06th week of 2022 patent applcation highlights part 46 |
Patent application number | Title | Published |
20220043816 | Alteration of Historical Data Representations Using Data Repository Performance Metrics - Techniques are disclosed relating to using machine learning techniques to predict storage configurations for historical data. In some embodiments, a computer system stores representations of historical data according to a current set of storage parameters. The representations may include snapshots of historical data in a data repository at different points in time. The computer system may receive queries for historical data specifying points in time from which to retrieve the historical data. In some embodiments, the computer system responds to the queries using the stored representations and determines performance metrics for the responses. In some embodiments, the computer system trains a machine learning model using the performance metrics. Based on output of the trained model, the computer system updates the current set of storage parameters. The updating may affect subsequent storage of representations in the data repository, which may advantageously improve query response times and decrease repository storage size. | 2022-02-10 |
20220043817 | MULTIPLEXING DATA OPERATION - Embodiments of the present invention relate to a method, system, and computer program product for multiplexing data operation. In some embodiments, a method is disclosed. A query for at least one table comprising a plurality of data records is received. The query indicating a plurality of data operations to be performed on the plurality of data records. The plurality of data operations are combined into a target data operation. An intermediate result of the query is generated by performing the target data operation on the plurality of data records. A final result of the query is determined based on the intermediate result. In other embodiments, a system and a computer program product are disclosed. | 2022-02-10 |
20220043818 | Separate Runtime Data From Metadata - Runtime data for generating visualizations based on a query is stored separate from metadata in memory, thereby allowing for other runtime data for different visualizations based on the same query to reference that metadata without duplicating the metadata in memory. First metadata of first query data received from a server is loaded into a metadata store in memory. First runtime data for a first visualization is loaded in memory separately. The first runtime data uses the first metadata without reloading the first metadata on the one or more primary memory devices. Second runtime data for a second visualization may also use the first metadata of the metadata store such that the first metadata is not reloaded into the memory. | 2022-02-10 |
20220043819 | ANTICIPATORY PRE-EXECUTION OF DATA QUERIES - Embodiments of the invention provide for anticipatory pre-execution of queries. In an embodiment of the invention, a method for anticipatory pre-execution of queries includes the computation of an execution cost of each of a multiplicity of different queries to a data source scheduled at a specified time on a specified date. The method also includes monitoring a querying processing schedule and detecting from the monitoring, unscheduled time on a particular date prior to the specified time on the specified date. Finally, the method includes responding to the detection by first selecting a most expensive one of the different queries in terms of execution cost, for instance an amount of computing resources consumed in executing a corresponding one of the different queries, and then executing the selected most expensive one of the different queries during the unscheduled time on the particular date prior to the specified time on the specified date. | 2022-02-10 |
20220043820 | NON-DISRUPTIVE DYNAMIC AD-HOC DATABASE CATALOG SERVICES - Approaches herein transparently delegate data access from a relational database management system (RDBMS) onto an offload engine (OE). The RDBMS receives a database statement referencing a user defined function (UDF). In an execution plan, the RDBMS replaces the UDF reference with an invocation of a relational operator in the OE. Execution invokes the relational operator in the OE to obtain a result based on data in the OE. Thus, the UDF is bound to the OE, and almost all of the RDBMS avoids specially handling the UDF. The UDF may be a table function that offloads a relational table for processing. User defined objects such as functions and types provide metadata about the table. Multiple tables can be offloaded and processed together, such that some or all offloaded tables are not materialized in the RDBMS. Offloaded tables may participate in standard relational algebra such as in a database statement. | 2022-02-10 |
20220043821 | METHOD FOR PERFORMING MULTI-CACHING ON DATA SOURCES OF SAME TYPE AND DIFFERENT TYPES BY USING CLUSTER-BASED PROCESSING SYSTEM AND DEVICE USING THE SAME - A method for performing multi-caching on data sources of a same type and different types by using a cluster-based processing system is provided. The method includes steps of: a big data cluster management device (a) determining whether a result set, corresponding to a query result, is present as first cache data in master or worker nodes, (b) if specific part of the result set is absent, (i) establishing an execution plan (ii) acquiring a first subset in the master or the worker nodes, (iii) acquiring a second subset in none of the master and the worker nodes, and (iv) applying joint operation thereto, and (c) applying data processing operation and output operation thereto thus acquiring the result set as the query result. | 2022-02-10 |
20220043822 | SHADOW EXPERIMENTS FOR SERVERLESS MULTI-TENANT CLOUD SERVICES - Aspects of the present invention disclose a method, computer program product, and system for query execution in a multi-tenant cloud service. The method includes one or more processors determining category classes for service queries. The method further includes sending for execution, a selected number of service queries from one of the determined category classes to a shadow query engine. Respective service queries of the categorically classified service queries comprise a different set of configuration parameter values for the shadow query engine. The method further includes recording metadata for the selected number of service queries of the one category class executed on said shadow query engine. The method further includes determining correlations between the recorded metadata. The method further includes determining, from the determined correlations, optimal configuration parameter values comprising optimal configuration parameters for executing the selected number of service queries of the one category classes. | 2022-02-10 |
20220043823 | VALUE-ALIGNED RECOMMENDATIONS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for ranking items for presentation to a user based on a model that estimates value to the user. One method includes providing value-based training data, the training data including user features, features of corresponding content items presented to users, and respective values of a value variable determined from user behaviors with respect to content items presented to the users; training a scoring model on the training data to generate value-based scores from user content item features; ranking a plurality of candidate content items selected for a first user by a ranking engine, wherein the ranking engine receives respective value-based scores generated by the trained scoring model for the candidate content items and the first user; and providing two or more of the candidate content items for presentation to the first user in an order determined by the ranking. | 2022-02-10 |
20220043824 | METHOD AND SYSTEM FOR PROVIDING SPORTS TEAM RANKING ON REAL-TIME ISSUE - A method for providing a sports team ranking, including receiving a plurality of sports search terms input from a plurality of user terminals, clustering the plurality of sports search terms into a plurality of events including a first event and a second event, calculating a score for the first event based on a number of searches of each of a first set of sports search terms included in the first event, and associating the first event with a first sports team. | 2022-02-10 |
20220043825 | Document Review Management System - An online review system determines scores for document authors and document reviewers. An author score is based on a number of comments added to a document by reviewers. One way to compute the author score is to use a ratio of a number of comments provided by reviewers of a document to a number of lines of document contents provided by the author. A reviewer score for a reviewer is based on an amount of comments subsequently made by other reviewers, and on the document content itself, such as a ratio of a number of comments provided in subsequent reviews of a document to a number of lines of original document contents. In some embodiments, the online review system monitors trends in scores of individuals or teams. | 2022-02-10 |
