND ATTENTIVE USER INTEREST EMBEDDINGS - A system and method of generating user personalized search results is disclosed. A search query including one or more words is received and a set of relevance-based search results is generated in response to the search query. One or more query attributes are generated for the search query. Historic data for a user associated with the search query is received and a set of personalized search results is generated from the set of relevance-based search results based on the query attributes and the historic data for the user. The historic data includes one or more items associated with the user. | 2021-02-04 |
20210034685 | SYSTEM AND METHOD FOR RECOMMENDING USERS BASED ON SHARED DIGITAL EXPERIENCES - An apparatus includes an interface and a processor. The interface sends and receives data over a network. The processor uses the interface to transmit a first media file to a device of a user. The first media file presents a first choice between at least two options. The processor uses the interface to receive from the user a first selection in response to the first choice. In response to receiving the first selection, the processor transmits a second media file to the device. The second media file presents a second choice between at least two options. The processor uses the interface to receive from the user a second selection in response to the second choice. The processor identifies, based in part on the first selection and the second selection, a second user as potentially compatible with the user and transmits to the user a profile of the second user. | 2021-02-04 |
20210034686 | SYSTEMS AND METHODS FOR IMPROVING USER EXPERIENCE FOR AN ON-LINE PLATFORM - A method for improving user experience for an on-line platform may include obtaining a user input of a user of the on-line platform. The method may also include obtaining a plurality of candidate terms of interest (TOIs) that are selected by the user based on historical inputs relating to the user input. Each of the plurality of candidate TOIs may belong to a candidate category. The method may also include determining a target category for the user input based on the candidate categories and the plurality of candidate TOIs. The method may also include determining one or more target TOIs based on the target category and the plurality of candidate TOIs. The method may also include transmitting the one or more target TOIs to a terminal associated with the user. | 2021-02-04 |
20210034687 | WHOLE PAGE PERSONALIZATION WITH CYCLIC DEPENDENCIES - A system including one or more processors and one or more non-transitory computer-readable media storing computing instructions configured to run on the one or more processors and perform: modeling a webpage as a random field, wherein the random field comprises an undirected graph comprising nodes and edges; identifying a cyclic dependency in the undirected graph, wherein the cyclic dependency involves at least three of the nodes; breaking one or more of the edges of the undirected graph that connects the at least three of the nodes in the cyclic dependency; determining a probability of the webpage having exceeded a predetermined threshold based on compatibility functions of the edges, as updated; and sending instructions to display the webpage based at least in part on the probability of the webpage having exceeded the predetermined threshold. Other embodiments are described. | 2021-02-04 |
20210034688 | SYSTEMS AND METHODS FOR RECOMMENDING COLLABORATIVE CONTENT - The system generates a recommendation of content for use in collaboration, allowing relevant content to be used as base content. The system identifies a content item, and retrieves reviews for the content item from one or more sources or forums. The system filters the reviews to generate a reduced set of reviews based on text of the respective reviews, profile information associated with the reviews, and reference information. A recommendation metric is determined for the content item based on the reduced set of reviews and based on the one or more recommendation criteria. The recommendation criteria specify which aspects of the content impact recommendation, and how those aspects impact recommendation. The recommendation metric indicates whether the content item is recommended as base content, to be used for generating collaborative content. The system generates a recommendation indicator indicative of the recommendation metric, and outputs the indicator for display, storage, or both. | 2021-02-04 |
20210034689 | METHOD AND APPARATUS FOR DETECTING REGIONAL EVENT BASED ON SEARCH ENGINE, AND STORAGE MEDIUM - The present disclosure provides a method, and an apparatus for detecting a regional event based on a search engine, a search engine, a computer device, and a storage medium. The method includes: obtaining key search data related to the regional event based on search data of the search engine; performing regional event detection based on the key search data related to the regional event; and when the regional event is detected, estimating a location of the detected regional event based on geographical distribution of the key search data related to the regional event. | 2021-02-04 |
20210034690 | PRESENTING A CUSTOMIZED LANDING PAGE AS A PREVIEW AT A SEARCH ENGINE - Methods, systems, and computer storage media are provided for presenting a preview of a customized landing page at a search engine are provided. The search engine may provide search results that comprise a preview of the customized landing page, where a user may interact with the customized landing page while at the search engine. The user may select a landing-page link provided by the customized landing page using the preview at the search engine. Based on selecting the landing-page link, the user is navigated directly from the search engine to a webpage associated with the landing-page link. A customized landing page may be generated for display at the preview of the search engine, where the customized landing page includes a user-specific element, such as information specific to the user, which may be based on a user identifier communicated from the search engine to a customizable landing-page website. | 2021-02-04 |
20210034691 | Detecting Selection of Disabled Inner Links Within Nested Content - Detecting selection of disabled inner links within nested content techniques are described herein. In one or more implementations, a document comprising nested content is displayed on a display of a computing device. The nested content is obtained from a third-party source and includes one or more disabled inner links to respective target portions within the nested content. A disabled link service monitors an address associated with the third-party source of the nested content to detect an address change corresponding to a user selection of one of the disabled inner links within the nested content. Responsive to detecting the address change, a respective target portion of the nested content associated with the selected inner link is located by scanning the nested content. The document is then scrolled to cause display of the target portion of the nested content on the display of the computing device. | 2021-02-04 |
20210034692 | PRIORITY-BASED RENDERING - Aspects of the present invention disclose a method, computer program product, and system for content rendering. The method includes one or more processors retrieving at least one user interface (UI) component from a Document Object Model (DOM) tree. The method further includes one or more processors determining a corresponding rendering priority level (RPL) for each of the at least one UI component. The method further includes, in response to determining that the corresponding RPL of a first UI component of the at least one UI component is above a first threshold, one or more processors rendering the first UI component. | 2021-02-04 |
20210034693 | SYSTEMS AND METHODS FOR GENERATING FLOATING BUTTON INTERFACES ON A WEB BROWSER - Disclosed herein are a system and method for generating a floating button widget on a host web site. A popup widget may be generated and appear next to the floating button widget on the host website. The floating button widget is implemented via a code snippet integrated into a source code of the host web site. When the integrated code snippet is executed, an external call to an application programming interface (API) via the Internet is made and subsequently generates the floating button widget and/or popup widget on an interface (i.e., a web page) of the host web site. | 2021-02-04 |