20220043826 | AUTOMATED ETL WORKFLOW GENERATION - The exemplary embodiments disclose a system and method, a computer program product, and a computer system. The exemplary embodiments may include receiving a data analysis request, using a knowledge graph for determining a source dataset based on the received data analysis request, wherein the knowledge graph represents an extract, transform and load (ETL) based ontology, wherein the knowledge graph comprises nodes representing entities and edges representing relationships between the entities, and wherein the entities are instances of concepts of the ETL based ontology, building an ETL workflow for processing the source dataset in accordance with a data lineage associated with the source dataset in the knowledge graph, and executing the ETL workflow. | 2022-02-10 |
20220043827 | SYSTEMS AND METHODS FOR CONFIGURING SYSTEM MEMORY FOR EXTRACTION OF LATENT INFORMATION FROM BIG DATA - A system for extracting latent information from data includes obtaining or generating components of the data, where the data components include scores indicating how the component relates to the data. Memory is allocated for the components and the components are stored in the allocated memory. The components are then transformed into documents using a suitable transformation function, and the documents are analyzed using natural language processing, to extract latent information contained in the data. | 2022-02-10 |
20220043828 | SYSTEMS AND METHODS FOR IMPORTING DATA FROM ELECTRONIC DATA FILES - Computer implemented systems and methods are disclosed for importing data from electronic data files. In accordance with some embodiments, a file format is assigned to a source electronic data files by a data importation system. The data importation system may further identify a file type identifier associated with the source electronic data file and map the source electronic data file to a transformation template. The data importation system may further store the file format, file type identifier, and an indication of the transformation template as a file type profile associated with the source electronic data file in a database. | 2022-02-10 |
20220043829 | METHODS FOR ENHANCING A LEGACY SINGLE TENANT APPLICATION SYSTEM TO A MULTI-TENANT APPLICATION SYSTEM WITH MINIMAL CHANGES - Systems and methods for accessing single-tenant databases comprising a multi-tenant aware cluster manager in communication with instances of single-tenant databases are described. The cluster manager can establish a uniform resource locator (URL) unique for each tenant to access the cluster manager. Each of the instances of single-tenant databases can include data for a corresponding tenant. The cluster manager can receive a request from a client to access a database corresponding to the first tenant. The request can include the URL established for the first tenant. The cluster manager can identify the first tenant based on the URL of the request. The cluster manager can obtain, responsive to identification of the first tenant, a tenant context of the first tenant from a storage. The cluster manager can access, using the first tenant context and responsive to the request, a first instance of the single-tenant databases corresponding to the first tenant. | 2022-02-10 |
20220043830 | VERSIONED HIERARCHICAL DATA STRUCTURES IN A DISTRIBUTED DATA STORE - A distributed data store may maintain versioned hierarchical data structures. Different versions of a hierarchical data structure may be maintained consistent with a transaction log for the hierarchical data structure. When access requests directed to the hierarchical data structure are received, a version of the hierarchical data structure may be identified for processing an access request. For access requests with snapshot isolation, the identified version alone may be sufficient to consistently process the access request. For access requests with higher isolation requirements, such as serializable isolation, transactions based on the access request may be submitted to the transaction log so that access requests resulting in committed transactions may be allowed, whereas access requests resulting in conflicting transactions may be denied. | 2022-02-10 |
20220043831 | Transactional Sharding of Blockchain Transactions - A complex cryptographic coinage transaction is transactionally sharded into multiple simple cryptographic coinage transactions. The complex cryptographic coinage transaction specifies cryptographic debits and/or deposits to/from multiple input accounts and/or multiple output accounts. The simple cryptographic coinage transactions, however, only specify a single one of the input accounts and/or a single one of the output accounts. A single server within a blockchain environment may thus process one of the simple cryptographic coinage transactions without requiring calls for data from other servers responsible for other accounts. | 2022-02-10 |
20220043832 | METHOD AND/OR SYSTEM FOR TREE TRANSFORMATION - Embodiments of methods, apparatuses, devices and/or systems for manipulating hierarchical sets of data are disclosed. | 2022-02-10 |
20220043833 | AD HOC DATA EXPLORATION TOOL - The disclosed application relates to a tool by which a user may create a cloud workspace that includes a data memory space, as well as a tool for automatically identifying ad-hoc analyses on that data. The solution allows a user to connect to data sources using SQL or GUI tools, combine data from different data sources, prepare and clean the data, mine the data for insights, and move that data into downstream reporting tools for visualization. The system is linked to a code repository to allow data scientists to execute code from the code repository in trial data spaces, investigate that data, and prepare more in-depth analytics for downstream reporting tools. | 2022-02-10 |
20220043834 | DATA STORAGE METHOD, DEVICE, SERVER AND STORAGE MEDIUM - Provided are a data storage method, a storage device, a server and a storage medium, the method includes: obtaining, by a server, image data of different dimensions (S | 2022-02-10 |
20220043835 | METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS - Methods and systems are described herein for improving data processing efficiency of classifying user files in a database. More particularly, methods and systems are described herein for improving data processing efficiency of classifying user files in a database in which the user files have a temporal element. The methods and system described herein accomplish these improvements by introducing time dependency into time-homogeneous probability models. Once time dependency has been introduced into the time-homogeneous probability models, these models may be used to improve the data processing efficiency of classifying the user files that feature a temporal element. | 2022-02-10 |
20220043836 | AUTOMATED EMAIL CLASSIFICATION IN AN INFORMATION MANAGEMENT SYSTEM - An improved information management system is described herein that can use artificial intelligence to classify data files (e.g., emails, documents, audio files, video files, etc.) and/or surface in a user interface the classification assigned to the data files. For example, a lightweight training or a heavyweight training can be employed to train classifiers to classify the data files. Use of artificial intelligence to classify data files may reduce the amount of computing resources that the information management system allocates to the data file review process because an auditor may be able to quickly identify those data files that meet the desired criteria using the classification and only request access to those data files. Thus, the information management system may be able to allocate more computing resources to normal or routine tasks, ensuring that such tasks are completed and/or completed in an appropriate amount of time. | 2022-02-10 |
20220043837 | UNIT GROUP GENERATION AND RELATIONSHIP ESTABLISHMENT - Described are systems and methods for establishing a unit group dictionary based on user provided annotations. The unit group dictionary may be used to identify relationships between multiple items in a corpus. Those relationships may facilitate the display of object identifiers and/or other aspects used and/or provided by the object management service. | 2022-02-10 |
20220043838 | AUTOMATED LEARNING OF ANOMALIES IN MEDIA STREAMS WITH EXTERNAL FEED LABELS - Methods, computer-readable media, and devices are disclosed for providing a notification of an anomaly in a media content that is associated with an event type. For example, a method may include a processing system including at least one processor for detecting a first anomaly from a first media content, generating a first anomaly signature for the first anomaly, obtaining a notification of a first event, the notification including an event type, time information, and location information of the first event, correlating the first anomaly to the notification of the first event, and labeling the first anomaly signature with the event type. The processing system may further detect a second anomaly from a second media content that matches the first anomaly signature and transmit a notification of a second event of the event type when it is detected that the second anomaly matches the first anomaly signature. | 2022-02-10 |
20220043839 | CORRELATING MULTIPLE SOURCES - A method and system of correlating annotations of media files. A first media file is received from a first media recording device. A file record for the first media file is created in the file table. A determination is made whether the first media file belongs to an existing matter group. Upon determining that the first media file belongs to an existing matter group: the file record is related with the existing matter group in the file table; annotations of the first media file that are flagged to be shared, are related to all media files of the existing matter group; and annotations of all the media files of the existing matter group to the first media file are related. Upon determining that the first media file does not belong to an existing matter group, a new matter group is created for the first media file in the matter table of the central server. | 2022-02-10 |
20220043840 | METHOD AND SYSTEM FOR SELF-AGGREGATION OF PERSONAL DATA AND CONTROL THEREOF - A method includes receiving, by a logic layer processor, over a communication network, from a plurality of electronic resources, initial user personal identifiable information (PII) of a user of a plurality of users. The user PII includes a plurality of data elements. The plurality of data elements of the initial PII of the user are classified to populate a profile map data structure having a standardized predefined data schema of a plurality of vector elements so as to form a user-specific profile map data structure of the user. Additional user personal identifiable information (PII) of the user is iteratively received from the plurality of electronic resources. The additional user PII of the user is iteratively classified to update the user-specific profile map data structure of the user. A plurality of user-specific data management software functions is enabled based on the user-specific profile map data structure. | 2022-02-10 |
20220043841 | SYSTEM AND METHOD FOR STORING AND RETRIEVING CHANNEL DATA - A method includes, for each of a plurality of channels at a well site, converting channel data from a source data format to a common data format in real-time as the channel data is generated. The common data format includes a plurality of elements organized into a plurality of sets. Each element includes a minimum collection of fields. The method further includes, for each of the plurality of channels, storing the converted channel data in a data store as part of the at least one element. | 2022-02-10 |
20220043842 | ENTITY ENGINE OF A COMPUTING PLATFORM - A computing device including a memory and a processor is provided. The memory stores processor executable instructions for an entity engine. The processor is coupled to the memory. The processor executes the entity engine to cause the computing device to model entities, which hold or classify data. The processor executes the entity engine to cause the computing device to store in the memory a list identifying each of the entities and the entities themselves in correspondence with the list. The processor executes the entity engine to cause the computing device to provide, in response to a selection input from an external system, access to the entities based on the list. The access includes providing the list to the external system, receiving the selection input identifying a first entity of the entities, and exporting the first entity from the memory to the external system. | 2022-02-10 |
20220043843 | DISTRIBUTED TRANSACTION MANAGEMENT WITH TOKENS - A system, method and computer product for managing distributed transactions of a database. A transaction manager is provided for each of a plurality of transactions of the database. Each transaction manager is configured to perform functions that include generating a transaction token that specifies data to be visible for a transaction on the database. The database contains both row and column storage engines, and the transaction token includes a transaction identifier (TID) for identifying committed transactions and uncommitted transactions. A last computed transaction is designated with a computed identifier (CID), record-level locking of records of the database is performed using the TID and CID to execute the transaction, and the plurality of transactions of the database are executed with each transaction manager. | 2022-02-10 |
20220043844 | ANONYMOUS REPORTING SYSTEM - An anonymous reporting system for use in reporting and following up on incidents, accidents, and the like. The system may be accessed via an Internet website. A reporting individual may select a type of incident to report. In one example, the reporting individual may select a level on anonymity and some, none or all of the individual's personal identification is displayed to the organization according to the selected level. | 2022-02-10 |
20220043845 | TEMPLATE-BASED AUTOMATIC SOFTWARE BUG QUESTION AND ANSWER METHOD - Disclosed is a template-based automatic question and answer method for software bug. An entity relationship triple is extracted from a bug corpus and a natural language pattern is acquired; an entity relationship in the triple is determined; a query template corresponding to the natural language pattern is acquired; an entity in a question q proposed by a user is replaced with an entity type to acquire a question q′; then, the entity type in q′ and an entity type in the natural language pattern are compared and searched for and a similarity is calculated; then, a SPARQL query pattern of the question q is acquired according to the similarity and the entity in the question q; and finally, the SPARQL query pattern of the question q is executed so as to acquire an answer to the question q. | 2022-02-10 |
20220043846 | Optimizing Database Query Execution by Extending the Relational Algebra to Include Non-Standard Join Operators - A method is executed at a computer system to retrieve data from a database. Upon receiving a database query, a database engine of the computer system parses the query to form an operator tree including a plurality of join operators. For one of the plurality of clauses, the database engine adds to the operator tree a respective node that specifies a mark join operator, a single join operator, an inner join operator, or an outer join operator. Specifically, the database engine adds the mark join operator when the clause includes one of a predetermined set of predicate subqueries, and adds the single join operator when the clause includes a scalar subquery. The database engine performs one or more optimization passes on the operator tree to form an optimized execution plan, and executes the optimized execution plan to retrieve a result set from the database. | 2022-02-10 |
20220043847 | SUPPORT APPARATUS, GENERATION APPARATUS, ANALYSIS APPARATUS, SUPPORT METHOD, GENERATION METHOD, ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A support apparatus includes a generation apparatus and an analysis apparatus. The generation apparatus executes (a-1) to (a-5) with I=1 to n, and generates pieces of process information. The generation apparatus extracts material words from a document i in (a-1), extracts a treatment word i from the document i in (a-2), extracts a synthesis condition i from the document i in (a-3), extracts a characteristic value i related to a target material from the document i in (a-4), and associates the material words, the treatment word i, the synthesis condition i, and the characteristic value i with each other to generate process information i in (a-5). The analysis apparatus includes a combiner that generates composite process information including a common part common to the pieces of process information and different parts different among the pieces of process information, and an outputter that outputs the composite process information. | 2022-02-10 |
20220043848 | GENERATING ENTITY RELATION SUGGESTIONS WITHIN A CORPUS - Aspects of the invention include a computer-implemented method for entity relation type detection. The method includes detecting a plurality of candidate co-occurring entities from one or more documents. A first set of co-occurring entities and a second set of co-occurring entities from the plurality of co-occurring entities is grouped based on a synonymity of a first set of entity types associated with the first set of co-occurring entities and a second set of entity types associated with the second set of co-occurring entities. A synonymity of a first set of intervening tokens associated with the first set of co-occurring entities and a second set of intervening tokens associated with the second set of co-occurring entities is detected. A relation entity type label is generated based on a conflation of two or tokens of the first set of intervening tokens | 2022-02-10 |
20220043849 | DOCUMENT PROCESSING PROGRAM AND INFORMATION PROCESSING APPARATUS - A document processing program and an information processing apparatus that present a contract status of an organization based on the contents of contract documents. The document processing program including instructions that causes the information processing apparatus to: accept a condition for analyzing a contract document by an acceptance unit; extract a contract document by an analysis target extraction unit, wherein the contract document containing extraction information matching the condition accepted by the acceptance unit from a contract document database which includes a plurality of contract documents and in which information indicating a contract status of the plurality of contract documents is extracted as extraction information; analyze the contract document extracted by the analysis target extraction unit based on the condition accepted by the acceptance unit, by an analysis unit; and display and output an analysis result of the analysis unit by the output unit. | 2022-02-10 |