20210034694 | CLIENT APPLICATION FOR WEB APPLICATION EXECUTION - Techniques are disclosed relating to providing a web application capable of executing within a particular web browser or a client application native to a client platform. The particular web browser and the client platform support differing sets of features. A server computer system hosts the web application for distributing to instances of the client application. The server computer system receives, from a particular instance of the client application that is executing on a client device that implements the client platform, a request for the web application. The server computer system sends the web application to the particular instance to cause the web application to be executed within the particular instance. Such execution of the web application permits the web application to use at least one feature not supported by the particular web browser. | 2021-02-04 |
20210034695 | FEATURE TRANSFORMATION APPARATUS AND METHOD, AND RECORDING MEDIUM - A feature transformation apparatus includes at least a combination storage part that stores a combination with respect to a set of features, wherein data is approximately represented as a sum of the combination of the features; and a transformation part that transforms at least the combination so as not to change the sum of the combination of the set of features. | 2021-02-04 |
20210034696 | BEZIER VOLUME REPRESENTATION OF POINT CLOUD ATTRIBUTES - The systems and methods discussed herein implement a volumetric approach to point cloud representation, compression, decompression, communication, or any suitable combination thereof. The volumetric approach can be used for both geometry and attribute compression and decompression, and both geometry and attributes can be represented by volumetric functions. To create a compressed representation of the geometry or attributes of a point cloud, a suitable set of volumetric functions are transformed, quantized, and entropy-coded. When decoded, the volumetric functions are sufficient to reconstruct the corresponding geometry or attributes of the point cloud. | 2021-02-04 |
20210034697 | MATRIX PROCESSING APPARATUS - Methods, systems, and apparatus, including a system for transforming sparse elements to a dense matrix. The system is configured to receive a request for an output matrix based on sparse elements including sparse elements associated with a first dense matrix and sparse elements associated with a second dense matrix; obtain the sparse elements associated with the first dense matrix fetched by a first group of sparse element access units; obtain the sparse elements associated with the second dense matrix fetched by a second group of sparse element access units; and transform the sparse elements associated with the first dense matrix and the sparse elements associated with the second dense matrix to generate the output dense matrix that includes the sparse elements associated with the first dense matrix and the sparse elements associated with the second dense matrix. | 2021-02-04 |
20210034698 | ANNOTATION TASK INSTRUCTION GENERATION - One embodiment provides a method, including: receiving, from a client, (i) a task of annotating information, (ii) a set of instructions for performing the task, and (iii) client annotations for a subset of the information within the task; assigning the subset to a plurality of annotators; obtaining (i) annotator annotations for the subset and (ii) a response time for providing the annotator annotation for each piece of information within the subset; identifying improvements to the set of instructions by (i) comparing the annotator annotations to the client annotations and (ii) identifying discrepancies made by the annotators in view of the response time; and generating a new set of instructions, wherein the generating comprises (i) identifying at least one feature of the information that distinguishes correctly annotated information from incorrectly annotated information and (ii) generating an instruction from the at least one feature. | 2021-02-04 |
20210034699 | LOW-RESOURCE SENTENCE COMPRESSION SYSTEM - Embodiments of the present invention provide systems, methods, and computer storage media for sentence compression in which a provided sentence is compressed to fit within an allotted space. Portions of the input sentence are copied to generate the compressed sentence. Upon receipt of a sentence, top candidate compressed sentences may be determined based on probabilities of segments of the input sentence to be included in a potential compressed sentence. The top candidate compressed sentences are re-ranked based on grammatical accuracy scores for each of the candidate compressed sentences using a language model trained using linguistic features of words and/or phrases. The highest scoring candidate compressed sentence may be presented to the user. | 2021-02-04 |
20210034700 | REGION PROPOSAL NETWORKS FOR AUTOMATED BOUNDING BOX DETECTION AND TEXT SEGMENTATION - A processor may generate a plurality of intermediate feature layers of an image using convolutional neural network (CNN) processing. For each intermediate feature layer, the processor may generate a plurality of text proposals using a region proposal network (RPN). Each text proposal may comprise a portion of the intermediate feature layer that is predicted to contain text. The processor may perform OCR processing on image data within a plurality of regions of the image to generate a text result for each region. Each region may comprise at least one of the text proposals. The processor may assemble the text results into a text string comprising the text results ordered according to a spatial order in which the plurality of regions appear within the image. | 2021-02-04 |
20210034701 | COREFERENCE-AWARE REPRESENTATION LEARNING FOR NEURAL NAMED ENTITY RECOGNITION - Previous neural network models that perform named entity recognition (NER) typically treat the input sentences as a linear sequence of words but ignore rich structural information, such as the coreference relations among non-adjacent words, phrases, or entities. Presented herein are novel approaches to learn coreference-aware word representations for the NER task. In one or more embodiments, a “CNN-BiLSTM-CRF” neural architecture is modified to include a coreference layer component on top of the BiLSTM layer to incorporate coreferential relations. Also, in one or more embodiments, a coreference regularization is added during training to ensure that the coreferential entities share similar representations and consistent predictions within the same coreference cluster. A model embodiment achieved new state-of-the-art performance when tested. | 2021-02-04 |
20210034702 | NAMED ENTITY RECOGNITION - Embodiments include methods, systems and computer program products for performing named entity recognition. Aspects include obtaining a text having a plurality of words and comparing each of the plurality of words to a dictionary. Aspects also include creating, based on the comparison, an annotation for at least one of the plurality of words that the least one of the plurality of words refers to a named entity. Aspects further include parsing the text to identify a part of speech for each of the plurality of words and removing the annotations from each of the at least one of the plurality of words that has a part of speech that is not one or a noun and a noun supporting adjective. | 2021-02-04 |
20210034703 | EXTRACTING ACTIONABLE ITEMS FROM DOCUMENTS AND ASSIGNING THE ACTIONABLE ITEMS TO RESPONSIBLE PARTIES - A method and system of automatically interpreting documents relating to regulatory directives to automatically identify actionable items and assigning each of the actionable items identified to the appropriate responsible party in a business. | 2021-02-04 |
20210034704 | Identifying Ambiguity in Semantic Resources - Embodiments relate to a system, program product, and method for dictionary membership management directed at identifying ambiguity in semantic resources. A dictionary of seed terms is applied to a text corpus and matching items in the corpus are identified. The linguistic properties for each matching item are characterized and a context pattern of each matching item is constructed. Each context pattern is applied to the dictionary and matching content between the seed terms and the context pattern is identified and quantified. Lexicon items from the dictionary that have anomalous behavior reflected in the quantification are identified. One or more seed words identified as having anomalous behavior are selectively removed from the dictionary. | 2021-02-04 |
20210034705 | CONVERTING TONE OF DIGITAL CONTENT - Techniques are disclosed for generating an output sentence from an input sentence by replacing an input tone of the input sentence with a target tone. For example, an input sentence is parsed to separate semantic meaning of the input sentence from the tone of the input sentence. The input tone is indicative of one or more characteristics of the input sentence, such as politeness, formality, humor, anger, etc. in the input sentence, and thus, a measure of the input tone is a measure of such characteristics of the input sentence. An output sentence is generated based on the semantic meaning of the input sentence and a target tone, such that the output sentence and the input sentence have similar semantic meaning, and the output sentence has the target tone that is different from the input tone of the input sentence. In an example, a neural network for parsing the input sentence and/or generating the output sentence is trained using non-parallel corpora of training data that includes a plurality of input sentences and corresponding plurality of assigned tones. | 2021-02-04 |
20210034706 | MACHINE LEARNING BASED QUANTIFICATION OF PERFORMANCE IMPACT OF DATA VERACITY - In some examples, machine learning based quantification of performance impact of data irregularities may include generating an irregularity feature vector for each text analytics application of a plurality of text analytics applications. Normalized data associated with a corresponding text analytics application may be generated for each text analytics application and based on minimization of irregularities present in un-normalized data associated with the corresponding text analytics application. An un-normalized data machine learning model may be generated for each text analytics application and based on the un-normalized data associated with the corresponding text analytics application. A normalized data machine learning model may be generated for each text analytics application and based on the normalized data associated with the corresponding text analytics application. A difference in performances may be determined with respect to the un-normalized data machine learning model and the normalized data machine learning model. | 2021-02-04 |
20210034707 | NEURAL NETWORK SYSTEM FOR TEXT CLASSIFICATION - A computer-implemented method is provided to perform text classification with a neural network system. The method includes providing a computing device to receive input datasets including user input question text and feed the datasets to the neural network system. The neural network system includes one or more neural networks configured to extract and concatenate character-based features, word-based features from the question datasets and clickstream embeddings of clickstream data to form a representation vector indicative of the question text and user behavior. A representation vector is fed into fully connected layers of a feed-forward network. The feed-forward network is configured to predict a first class and a second class associated with respective user input questions based on the representation vector. | 2021-02-04 |
20210034708 | USING NEURAL NETWORK AND SCORE WEIGHING TO INCORPORATE CONTEXTUAL DATA IN SENTIMENT ANALYSIS - An artificial neural network (ANN) determines a conversation snippet sentiment score based on content of the conversation snippet and contextual attributes associated with the conversation snippet. Contextual attributes may include, for example, a role within an organizational hierarchy of a user participating in the conversation snippet. Information representing the content is input into a hidden layer sequence of the ANN; information representing the contextual attributes is input into another hidden layer sequence of the ANN. Additionally or alternatively, a weighing engine determines a topical sentiment score by aggregating weighted conversation snippet sentiment scores. Weights to be applied to the conversation snippet sentiment scores may be determined based on, for example, a proportion of conversation snippets associated with the same topic that are conducted on a particular conversation channel as compared with other conversation channels, and respective roles of users participating in the conversation snippets conducted on the particular conversation channel. | 2021-02-04 |
20210034709 | OPTIMIZING INCREMENTAL BACKUPS - Systems and method for performing backup. A layered file system is provided that is configured to detect all transactions with a physical file system. Based on an analysis of the transactions, records are selectively entered into a change log. A backup agent is able to generate a backup based on the change log, which reflects data that has changed or that needs to be backed up relative to the previous backup. | 2021-02-04 |
20210034710 | METHOD FOR GENERATING DESIGNS BASED ON AUTOMATICALLY BUILT DESIGN SPACE GRAMMARS - The techniques disclosed herein help designers find interesting designs for small electrical, mechanical, and/or hydraulic mechanisms by exhaustively enumerating the design space given a library of components and a maximum number of components allowed per design. Some embodiments work by creating a design space grammar of designs, solving the equations associated with parts of the grammar, and putting the solutions into equivalence classes. This dramatically reduces the number of designs that have to be evaluated to see if they satisfy the design criteria. The result is often a small number of base designs that show the range of possible solutions to the design problem. | 2021-02-04 |
20210034711 | METHOD AND SYSTEM WITH MESH DATA CONVERSION FOR STAMPING DIES - Systems and methods are provided for developing and producing a die using mesh data. A mesh data file representing a surface of the die is created. The mesh data file is configured in an original format that is one of a point-facet format or a node-element format. The mesh data file is translated into a translated format that is another of the point-facet format or the node-element format. Prior to building, the die, as represented by the mesh data file, is evaluated virtually. | 2021-02-04 |
20210034712 | DIAGNOSTICS FRAMEWORK FOR LARGE SCALE HIERARCHICAL TIME-SERIES FORECASTING MODELS - Certain aspects of the present disclosure provide techniques for providing a diagnostics framework for large scale hierarchical time series forecasting models. In one embodiment, a method includes providing a plurality of hierarchical time-series, each of the plurality of hierarchical time-series comprising node data; concurrently providing node data from the plurality of hierarchical time-series to a forecasting model; using the forecasting model, concurrently calculating a plurality of forecasting data corresponding to each one of the node data of the plurality of hierarchical time-series; concurrently calculating a plurality of performance metrics of the forecasting model using the plurality of forecasting data; and generate an updated forecasting model by modifying the forecasting model based upon the plurality of performance metrics; concurrently calculating a plurality of updated forecasting data corresponding to each one of the node data using the updated forecasting model; and provide the updated forecasting data to a user. | 2021-02-04 |
20210034713 | Systems and Methods Of Determining A Numerical Material Model That Optimally Emulates Physical Material Test Results - A reference curve representing measured stress-strain data obtained in a material test of a specimen is received. FEA model is created to represent the specimen which is associated with numerical material properties defined by a formula having a set of adjustable coefficients. Multiple computed curves are obtained each defined with multiple nodes of computed stress-strain values by conducting a time-marching simulation of the material test using the FEA model with a set of unique coefficients. Respective curve difference measurement parameters are calculated between each computed curve and the reference curve using a similarity measure technique that includes trimming off excess end portion of each computed curve so as to match the reference curve. Optimal values of the adjustable coefficients are determined by estimating a minimum of the curve difference measurement parameters according to an optimization technique. | 2021-02-04 |
20210034714 | SYSTEMS AND METHODS FOR FEDERATED SEARCHES OF ASSETS IN DISPARATE DAM REPOSITORIES - A central asset registry and associated satellite registries tie Digital Asset Management (DAM) repositories and satellite repositories into a unified enterprise system. The system removes rights and asset relationship tracking from the DAMs and the satellites by gathering asset metadata tags and capturing digital asset rights and relationships between assets to improve speed, scalability, and flexibility in analyzing and traversing networks of rights and relationships of digital assets. The central asset registry and the satellite registries use a pluggable architecture and track and store multi-dimensional relationships as an asset hierarchy. The asset hierarchy and rights model depicts rights and relationship data between the assets and provides a flexible array of asset types and properties for addition of new assets, new asset types, and new rights without re-factoring the other data, nodes, and edges. The system uses asset metadata to create edge relationships between the assets. The combination of the satellite registries and the central asset registry facilitates queries and retrieval of the media assets. | 2021-02-04 |