20220043850 | PRACTICAL SUPERVISED CLASSIFICATION OF DATA SETS - The present invention relates to information retrieval. In order to facilitate a search and identification of documents, there is provided a computer-implemented method for training a classifier model for data classification in response to a search query. The computer-implemented method comprises:
| 2022-02-10 |
20220043851 | CLUSTER ANALYSIS METHOD, CLUSTER ANALYSIS SYSTEM, AND CLUSTER ANALYSIS PROGRAM | 2022-02-10 |
20220043852 | METHOD AND APPARATUS FOR RECALLING IMAGE FILE, CONTROL METHOD AND APPARATUS FOR RECALLING IMAGE FILE, AND MOBILE TERMINAL - Disclosed are a method and apparatus for recalling an image file, a control method and apparatus for recalling an image file, and a mobile terminal. The method for recalling an image file includes the following steps: receiving a notification message sent from a server for prompting that a target image file is recalled; determining whether the target image file is open according to the notification message; and if it is determined that the target image file is open, obtaining a replacement image file and displaying the replacement image file on the target image file layer. | 2022-02-10 |
20220043853 | System And Method For Directing Content To Users Of A Social Networking Engine - A system and method for providing a third generation social network. The system provides processes that allow physical objects to be represented as social objects in the social network. A user may then interact with the social objects. These interactions allow the system to collect the content of the interactions of a particular user. The content of the interactions may then be analyzed and used to direct specific content to specific users that may have an interest in the specific content as indicated by the content of the interactions of those users. Furthermore, the system provides a method for associating data with a shape in an image to allow a user and/or groups of users to interact with the image. | 2022-02-10 |
20220043854 | Sheet Music Search and Discovery System - A sheet music search and discovery system is disclosed that uses specific mathematical rules to analyze and characterize sheet music and provides functionality for users to identify sheet music based on those characterizations. The system stores sheet music data and metadata characterizing each composition, provides a graphical user interface that provides functionality for users to search the sheet music data for compositions, and generates search results based at least in part on the metadata characterizing each composition. In one embodiment, metadata describing structured sheet music data is generated using a global vector space that includes semantic representations of elements extracted from a large corpus. In another embodiment, metadata describing unstructured sheet music data is generated using machine learning-based pattern recognition. In another embodiment, the interface provides functionality for users to identify instruments and a range for each of the instruments and identify compositions with similar instruments and ranges. | 2022-02-10 |
20220043855 | METHODS, SYSTEMS, AND MEDIA FOR SEARCHING FOR VIDEO CONTENT - Methods, systems, and media for searching for video content are provided. In some embodiments, the method comprises: receiving one or more characters entered into a first query field by a user; determining a predicted search query based on the one or more received characters; determining a plurality of suggested search queries based on the one or more received characters; causing the predicted search query to be presented in the first query field and at least a portion of the plurality of suggested search query to be presented in a second query field, wherein the predicted search query is combined with the one or more received characters in the first query field; searching a database of videos based on the predicted search query; causing a plurality of video content items from the database of videos responsive to the predicted search query to be presented; and causing, without user interaction, a first video content item from the plurality of video content items to be played back. | 2022-02-10 |
20220043856 | METHOD AND APPARATUS FOR THUMBNAIL GENERATION FOR A VIDEO DEVICE - Systems and processes are provided to generate and transmit a thumbnail image for a video searching function including a video input configured to receive a video signal, a processor configured to decode the video signal to generate a video program, to generate a plurality of thumbnail images in response to the video program, to determine a subset of the plurality of thumbnail images in response to a client request and to couple the subset of the plurality of thumbnail images to a network interface, and the network interface configured to transmit and receive data on a local area network, the network interface being operative to receive the client request from a client device and to transmit the subset of the plurality of thumbnail images to the network interface for transmission to the client device. | 2022-02-10 |
20220043857 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR DATA ASSET RANKING - Systems, methods, and related techniques and apparatus containing instructions which when executed by one or more computing devices for determining dataset rankings by determining, from the lineage order requirement, one or more first lineage level datasets from the collection of datasets, generating one or more first lineage level asset ranks respectively for each one of the one or more first lineage level datasets, determining at least one second lineage level dataset having an outflow to the one or more first lineage level datasets, and generating a first dataset rank for the at least one second lineage level dataset as a first function of the outflow and at least one of the one or more first lineage level asset ranks. | 2022-02-10 |
20220043858 | SYSTEM AND METHOD FOR ASSOCIATION OF DATA ELEMENTS WITHIN A DOCUMENT - A system for association of data elements within a document is disclosed. An input data receiving subsystem receives an input data source of the document. A feature generation subsystem obtains one or more lists of personal data, generates one or more personal data features representing a relationship between one or more personal data elements. An affinity computation subsystem assesses each of the one or more personal data features, computes affinity score between the one or more personal data elements, generates one or more affinities. A personal data relationship identification subsystem assigns the one or more personal data elements to corresponding one or more identification stages, derives a set of identities corresponding to the one or more personal data elements. An identity filtration subsystem receives the one or more affinities and the set of identities, determines a validation of the set of identities, filters out the set of identities. | 2022-02-10 |
20220043859 | DISCRETE REPRESENTATION LEARNING - Methods, computer program products and/or systems are provided that perform the following operations: obtaining a collection of objects; constructing a weighted graph based on the collection of objections, wherein the weighted graph preserves neighborhood semantics of objects of the collection of objects; generating partitions of nodes in the weighted graph of a fixed maximum size utilizing combinatorial partitioning; generating a vector for each node based on the partitions of nodes in the weighted graph; determining vector representations for objects in this collection and eventually applying this vector representation of the objects to gain efficiency (e.g., in terms of computation time and memory requirements) for use in downstream tasks such as recommendation. | 2022-02-10 |
20220043860 | ABNORMAL DATA DETECTION - A method, system, and computer program product for abnormal data detection. According to the method, a plurality of data points collected at different time points are classified into a plurality of groups. A plurality of groups of potential abnormal data points are determined from the plurality of groups. Correlations between a first group of the plurality of groups of potential abnormal data points with other groups of potential abnormal data points are determined. In response to the first group of the plurality of groups of potential abnormal data points being uncorrelated to a majority of the other groups of potential abnormal data points based on the correlations, data points in the first group are identified as abnormal data points. | 2022-02-10 |
20220043861 | GRAPH SEARCH OPTIMIZATION SYSTEM BASED ON SORTED PROPERTY TECHNIQUES - Various systems are provided for optimizing the searching of a graph for a portion that matches a pattern is provided. A Graph Search Optimization System (“GSOS”) provides various techniques for reducing the computational expense when searching for patterns within a graph. The GSOS provides techniques that include an edge-count directed (“ECD”) system, a derived constraint (“DC”) system, and a sorted property (“SP”) system. The ECD system matches a pattern in a direction based on the number of edges for that direction. The DC system derives a single-element constraint from a multi-element constraints to avoid having to check multiple elements. The SP system processes edges of a graph in a sorted order based on the value of a property of the edges. | 2022-02-10 |