20210034715 | RIGHTS MANAGEMENT OF CLOUD RESOURCES - A system and method include association of a first plurality of software licenses of a first type with a first subscription associated with a first plurality of cloud-based resources, determination of a first number of the first plurality of software licenses to activate based on the types of the first plurality of resources, activation of the first number of the first plurality of software licenses, monitoring of usage of the first plurality of resources, determination, based on the monitored usage, of a second one or more resources to associate with the first subscription, determination, in response to determining the second resources, of a second number of the first plurality of software licenses to activate based on the types of the second one or more resources, activation of the second number of the first plurality of software licenses, and association of the second resources with the first subscription. | 2021-02-04 |
20210034716 | RESOURCE MANAGEMENT SERVER, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM - A resource management server including a controller, a communicator that communicates with a license management server which manages a license, and a storage. The storage stores resource information. The controller acquires information about a resource to be activated, acquires license information from the license management server via the communicator, and, when a plurality of sets of license information is acquired as the license information, allocates a license to the resource to be activated based on the plurality of sets of license information. | 2021-02-04 |
20210034717 | MEDIA TRANSACTIONS CONSENT MANAGEMENT - A system for providing permissioned images in media transactions is described. The system processes images in an image set for a media transaction to identify the image owner and other persons depicted in the image and determines use permissions for the images. Various images in the image set are processed to remove or anonymize various persons in order to meet use conditions. The processed images are compiled and provided to an entity requesting the image set. | 2021-02-04 |
20210034718 | MECHANISM FOR PROVIDING OBFUSCATED CODE TO WEB APPLICATION CLIENTS - A method by one or more network devices for providing obfuscated code to web application clients. The method includes determining a configuration utilized by a web application client based on a header of a web application layer request generated by the web application client, selecting, for providing to the web application client with a web application layer response corresponding to the web application layer request, an obfuscated code from a plurality of obfuscated codes for the configuration utilized by the web application client, where the plurality of obfuscated codes for the configuration utilized by the web application client provide the same intended functionality but are obfuscated differently from each other, and providing the selected obfuscated code to the web application client with the web application response. | 2021-02-04 |
20210034719 | SYSTEMS AND METHODS FOR OBFUSCATING WEB CONTENT - Systems and methods are disclosed herein for obfuscating sources of internet-based content for rendering a webpage. For example, a method for obfuscating sources of internet-based content for rendering a webpage is disclosed. The method includes retrieving, by an obfuscation server, internet-based data from at least one server hosting a webpage based on a request received from a web browser at an end user device, where the internet-based data comprises at least one source identifier indicative of a server hosting content for rendering the webpage. The method also includes obfuscating, by the obfuscation server, the at least one source identifier to generate obfuscated internet-based data and transmitting at least the obfuscated internet-based data to the web browser by the obfuscation server. The web browser renders the webpage based, in part, on the obfuscated internet-based data. | 2021-02-04 |
20210034720 | AUTOMATED DOCUMENT MANAGEMENT SYSTEM - The present disclosure relates to automated systems and methods for document management. In particular, the disclosure relates to automated document management systems and methods for data management that allow for cost-effective application of anti-counterfeit features and page by page identification within a document. | 2021-02-04 |
20210034721 | MACHINE LEARNING MODEL AND METHOD FOR DETERMINING IF THE MACHINE LEARNING MODEL HAS BEEN COPIED - A method and data processing system are provided for determining if a machine learning model has been copied. The machine learning model has a plurality of nodes, the plurality of nodes is organized as a plurality of interconnected layers, and the plurality of interconnected layers includes an input layer and an output layer. The output layer has a predetermined number of output nodes for classifying input samples into a predetermined number of categories, where each output node corresponds to a category. An additional watermarking node is added to the output layer. The model is trained to classify the input data into the predetermined number of categories and into an additional category for the additional node. The additional node may be added to another model to determine if the another model is a copy or clone of the ML model. | 2021-02-04 |
20210034722 | MANAGEMENT OF SECURABLE COMPUTING RESOURCES - A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked and a controller. The controller is receptive of an instruction to authorize users to unlock the securable resource and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication. | 2021-02-04 |
20210034723 | SECURING DISPLAYED DATA ON COMPUTING DEVICES - Techniques for securing displayed data on computing devices are disclosed. One example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. In response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. In response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked. | 2021-02-04 |
20210034724 | Masking Biometric Markers by Sensor Path Control - In accordance with some embodiments, an apparatus that controls sensor paths for privacy protection is provided. The apparatus includes a housing arranged to hold a second device. The apparatus obtains first sensor data that includes a biometric marker associated with a user. The apparatus controls sensor paths by obtaining the first sensor data using sensors on the second device, on the apparatus, and/or on a supplemental functional device. The apparatus further generates second sensor data by masking the biometric marker associated with the user in the first sensor data. The apparatus additionally controls the sensor paths by providing the second sensor data from the first apparatus to the second device. | 2021-02-04 |
20210034725 | WEARER IDENTIFICATION BASED ON PERSONALIZED ACOUSTIC TRANSFER FUNCTIONS - A wearable device includes an audio system. In one embodiment, the audio system includes a sensor array that includes a plurality of acoustic sensors. When a user wears the wearable device, the audio system determines an acoustic transfer function for the user based upon detected sounds within a local area surrounding the sensor array. Because the acoustic transfer function is based upon the size, shape, and density of the user's body (e.g., the user's head), different acoustic transfer functions will be determined for different users. The determined acoustic transfer functions are compared with stored acoustic transfer functions of known users in order to authenticate the user of the wearable device. | 2021-02-04 |
20210034726 | Device With Biometric-Gated Display - Biometric module configured to perform processing as part of a device configured to perform contactless or contact communication with a terminal, the module comprising: a biometric sensor; a display screen; and a control unit configured to: cause the biometric sensor to capture biometric data of a user which can be used to biometrically authenticate the user; obtain biometric authentication information indicating whether the user was biometrically authenticated based on the captured biometric data; and in response to the biometric authentication information indicating the user was biometrically authenticated, cause the display screen to display authenticated information. | 2021-02-04 |
20210034727 | User Monitoring and Access Control Based on Physiological Measurements - Aspects of the disclosure relate to physiological sensor-based monitoring and control systems. A computing device may determine a physiological measurement. Then, the computing device may compare the physiological measurement with one or more baseline values to determine whether the physiological measurement is anomalous with respect to the one or more baseline values. When the physiological measurement is determined to be anomalous with respect to the one or more baseline values, the computing device may execute access control on a device to prevent access by a user to one or more systems, applications, resources, or the like. | 2021-02-04 |
20210034728 | BIOMETRIC TEMPLATE TRANSLATION - A system translates a first biometric template of a first type to enable comparison with a second biometric template of a second type. In one example, a canonical template structure to which the first and second biometric templates adhere may be identified and used to compare corresponding portions of the first and second biometric templates. In another example, types and associated formats of the first and second biometric templates may be identified to enable both to be translated to a general format that can then be compared. In still other examples, an identification system may use the first biometric template to determine an identity associated with first biometric data to either retrieve second stored biometric data associated with the identity of a same type as the second biometric template or verify that an account in an external system having a record storing the second biometric template is associated with the identity. | 2021-02-04 |
20210034729 | PRIVACY PRESERVING FACE-BASED AUTHENTICATION - Example systems and methods for biometric authentication that can bridge fuzzy extractors with deep learning and achieve the goals of preserving privacy and providing recoverability from zero are disclosed. Embeddings comprising a face or speaker embedding in a non-Hamming distance space can be processed to create a personal reliable bit map and a reliable locality-sensitive hash (LSH) for mapping the non-Hamming distance space to a Hamming distance space. A fuzzy extractor can be applied to create metadata that can be stored on a computing device. A secret can be recovered from the metadata and can be used for identification. | 2021-02-04 |
20210034730 | DETECTION OF REPLAY ATTACK - In order to detect a replay attack in a speaker recognition system, at least one feature is identified in a detected magnetic field. It is then determined whether the at least one identified feature of the detected magnetic field is indicative of playback of speech through a loudspeaker. If so, it is determined that a replay attack may have taken place. | 2021-02-04 |
20210034731 | APPARATUS FOR DEVICE CHARGING - Apparatus for installation in a passenger transport vehicle for controlling a power charging outlet for a mobile electronic device ( | 2021-02-04 |
20210034732 | System, Methods, and Devices Responsive to Audio Signatures - In accordance with some embodiments, an apparatus for privacy protection is provided. In some embodiments, the apparatus includes a first device including a receiver configured to receive audio signals, a memory configured to store one or more criteria, and a processor configured to process the received audio signals based on the stored criteria in the memory. The apparatus further includes a second device in communication with the first device, wherein the first device, upon detecting one or more audio sound patterns, is configured to send a notification to the second device. | 2021-02-04 |
20210034733 | Runtime Device Firmware Verification Using Trust Chaining - Systems and methods are disclosed herein that may implement an information handling system including a gateway and a peripheral device monitor. The gateway may interface peripheral devices and control access of host resources of the information handling system by any of the peripheral devices. The peripheral device monitor may detect connection of an unverified peripheral device to the gateway, perform a trust verification process with the unverified peripheral device, control the gateway to enable access of the host resources by the unverified peripheral device when the unverified peripheral device becomes verified, and control the gateway to prevent access to the host resources by the unverified peripheral device when the unverified peripheral device fails the trust verification process. The trust verification process may include validating a device certificate and verifying a digest of boot code of the peripheral device. The peripheral device monitor may perform a verification failure procedure when the unverified peripheral device fails the trust verification process. | 2021-02-04 |
20210034734 | Transactional, Constraint-Based System And Method for Effective Authorization - A new transactional, constraint-based system is provided to define and maintain authorization policies. Constraints are expressed as user-defined, domain-specific programs that operate on authoritative representations of entities and administrative hierarchies. | 2021-02-04 |
20210034735 | ENFORCEMENT OF PASSWORD UNIQUENESS - Embodiments provide a computer implemented method of enforcing password uniqueness for different user accounts of a particular user. The method includes: receiving a first new password from a first user account of the particular user, wherein the first user account is associated with a first system/object referenced by a first Password Relationship Object (PRO); evaluating a uniqueness policy to determine whether password uniqueness is required by one or more other PROs, wherein each system/object referenced by the one or more other PROs has a different user account of the particular user; if the password uniqueness is required by the one or more other PROs, evaluating a matching policy to determine whether the first new password matches any password of each different user account associated with one or more systems/objects referenced by the one or more other PROs; if there is a match, enforcing an enforcement policy. | 2021-02-04 |
20210034736 | SYSTEMS AND METHODS FOR MANAGING STATE - The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys. | 2021-02-04 |
20210034737 | DETECTION OF ADVERSERIAL ATTACKS ON GRAPHS AND GRAPH SUBSETS - Method and system for detecting potentially perturbed nodes in a graph that comprises potentially perturbed nodes and clean nodes, comprising: calculating, for each of a plurality of nodes of the graph, a discrepancy value in respect of the node, wherein the discrepancy value for each node indicates a statistical discrepancy for classification probabilities associated with the node and classification probabilities associated with neighbouring nodes; fitting a statistical distribution for the discrepancy values for the clean nodes; determining a detection threshold for potentially perturbed nodes based on the statistical distribution; and identifying nodes having a discrepancy value greater than the detection threshold as potentially perturbed nodes. | 2021-02-04 |
20210034738 | DATA CORRELATION USING FILE OBJECT CACHE - Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a tile system. | 2021-02-04 |
20210034739 | Attack-resistant quantum random number generator based on the interference of laser pulses with random phase - A system for random number generation includes a laser pulse driver; a laser diode emitting laser pulses; a fiber-optic unbalanced interferometer transforming laser radiation phase noise into amplitude modulation; an optical circulator/isolator that is used to prevent unwanted feedback into a laser cavity; a photodetector that detects the laser pulses from the interferometer; a digitizer that digitizes an output of the photodetector; a statistics control (SC) block that is used to calculate the probability density of the photodetector's output and to define a parameter Γ that is related to a classical-to-quantum noise ratio and allows estimating random operation and providing attack resistance of the system; and a processor that receives the digitized output from the digitizer and outputs a true random bit sequence. | 2021-02-04 |
20210034740 | THREAT ANALYSIS SYSTEM, THREAT ANALYSIS METHOD, AND THREAT ANALYSIS PROGRAM - A threat detection unit | 2021-02-04 |
20210034741 | PREVENTING UNAUTHORIZED SCREEN CAPTURE ACTIVITY - Aspects of the disclosure relate to preventing unauthorized screen capture activity. A computing platform may detect, via an infrared sensor associated with a computing device, an infrared signal from a second device attempting an unauthorized image capture of contents being displayed by a display device of the computing device. Subsequently, the computing platform may determine, via the computing platform, the contents being displayed by the display device. Then, the computing platform may retrieve a record of the contents being displayed by the display device. Then, the computing platform may determine a risk level associated with the infrared signal. Subsequently, the computing platform may perform, via the computing platform and based on the risk level, a remediation task to prevent the unauthorized image capture. | 2021-02-04 |