20220043862 | METHOD FOR DATA ITEM RECOMMENDATION, ELECTRONIC DEVICE AND STORAGE MEDIUM - Embodiments of the present disclosure relate to a method, an electronic device, and a computer storage medium for data item recommendation, and relate to the field of information processing. According to this method, a request for a data item is received from a terminal device, the request includes an identifier for identifying the data item and an application type; the application type indicates a type of use of the data item; a recommendation criterion type matching the request is determined based on the application type, the recommendation criterion type indicates a type of a criterion based on which the data item is recommended, a plurality of data items associated with the identifier are determined the plurality of data items are located in a plurality of storage devices and based on the recommendation criterion type, a recommended data item is determined from the plurality of data items as a response. | 2022-02-10 |
20220043863 | PROPAGATING FILTERS TO MULTIPLE DASHBOARD USER INTERFACES IN AN INFORMATION MANAGEMENT ENVIRONMENT - Presented herein are systems, methods, and computer implemented products for persisting queries or filters originating from reports within one dashboard and propagating such queries or filters to reports in other dashboards within an information management user interface environment. Typical information management dashboard user interfaces do not persist or propagate filters originating from one dashboard and apply such filters across multiple related dashboards to generate more granular details of the files and data within the information management environment. By persisting and propagating selected filters across multiple dashboards, the invention presented herein allow for more efficient search, analysis, and execution of certain information management actions based on the queried information. | 2022-02-10 |
20220043864 | MODULAR ATTRIBUTE-BASED MULTI-MODAL MATCHING OF DATA - A attribute-based data matching system determines top matches for a first element from a plurality of second elements. The data matching system extracts attributes for the first element from first dataset and attributes for the plurality of second elements from a plurality of second datasets. Pairs of attributes are generated wherein each attribute pair includes an attribute of the first element and an attribute of one of the plurality of second elements. Pairwise rankings of the plurality of second elements corresponding to the attributes of the first element are generated based on weights of the attribute pairs. The pairwise rankings of the attribute pairs are aggregated to determine a ranked list that orders the plurality of second elements based on the extent of their match with the first element. User feedback to the ranked list can be collected and used to adjust the data matching system. | 2022-02-10 |
20220043865 | SYSTEM AND METHOD FOR AUTOMATED RECORD CREATION AND MANAGEMENT - Disclosed is a system for managing corporate information, including at least one database configured to store a set of corporate information, a set of corporate templates, and a set of interconnected corporate records, a record bank module coupled to the database and configured to receive record generation requests and create records, a corporate logic module connected to the record bank module setting out a set of logic rules relating to a set of corporate governance compliance requirements, and a clerk module coupled to the database and the record bank module and configured to file created records with third parties. Also disclosed are a method of maintaining a corporate document collection and a method of ongoing monitoring of corporate compliance requirements and the generation and submission of documents to meet those compliance requirements. | 2022-02-10 |
20220043866 | COMPUTERIZED SYSTEMS AND METHODS FOR MANAGING AND MONITORING SERVICES AND MODULES ON AN ONLINE PLATFORM - The present disclosure may be directed to systems and methods for managing and monitoring services and modules. The system may include receiving, from a user device, a request to perform a test on a target application programming interface; calling the target application programming interface; and retrieving a search result page associated with the target application programming interface. The system may include retrieving a rule based on the target application programming interface and applying the rule to the retrieved search result page associated with the target application programming interface. The system may include determining whether to implement the target application programming interface based on the results of the applied rule. | 2022-02-10 |
20220043867 | DATA SEARCH APPARATUS, AND DATA SEARCH METHOD AND PROGRAM THEREOF, AND EDGE SERVER AND PROGRAM THEREOF - A system using edge computing is enabled to efficiently acquire data of an acquisition target without fail. A data search server KSV includes an industry information table | 2022-02-10 |
20220043868 | Taxonomy Driven Multi-System Networking and Content Delivery - Taxonomy driven multi-system networking and content delivery systems and methods are provided herein. An example systems includes a website authoring platform generating a taxonomy structure for a webpage, the taxonomy structure indicating assets to be included in the webpage a layout for the assets, a technical documentation authoring system for creating technical documents related to the assets, and a metadata binder providing the technical documentation authoring system with access to the taxonomy structure of the website authoring platform so that technical document authors are provided with the taxonomy structure to guide creation and structuring of the technical documents so that the technical documents comprise data that corresponds to the assets. | 2022-02-10 |
20220043869 | METHODS AND SYSTEMS FOR SEARCHING BASED ON MULTIPLE USER PROFILES - Systems and methods are described for searching a search query input received from a primary user. A first user profile associated with the primary user is accessed from memory. The proximity of a secondary user to the primary user is determined and compared to a predetermined proximity. The relevance of the secondary user to the search query input is determined. In response to determining that the secondary user is relevant to the search query input, a second user profile associated with the secondary user is accessed from memory. In response to determining that the secondary user is within the predetermined proximity and that the secondary user is a relevant user, at least one of an extension to the search query input and a search result is provided based on the search query input, the first user profile and the second user profile. | 2022-02-10 |
20220043870 | WEBPAGE CUSTOMIZATION - Embodiments of the present disclosure relate to a method, system, and computer program product for webpage customization. In some embodiments, a method is disclosed. According to the method, a webpage to be provided to a user is obtained. The webpage comprises at least a first element having a first set of style attributes. A second element matching the first element is determined from a set of elements customized for the user. The second element has a second set of style attributes. The webpage is customized for the user by applying at least part of the second set of style attributes to the first element. The customized webpage is provided to the user. In other embodiments, a system and a computer program product are disclosed. | 2022-02-10 |
20220043871 | UNSUPERVISED ENTITY AND INTENT IDENTIFICATION FOR IMPROVED SEARCH QUERY RELEVANCE - Technologies are described here for, among other things, improving search query relevance by executing a query on a search engine, retrieving search-page-data generated from executing the query, the search-page-data including document-titles and universal resource locators (URLs), each document-title being a title of a document associated with a URL, determining relevant-entity-words in the query from an entity relevance score for matching search terms in the query, Domain-URLs, and Domain-Titles, determining relevant-intent-words in the query from an intent-word relevance score based on a number of times a search term appears in the query and the URLs relative to other search terms in the query and the URLs, comparing each of the determined relevant-entity-words and each of the determined relevant-intent-words with a plurality of stored past-user queries, retrieving the plurality of stored past-user search queries including the relevant-entity-words and the relevant-intent-words, and transmitting a set of query suggestions to a client device. | 2022-02-10 |
20220043872 | WORK INCOME VISUALIZATION AND OPTIMIZATION PLATFORM - Provided are systems and methods that rely on machine learning to recommend employment opportunities. In one example, a method may include identifying, via execution of a first machine learning model, income data and spending data of a user, identifying, via execution of a second machine learning model, skill attributes of the user, determining, via execution of a third machine learning model, a recommended job for the user, where the determining comprises inputting the outputs from the first and second machine learning models into the third machine learning model, and displaying, via a user interface, a description of the recommended job. | 2022-02-10 |