20210034742 | FACIAL RECOGNITION BASED SECURITY BY A MANAGEMENT CONTROLLER - In some examples, an apparatus includes a management controller for use in a computer system having a processing resource for executing an operating system (OS) of the computer system, the management controller being separate from the processing resource and to perform, based on operation of the management controller within a cryptographic boundary, management of components of the computer system, the management of components comprising power control of the computer system. The management controller is to receive sensor data, perform facial recognition based on the sensor data, and determine whether to initiate a security action responsive to the facial recognition. | 2021-02-04 |
20210034743 | Systems And Methods To Detect Key Loggers - Systems and methods are provided for detecting the presence of a key logger program that is executing on a processing device of an information handling system by inputting simulated keystrokes to an information handling system with known key stroke characteristic/s (e.g., quantity of keystrokes as a function of time, keystroke data size as a function of time, and/or keystroke values as a function of time), and monitoring to detect resulting system activity characteristics that match the known key stroke characteristic/s of the simulated key strokes. | 2021-02-04 |
20210034744 | VEHICLE-MOUNTED COMMUNICATION SYSTEM, DETERMINATION DEVICE, COMMUNICATION DEVICE, DETERMINATION METHOD, AND COMPUTER PROGRAM - A vehicle-mounted communication system in which a plurality of communication devices and a determination device for determining an abnormality regarding the communication devices are connected to each other via a bus, wherein the determination device includes: a transmitting unit that transmits a determination signal at a predetermined voltage to each of the communication devices; and a determination unit that determines the abnormality based on a response signal transmitted from each of the communication devices in response to the determination signal, each of the communication devices includes: a signal output unit that outputs a first logical value signal based on a unique voltage threshold, in response to a determination signal that is received; and a generating unit that generates a second logical value signal based on the first logical value signal, and the signal output unit outputs the response signal to the bus based on the second logical value signal. | 2021-02-04 |
20210034745 | SECURITY SYSTEM AND METHODS FOR IDENTIFICATION OF IN-VEHICLE ATTACK ORIGINATOR - The present invention provides a security system, and methods useful for vehicle CAN bus communication mapping and attack originator identification, comprising: a CAN Bus Monitor, (CBM), configured to monitor the CAN bus communication comprising one or more frames, to and/or from at least one Electronic Control Unit, (ECU); a characterization module in communication with the CBM, configured to generate at least one characteristic for the monitored communication from each the ECU and at least one characteristic for each communication frame; (c) a comparator unit in communication with the characterization module, configured to compare one or more the characteristics of at least one frame against characteristics of each the ECU communication in order to detect at least one anomaly; and, (d) one or more Identification module in communication with the comparator, configured to identify at least one ECU originating an attack on the CAN bus. | 2021-02-04 |
20210034746 | Detection of cyber machinery attacks - A method of cyber protection of a machine based on acquiring acoustic signals from a vicinity of the machine, while the machine is operative. The method includes analyzing the acquired acoustic signals to determine whether the machine or a controller of the machine is operating suspiciously and initiating a cyber measure on the controller of the machine, responsive to a determination based on the acquired acoustic signals that the machine or the controller is operating suspiciously. | 2021-02-04 |
20210034747 | MAINTAINING TRUST ON A DATA STORAGE NETWORK - Trust may be maintained between a storage system and a host system by the host system validating its identity to the storage system. The storage system may instruct the host system to validate itself by setting a validation flag on the storage system. The host system may be configured to determine whether the validation flag is set. If the host system determines that the validation flag is set, the host system then may read a test string from the storage system. The host system may encrypt the test string using a private key, and send the encrypted test string to the storage system. The storage system may decrypt the encrypted string using a public key it previously received from the host system. The decrypted test string then may be compared against the original test string generated by the storage system. | 2021-02-04 |
20210034748 | Systems And Methods For Leveraging Authentication For Cross Operating System Single Sign On (SSO) Capabilities - Systems and methods are provided that may be implemented during a pre-boot environment to authenticate a user in the basic input/output system (BIOS) of an information handling system, and to securely provision a resulting authentication token to post-boot operating system (OS) login components of the system. In addition, single sign-on user authentication may be performed during a pre-boot BIOS environment and then extended to the post-boot OS environment without requiring exchange of pins or other intermediary authentication factors between the OS and pre-boot authentication (PBA) for the user to gain access to the information handling system or other network resources. | 2021-02-04 |
20210034749 | INFORMATION PROCESSING APPARATUS - An authentication unit of an information processing apparatus authenticates an update control device that controls update of a control program by using a random number generated by a random number generation unit. In the random number generation unit, a first extraction unit extracts a bit value from a count value of a first clock signal, a calculation unit performs logical operation on the bit value extracted by the first extraction unit and a target bit value at a bit position included in an entropy as an update position that is designated, a replacement unit replaces the bit value at the update position with a result of the logical operation a position designation unit designates a new update position after the bit value is replaced, and an output unit generates the random number from the entropy. | 2021-02-04 |
20210034750 | METHOD FOR A SECURED START-UP OF A COMPUTER SYSTEM, AND CONFIGURATION COMPRISING A COMPUTER SYSTEM AND AN EXTERNAL STORAGE MEDIUM CONNECTED TO THE COMPUTER SYSTEM - A method of starting-up a computer system includes accessing a second storage area of a storage in which program data are stored; loading and executing the program data from a second storage area; mounting an external storage medium connected to the computer system, wherein a file system key that decrypts a file system data is stored on an external storage medium, wherein the file system key is encrypted on the external storage medium; loading the encrypted file system key from the external storage medium into the computer system; decrypting the encrypted file system key by a key stored in the second storage area; setting the decrypted file system key in a cryptographic module established by the start-up process; and decrypting and loading file system data of the encrypted file system by the cryptographic modules by the set file system key, whereby the computer system is started up completely. | 2021-02-04 |
20210034751 | MANAGEMENT OF TAINT INFORMATION ATTACHED TO STRINGS - Disclosed herein are system, method, and computer program product embodiments for propagating taint information for strings using metadata. Taint information for a string is encoded using taint ranges. When an operation is performed on the string, the operation and any additional taint information corresponding to the operation is encoded into a delta layer of the metadata. Rather than immediately obtaining taint information for a result string when the operation is performed on the string, the delta layer stores the taint information for the operation, and any subsequent operation, until it is needed. Once the taint information is needed, then the delta layers are collapsed into base layer taint information in order to resolve taint information for a result string. | 2021-02-04 |