20220043873 | METHODS AND SYSTEMS FOR PERSONALIZED, ZERO-INPUT SUGGESTIONS BASED ON SEMI-SUPERVISED ACTIVITY CLUSTERS - Examples of the present disclosure describe systems and methods that provide a pipeline to generate personalized queries that are associated with and based on a user's interests determined from a user's past searches, on an Internet search engine, and/or the content the user viewed from the past searches. The suggested queries can be shown in a user interface component associated with the user interface of the search engine and before the user enters anything, such as a new Internet search. This pre-population of searches associated with a user's interests gives an opportunity to the user to try these queries without manually entering in a search string. | 2022-02-10 |
20220043874 | SYSTEMS AND METHODS FOR INTELLIGENT CONTENT FILTERING AND PERSISTENCE - A source content processor receives content from a crawler and calls a text mining engine. The text mining engine mines the content and provides metadata about the content. The source content processor applies a source content filtering rule to the content utilizing the metadata from the text mining engine. The source content filtering rule is previously built based on at least one of a named entity, a category, or a sentiment. The source content processor determines whether to persist the content according to a result from applying the source content filtering rule to the content and either stores the content in a data store or deletes the contents from the data ingestion pipeline such that the content is not persisted anywhere. Embodiments disclosed herein can significantly reduce the amount of irrelevant content through the data ingestion pipeline, prior to data persistence. | 2022-02-10 |
20220043875 | SEARCHING FOR USER SELECTED PORTIONS OF CONTENT - A method, system, and program for searching for a portion content contained in a document is disclosed. Accordingly, a search engine, or some other application, analyzes a document with a user selected content portion to determine a match. The particular algorithm for determining the match will vary depending upon the particular implementation. Based on this analysis, one or more portions of the document are automatically highlighted in situ. | 2022-02-10 |
20220043876 | SYSTEMS AND METHODS FOR RECOMMENDING COLLABORATIVE CONTENT - The system generates a recommendation of content for use in collaboration, allowing relevant content to be used as base content. The system identifies a content item, and retrieves reviews for the content item from one or more sources or forums. The system filters the reviews to generate a reduced set of reviews based on text of the respective reviews, profile information associated with the reviews, and reference information. A recommendation metric is determined for the content item based on the reduced set of reviews and based on the one or more recommendation criteria. The recommendation criteria specify which aspects of the content impact recommendation, and how those aspects impact recommendation. The recommendation metric indicates whether the content item is recommended as base content, to be used for generating collaborative content. The system generates a recommendation indicator indicative of the recommendation metric, and outputs the indicator for display, storage, or both. | 2022-02-10 |
20220043877 | METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS - A method includes displaying and capturing image data containing an object and accessing a plurality of records related to objects, selecting a record related to the captured object, obtaining an identifier of a vendor of the object of the selected data record, combining the selected data record and the vendor identifier to form a search record, displaying, based on the search record, an augmented reality interface to receive a first interactive action for saving the search record, receiving the first interactive action, saving, in response to receiving the first interactive action, the search record into a searchable data structure, receiving a second interactive action, retrieving, in response to receiving the second interactive action, the search record from the searchable data structure, updating the vendor identifier based on the retrieved search record, and displaying information related to the search record. | 2022-02-10 |
20220043878 | INTERNET ACCESSIBLE BEHAVIOR OBSERVATION WORKPLACE ASSESSMENT METHOD AND SYSTEM TO IDENTIFY INSIDER THREAT - The present invention is a website-based, Internet browser accessible method of behavior assessment that consists of a user within an organization accessing the website-hosted Workplace Behavior Observation Form (WBOF) through the Universal Resource Locator (URL) address for the site to answer all form items about an observed individual in the same workplace to determine when characteristics are identified indicating the presence of and predisposition to insider threat. When the WBOF is completed, the user completing the WBOF submits the form which then is automatically scored and analyzed by pattern classifiers trained using a multitude of past examples of known insider threat characteristics across all WBOF items as input which, in turn, provide outputs of threat and risk values that are embedded in a report template in designated locations to form a completed assessment of threat, organizational vulnerabilities, and risk to the organization. The completed report is forwarded to the user's email address. The report may indicate the absence of likely insider threat or the presence of insider threat with information useful to support mitigation efforts. | 2022-02-10 |
20220043879 | SYSTEM AND METHOD FOR COLLECTION OF A WEBSITE IN A PAST STATE AND RETROACTIVE ANALYSIS THEREOF - A system and method for collection of a website in a past state and retroactive analysis thereof are provided. The method includes collecting, from a repository, at least one session replay; identifying, in the at least one collected session replay, at least one main state, wherein a main state is a portion of a session replay; selecting at least one webpage snapshot corresponding to a respective main state of the at least one identified main state, wherein each snapshot is a single-instant webpage state at a specific point in time; identifying, in the at least selected one snapshot, at least one webpage zone; and returning the at least one identified zone. | 2022-02-10 |
20220043880 | SYSTEMS AND METHODS FOR PREDICTIVE CACHING - A method for predictive caching may include determining previous user activity related to data items and/or documents, receiving a request to view a document from a user, predicting data items to pre-cache based on the previous user activity and at least one other factor, prioritizing the predicted data items for pre-caching, dividing the prioritized data items for pre-caching into a plurality of groups, downloading prioritized data items for each group among the plurality of groups according to the prioritization of the predicted data items, and displaying a view of the document after data items, corresponding to the request, are received. | 2022-02-10 |
20220043881 | DYNAMIC SERVICE WORKER CODE FOR STORING INFORMATION IN WEB BROWSER - Systems and methods for storing information in a web browser by dynamically generating service worker codes are provided. In one example, an online system receives a request from a client device to store data included in the request in a service worker code. The online system modifies a source code of a particular service worker code to include the data to be stored and transmits the modified service worker code to the client device. The client device receives and stores the modified service worker code embedded with the data. The client device receives a request for a particular data associated with a web page and determines that the modified service worker code contains the requested particular data. The client device retrieves the requested particular data from the modified service worker code and updates the web page with the retrieved particular data. | 2022-02-10 |
20220043882 | SOLVING QUADRATIC INTEGER PROGRAMMING (QIP) PROBLEMS ON OPTIMIZATION SOLVER MACHINES - According to an aspect of an embodiment, operations include receiving a Quadratic Integer Programming (QIP) problem including an objective function and a set of constraints on integer variables associated with the objective function. The operations further include obtaining an approximation of the QIP problem by relaxing the QIP problem and generating an approximate solution by solving the obtained approximation. The operations further include generating a Quadratic Unconstrained Binary Optimization (QUBO) formulation of the QIP problem based on the generated approximate solution and the received QIP problem. The operations further include submitting the generated QUBO formulation to an optimization solver machine and receiving a solution of the submitted QUBO formulation from the optimization solver machine. The operations further include publishing an integral solution of the received QIP problem on a user device based on the received solution. | 2022-02-10 |
20220043883 | HARDWARE IMPLEMENTATION OF DISCRETE FOURIER TRANSFORM - Improved devices and methods for performing Fast Fourier Transforms. | 2022-02-10 |
20220043884 | SYSTEM AND METHOD FOR AN OPTIMIZED WINOGRAD CONVOLUTION ACCELERATOR - One embodiment provides a compute apparatus to perform machine learning operations, the compute apparatus comprising a hardware accelerator including a compute unit to perform a Winograd convolution, the compute unit configurable to perform the Winograd convolution for a first kernel size using a transform associated with a second kernel size. | 2022-02-10 |
20220043885 | METHOD AND APPARATUS FOR CONVOLUTIONAL COMPUTATION BASED ON FLOATING GATE NVM ARRAY - In an embodiment a method programming floating gate transistors belonging to non-volatile memory cells to multilevel threshold voltages respectively corresponding to the weight factors, performing a sensing operation of the programmed floating gate transistors with a control signal adapted to make the corresponding memory cells become conductive at an instant determined by a respective programmed threshold voltage, performing the convolutional computation by using the input values during an elapsed time for each memory cell to become conductive and outputting output values resulting from the convolutional computation. | 2022-02-10 |
20220043886 | Hardware Implementation of Convolutional Layer of Deep Neural Network - Hardware implementations of, and methods for processing, a convolution layer of a DNN that comprise a plurality of convolution engines wherein the input data and weights are provided to the convolution engines in an order that allows input data and weights read from memory to be used in at least two filter-window calculations performed either by the same convolution engine in successive cycles or by different convolution engines in the same cycle. For example, in some hardware implementations of a convolution layer the convolution engines are configured to process the same weights but different input data each cycle, but the input data for each convolution engine remains the same for at least two cycles so that the convolution engines use the same input data in at least two consecutive cycles. | 2022-02-10 |
20220043887 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING CAUSALITY - Implementations of the present disclosure relate to a method, system and program product for determining a causality between a plurality of variables. A method is provided for determining a causality between a plurality of vectors, which comprises: in response to a data set of a plurality of samples associated with the plurality of variables being collected, obtaining a matrix describing the causality between the plurality of variables, each sample among the plurality of samples comprising data that corresponds to the plurality of variables; determining a fitness degree and an expert knowledge constraint which are associated with the causality based on the data set and the matrix, wherein the expert knowledge constraint comprises at least one of an edge constraint on a direct causality between two variables in the matrix and a path constraint on an indirect causality between two variables in the matrix; building a problem formula describing the causality according to the determined fitness degree and expert knowledge constraint; and solving the built problem formula so as to obtain a candidate result of the matrix. Further, there is provided a corresponding system and computer program product. | 2022-02-10 |
20220043888 | DATA ANALYSIS APPARATUS, METHOD, AND COMPUTER READABLE METHOD - The present disclosure provides a data analysis apparatus including a time series analysis state memory unit configured to store a state of a time series data analysis; a time series analysis unit configured to analyze input data points belonging to time series data generated by a plurality of data sources and update the state stored the time series analysis state memory unit; and a filtering apparatus including: a data fetching unit configured to fetch data points from the data sources; a quality target memory unit; and a data point selection optimization unit configured to select data points based on a quality target stored in the quality target memory unit and data input from the time series analysis state memory unit. | 2022-02-10 |
20220043889 | METHOD FOR DETECTING UNAUTHORIZED COPYING OF CONTENT AND SERVICE SERVER USING SAME - A method for detecting an unauthorized copy of a content according to an embodiment of the present invention includes providing content including a plurality of images to a terminal device; collecting scroll inputs applied by a user to the terminal device when viewing the content, and generating scroll log information from the scroll inputs; and constructing a database by collecting the scroll log information according to each user account registered in the service server or identification information of the terminal device. | 2022-02-10 |
20220043890 | METHOD AND APPARATUS OF DRM SYSTEMS FOR PROTECTING ENTERPRISE CONFIDENTIALITY - One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage. | 2022-02-10 |
20220043891 | SYSTEM AND METHOD FOR PROCESSING COPYRIGHT AND PROFIT DISTRIBUTION OF CLOTHES FASHION DESIGN USING BLOCKCHAIN - The present invention includes a first operation (S | 2022-02-10 |
20220043892 | ENTERPRISE-LEVEL LICENSING FOR A BARCODE DECODER WITHIN A MOBILE DEVICE APPLICATION - An application on a mobile device may include a barcode decoder. The application may be configured to download a configuration file. The configuration file may include an enterprise identifier that is uniquely associated with an enterprise. The application may additionally be configured to obtain a license key for the barcode decoder. The license key may be based on the enterprise identifier. The application may additionally be configured to transition the barcode decoder from an inactive state to an active state conditional upon verifying that the license key is based on the enterprise identifier. | 2022-02-10 |
20220043893 | METHODS AND APPARATUS FOR AUTOMATIC PERMISSION ASSIGNMENT - This application relates to apparatus and methods for automatically determining and enforcing user permissions for applications and application features. In some embodiments, a system includes a server and a user device. The server may determine a user of the user device based on receiving login credential data. The server may further obtain user attributes for the user including, in some examples, a location of the user. The server may further obtain an attribute-based control policy that identifies relationships between a plurality of possible user attributes. For example, the attribute-based control policy may identify attribute requirements that must be met for enablement of a particular application feature. Additionally, the server may determine user permissions for the user based on the attribute-based control policy and the user attributes. The server may transmit the user permissions to the user device, and the user device configures the corresponding application according to the user permissions. | 2022-02-10 |
20220043894 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK - Data processing systems and methods, according to various embodiments, are adapted for automatically assessing the level of security and/or privacy risk associated with doing business with a particular vendor or other entity and for generating training material for such vendors. In various embodiments, the systems may automatically obtain and use any suitable information to assess such risk levels including, for example: (1) any security and/or privacy certifications held by the vendor; (2) the terms of one or more contracts between a particular entity and the vendor; (3) the results of one or more privacy impact assessments for the vendor; and/or (4) any other suitable data. The system may be configured to automatically approve or reject a particular vendor based on the assessed risk level associated with the vendor and this information may be automatically communicated to an entity considering doing business with the vendor and/or the vendor itself. | 2022-02-10 |
20220043895 | BIOMETRIC AUTHENTICATION SYSTEM, BIOMETRIC AUTHENTICATION METHOD, AND PROGRAM - A biometric authentication system, including an image input unit configured to obtain an image by imaging a living body, a storage unit configured to store registration information relating to a plurality of biological features obtained from a biological region of an image of each person, and an authentication processing unit configured to process the biological region of the image obtained by the image input unit to execute biometric authentication based on the registration information, wherein the plurality of biological features obtained from the biological region of the each person are a plurality of biological features having a low pattern correlation with one another, and wherein the authentication processing unit is configured to combine the plurality of biological features having a low pattern correlation with one another, which are obtained by processing the image, to execute the biometric authentication. | 2022-02-10 |
20220043896 | FACIAL RECOGNITION AUTHENTICATION SYSTEM INCLUDING PATH PARAMETERS - Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement. | 2022-02-10 |