20210034752 | METHOD AND SYSTEM FOR DYNAMIC TESTING WITH DIAGNOSTIC ASSESSMENT OF SOFTWARE SECURITY VULNERABILITY - A method and system for dynamic testing and diagnostic assessment of security vulnerability of cloud-based enterprise software applications. The method comprises directing, to a software program under execution, a series of attack vectors; diagnosing a set of results associated with the software execution as comprising one of a security vulnerability and not a security vulnerability, the set of results produced based at least in part on the attack vectors; and assessing a dynamic security vulnerability score for the software program based at least in part on the diagnosing. | 2021-02-04 |
20210034753 | METHOD AND SYSTEM FOR NEURAL NETWORK BASED DATA ANALYTICS IN SOFTWARE SECURITY VULNERABILITY TESTING - A method and system for implementing AI based neural networks for data analytics in dynamic testing of security vulnerability of cloud-based enterprise software applications. The method comprises directing, to a software program under execution, a series of attack vectors; diagnosing an at least a first set of results associated with the software program under execution as comprising one of a security vulnerability and not a security vulnerability, the at least a first set of results produced based at least in part on the attack vectors; and training a machine learning neural network classifier in accordance with a supervised classification that identifies false positive vulnerability defects of the at least a first set of results to produce a trained classifier, the neural network classifier including an input and an output layers connected via at least one intermediate layer that is configured in accordance with an initial matrix of weights. | 2021-02-04 |
20210034754 | SECURITY TESTING BASED ON USER REQUEST - Implementations of the present disclosure relate to security testing based on user request. According to the method, a first request for a target application is received from a first user. A first malicious request is generated by modifying the first request, wherein the first malicious is associated with a malicious action on the target application. The first malicious request is sent to an offline instance of the target application. A first security level of the target application against the malicious action is determined based on a first response generated by the offline instance in response to the first malicious request. In other implementations, a system and a computer program product for process tracking are disclosed. | 2021-02-04 |
20210034755 | AUTOMATIC PENETRATION TESTING ENABLEMENT OF REGRESSION BUCKETS - A computer-implemented method for generating penetration tests automatically includes parsing an existing system test case, and identifying a particular program call in the system test case. The particular program call can require a particular data access authorization. The method further includes, in response to the system test case including the particular program call, generating a penetration test using a predetermined attack vector. The method further includes executing the penetration test and detecting an unauthorized access being performed during the penetration test. Further, the method includes responsively, sending a notification that identifies the particular program call. | 2021-02-04 |
20210034756 | SYSTEMS AND METHODS OF IMPLEMENTING SECURITY CONTEXT AWARE RESPONSE TIME OPTIMIZATION - An information handling system may include a processor to execute code of a threat level detection module to receive and store in memory labeled data descriptive of operating environment variables related to the information handling system including operating environment variables selected from a basic input/output system (BIOS) setting, an information handling system hardware setting, and at least one of an operating system (OS) environment setting, a developer tool access setting, or a network setting; the processor to determine, via execution of a machine learning process of the threat level detection module, a threat level value; and a security module associated with a first application executed on the information handling system to: map the threat level value with the first application; and adjust the security level associated with the first application based on the provided threat level value to modify security checks operating with the first application. | 2021-02-04 |
20210034757 | BINARY VULNERABILITY DETERMINATION - A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters. | 2021-02-04 |
20210034758 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing device according to the present invention includes: a storage unit that stores a first unique value calculated for each portion of a program in advance; and an inspection unit that inspects whether or not there is a tampering in the portion by newly calculating a second unique value for the portion and comparing the first unique value with the second unique value. | 2021-02-04 |
20210034759 | SYSTEMS AND METHODS FOR ATTRIBUTING SECURITY VULNERABILITIES TO A CONFIGURATION OF A CLIENT DEVICE - This disclosure relates to systems, devices, and methods for receiving security configuration information and malware state information for a plurality of client devices, the security configuration information comprising identification of at least one of security parameters, hardware configurations, or software configurations of each of the plurality of client devices, and the malware state information comprising identification of at least one or more types of malware on each of the plurality of devices. The security configuration information and malware state information may be analyzed to identify which client devices from the plurality of devices have a security configuration that places the identified client devices in a vulnerable security state. | 2021-02-04 |
20210034760 | CACHING FOR HIGH-PERFORMANCE WEB APPLICATIONS - A system can provide a web browser application that generates a request for a data object to a server. The system can include a syncer delegate that intercepts the request from the web browser application and determines whether the requested data object is available in a cache memory. If the data object is available in the cache memory, the requested data object is transferred from the memory to the web browser application and the request is forwarded to a server over a network. If the data object is not available in the cache memory, the request is forwarded to a server over a network. The server can transfer the data object over the network to the syncer delegate, which can provide the data object to the web browser application and update the cache with the newly-received data object. | 2021-02-04 |
20210034761 | CRYTOGRAPHY DATA MANAGEMENT - A database management tool performs updates or sequential operations to large databases. A configuration file specifies source, destination (if different than source), encryption status, order, throttling limits, and number of threads to maintain, among other settings. A queue table points the tool at the database to be converted and maintains current row ID and status. The queue table may also hold the location of a hardware security module (HSM) if one is used for encryption, decryption, or hashing. The database management tool may use the configuration file to retrieve a record, perform the specified action, such as sending the record to an HSM for decryption with an old key and encryption with a new key, and replacing the old record with the updated record. The queue table may be updated with a running record of where the last operation occurred to allow rollbacks if necessary. | 2021-02-04 |
20210034762 | SYSTEM AND METHOD FOR DATA REGISTRATION AND ACCESS - A data manager includes persistent storage and a data register. The persistent storage stores an identity chain and a data availability chain. The data register obtains data associated with an entity registered with the identity chain using a public key associated with the entity; obtains an object identifier associated with the data by storing the data in a data storage as a record; and records, on the data availability chain, both of: the record using a private key associated with the entity, and the object identifier. | 2021-02-04 |
20210034763 | Splitting Sensitive Data and Storing Split Sensitive Data in Different Application Environments - A method for data storage in a terminal and a terminal related to the field of communications technologies, where the method is applied to the terminal, where application environments of the terminal include a rich execution environment (REE), and further include either or both of a trusted execution environment (TEE) and a secure element (SE), security of the SE is higher than that of the TEE, the security of the TEE is higher than that of the REE, and the method includes splitting, by the terminal, sensitive data into two files, and storing the split two files in storage spaces of different application environments. | 2021-02-04 |
20210034764 | CRYPTOGRAPHIC SERVICES IN PRINT APPARATUS - In an example, print apparatus comprises a security services engine to perform cryptographic services. The security services engine may receive a request for a cryptographic service and validate that the request is an authorised request. On successful validation, the security services engine may perform the cryptographic service by acquiring a first key, acquire an associated first key identifier and may output the first key identifier. | 2021-02-04 |
20210034765 | Computational Operations in Enclave Computing Environments - Methods and systems for performing a computational operation on a server host are provided. Exemplary methods include: receiving an encrypted service request from a client host, the client host encrypting a service request to produce the encrypted service request using a shared secret, the service request specifying the computational operation; decrypting, in a secure enclave, the encrypted service request using the shared secret to produce a decrypted service request, the secure enclave preventing other software running on the server host from accessing the shared secret and other data stored in a memory space; performing the computational operation, in the secure enclave, using the decrypted service request to generate a service result; encrypting, in the secure enclave, the service result using the shared secret to create an encrypted service result; and providing the encrypted service result to the client host, the client host decrypting the encrypted service result. | 2021-02-04 |
20210034766 | METHOD AND SYSTEM FOR IDENTIFYING ACTOR OF A FRAUDULENT ACTION DURING LEGAL HOLD AND LITIGATION - A method includes obtaining data from a host, wherein the data is associated with an object and a user, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of deduplicated data chunks and the at least one parity chunk, generating an object entry based on the deduplicated data chunks and the at least one parity chunk, storing the storage metadata and the object entry in an accelerator pool, storing, across a plurality of fault domains, the plurality of deduplicated data chunks and the at least one parity chunk, and initiating storage metadata distribution on the storage metadata and the object entry across the plurality of fault domains. | 2021-02-04 |
20210034767 | SYSTEMS AND METHODS FOR CONDUCTING DATA EXTRACTION USING DEDICATED DATA EXTRACTION DEVICES - A computing device, such as a server, has a sealed housing and runs one or more data extraction agents. In some embodiments, the computing device includes one or more processors and memory located inside the sealed housing, the memory stores instructions that when executed by the one or more processors causes the one or more processors to: authenticate with a data recipient system using a prestored security engine and using a shared registration secret uniquely associating the computing device with the data recipient system; retrieve an extraction job specification from an extraction job specification repository associated with the data recipient system; and using the extraction job specification, communicate to one or more client computing devices associated with a client system to extract data records from one or more data stores of the client system. Related methods are also disclosed. | 2021-02-04 |
20210034768 | METHODS AND SYSTEMS FOR FACILITATING JOINT SUBMISSIONS - Methods, systems, and devices for facilitating joint submissions. In an example embodiment, a system may facilitate a joint submission from multiple devices. For example, a primary device may receive data for a joint submission with a peripheral device, and the data may be segmented into sensitive and non-sensitive data. | 2021-02-04 |
20210034769 | SYSTEM AND METHOD FOR SECURE DEVICE CONNECTION - A method is disclosed. The method includes generating, by a portable communication device, a first random code and transmitting the first random code to an access device. The access device receives the first random code, generates a second random code, receives a personal token from a user of the portable communication device, and hashes the first random code, the second random code, and the personal token to form a first hash output. The first hash output and the second random code are received from the access device. The first random code, a stored personal token, and the second random code are hashed to form a second hash output. A determination is made if the first hash output and the second hash output are equal. A secure communication channel is formed between the portable communication device and the access device when the first hash output and the second hash output are equal. | 2021-02-04 |
20210034770 | COMPUTING DEVICE COMPATIBLE ENCRYPTION AND DECRYPTION - A method and apparatus encrypting data for use by an application includes receiving a first clear data in a security application running concurrently with the application. The security application encrypts the first clear data to generate a first encrypted package and distributes the encrypted package for use by the application or by other applications running concurrently with the application. The security application also receives and decrypts encrypted packages from the application or one of the other applications to provide clear data for use by the application. The security application may be implemented as a data entry utility that can be accessed directly by the application. | 2021-02-04 |
20210034771 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, USER AUTHENTICATION METHOD AND NON-TRANSITORY RECORDING MEDIUM - An information processing system, an information processing apparatus, a user authentication method, and a non-transitory recording medium. The information processing system receives input of identification information and authentication information of a user, makes an authentication request to an authentication apparatus, and in response to a failure in authentication by the authentication apparatus, transmits to one or more terminals, the identification information and an inquiry asking whether each terminal of the one or more terminals stores identification information that matches the identification information input by the user. | 2021-02-04 |
20210034772 | APPLICATION SECURITY POLICY MANAGEMENT AGENT - A policy generation agent automatically generates a security policy for an application and a security manager. The agent runs the application in a development environment, causing the application to request permissions from the security manager. The agent passes the permissions request to the security manager. The security manger determines whether to approve or deny the request based on a permissions policy. Responsive to a determination to deny the request, the agent generates an updated permissions policy by updating the permissions policy to approve subsequent requests for the permissions. The agent also associates the updated permissions policy with the application, and suppresses any exceptions generated by the security manager in denying the request before approving the request for the permissions in the development environment. | 2021-02-04 |
20210034773 | System for Role Based Granular Access Control over Document Content and Media: Method and Apparatus - This invention allows granular protection of individual components of a single document, which allows users to access only the information they are authorized to view. The document is available for viewing under the same protection even when the document is accessed offline. The components of the document that are viewable by a specific recipient are based on the roles of that recipient. Thus, role based access control model is used as the security model. | 2021-02-04 |
20210034774 | SYSTEM AND METHOD FOR SHREDDING A FORUM OF SECRETS - A method, computer program product, and computer system for storing, by a computing device, a data encryption key in a keystore. A plurality of stable system values may be generated, wherein a threshold number of the plurality of stable system values is required to access the data encryption key from the keystore. The plurality of stable system values may be stored in different locations. More stable system values of the plurality of stable system values than the threshold number of the plurality of stable system values required to access the data encryption key from the keystore may be deleted. | 2021-02-04 |