20220043897 | Method And Apparatus For Geographic Location Based Electronic Security Management - Provided herein are systems, methods and computer readable media for facilitating an authentication process validating the location of a first device, for example, using a second device, before authorizing an action An example apparatus may be configured to receive a request to cause an action from a first device, cause the first device to communicate with a second device to verify a proximity of the first device and the second device, receive verification of the proximity, receive a first identifying data string, receive a second identifying data string, and upon confirmation of a match of the first identifying data string and the second identifying data string, authorizing the action. | 2022-02-10 |
20220043898 | METHODS AND APPARATUSES FOR ACQUIRING INFORMATION - A method and an apparatus for acquiring information. The method comprises: determining authorization status of an applet on a first applet running platform integrated into a first host application in response to detecting a launch operation on the applet ( | 2022-02-10 |
20220043899 | ELECTRONIC DEVICE AND METHOD FOR AUTHENTICATING SOFTWARE BASED ON BLOCKCHAIN - A method for authenticating a software based on a blockchain implemented in an electronic device. The method includes obtaining a first identification code and a first hash value of a first software; generating a first authentication code; writing the first identification code, the first hash value, and the first authentication code into a blockchain; obtaining a second identification code of a second software to be identified and calculating a second hash value of the second software; determining whether the second hash value of the second software is the same as the first hash value; if the second hash value is the same as the first hash value, generating a second authentication code; determine whether the second authentication code is the same as the first authentication code; and if so determining that the second software is copyrighted. | 2022-02-10 |
20220043900 | METHOD AND DEVICE FOR AUTHENTICATING AN FPGA CONFIGURATION - The disclosure relates to a method and a device for authenticating an FPGA configuration. The method includes at least partly reading the configuration of a FPGA by the FPGA itself and calculating a first checksum using the read configuration. The method further includes providing an authentication response which confirms that the FPGA configuration is authentic when the first checksum matches a specified checksum, wherein the reading, calculating, and providing are carried out in an obfuscated manner. The authentication response confirming that the FPGA configuration is authentic is not provided or is only provided with a very low degree of probability when the first checksum and the specified checksum do not match. In this regard, an FPGA may check its own configuration. | 2022-02-10 |
20220043901 | METHOD OF DATA TRANSFER BETWEEN HOSTED APPLICATIONS - A method of data transfer between hosted applications. The method comprises: establishing a shared storage area for a first hosted application: locking access permissions to the shared storage area (S | 2022-02-10 |
20220043902 | VERIFIABLE LABELS FOR MANDATORY ACCESS CONTROL - A computer-implemented method and a computer program product for enforcing verifiable mandatory access control (MAC) labels, and a data processing system. One embodiment may comprise receiving, from an entity, a first verifiable MAC label associated with an object, receiving, from the entity, a second verifiable MAC label associated with a subject requesting to access the object, and determining whether to grant, to the subject, access to the object responsive to the request based on comparing the first verifiable MAC label associated with the object and the second verifiable MAC label associated with the subject to a verifiable MAC policy. Each of the first verifiable MAC label, the second verifiable MAC label, and the verifiable MAC policy in some embodiments may be formatted as a verifiable credential that is machine readable and digitally signed. | 2022-02-10 |
20220043903 | INFORMATION PROCESSING DEVICE WITH PASSWORD FUNCTION, AND PASSWORD SETTING METHOD - An objective is to notify a user that a password is not set yet and to provide the user with necessary information for setting a password, when connected to a network. An information processing device includes a communication interface, a printer, a memory, and a processor. The processor is configured to (i) acquire setting information and address information from a server on the network via the communication interface when the communication interface is connected to the network where (a) the setting information includes a password setting state and (b) the address information includes information for accessing a password setting screen for setting the password, (ii) check the password setting state of the password based on the setting information; and (iii) control the printer to print a guide including the address information to direct the user to the password setting screen in response to the password not being set. | 2022-02-10 |
20220043904 | SYSTEMS AND METHODS FOR CONTROLLING SMART DEVICES - Systems and methods for controlling a smart device are provided. The methods may include acquiring a state switching instruction including first password information. The methods may further include acquiring information of a preset periodic password related to the smart device. The preset periodic password becomes valid each time after a predetermined time has passed. The methods may further include determining whether to switch a state of the smart device based on the information of the password and the information of the preset periodic password. | 2022-02-10 |
20220043905 | Hacking-Resistant Computer Design - A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal computer, smartphone, or any other computing device suitable for network communication, comprises a first partition and a second partition. The second partition can communicate over a network such as the Internet. In contrast, the first partition cannot connect to the Internet, and can directly communicate only with the second partition or with input/output devices directly connected to the first partition. Further, the first partition segments its memory addressing for program code and hardware-protects it from alteration. The second partition is hardware-limited from reading or writing to the memory addressing of the first partition. As a result, the critical data files and program code stored on the first partition are protected from malicious code affecting the second partition. | 2022-02-10 |
20220043906 | APPLICATION-LEVEL SANDBOXING ON DEVICES - Execution of an application in an application-level sandbox is disclosed. A request to launch an application is received by an operating system executing on a device. A determination is made that a stored copy of the application should be executed within an application-level sandbox. The stored copy of the application is executed in the application-level sandbox. | 2022-02-10 |
20220043907 | SYSTEMS AND METHODS FOR CLOUD-BASED COLLECTION AND PROCESSING OF DIGITAL FORENSIC EVIDENCE - Systems and methods for conducting a cloud-based forensic investigation of electronically-stored information are provided. The system includes an investigation requestor device configured to request a forensic investigation including selecting search criteria for the investigation, at least one remote system of the target, wherein the at least one remote system comprises electronically-stored information; a cloud server for storing forensic artifacts collected from the at least one remote system, wherein the forensic artifacts are collected based on the search criteria; and a cloud-based evidence-processing service configured to analyze the forensic artifacts and generate an initial report. | 2022-02-10 |
20220043908 | MITIGATION OF RETURN STACK BUFFER SIDE CHANNEL ATTACKS IN A PROCESSOR - Mitigation of return stack buffer side channel attacks in a processor. Detecting a side channel attack or a fault in a return from a function call in the processor includes receiving a return exception level indication (or e.g., a return security level indication) indicating the exception level associated with the return and comparing the exception level associated with the return to the exception level (or security level) associated with the return address. The return exception level indicator may be received in conjunction with a return indication. The processing circuit accesses the first entry of the return stack buffer, which indicates the return address of the function call, and also accesses an exception level associated with the return address. The processing circuit compares the exception level associated with the return address to the exception level associated with the return to determine whether to use the return address in a prediction of instruction flow. | 2022-02-10 |
20220043909 | Current Monitor for Security - An apparatus includes an interface for an electronic device and a baseboard management controller (BMC). The BMC includes circuitry configured to, through the interface, monitor current usage by the electronic device, determine a security status of the electronic device based upon the current usage, and take a corrective action based upon the security status. | 2022-02-10 |
20220043910 | SELECTING A DETECTION MODEL FOR DETECTION OF A MALICIOUS FILE - Disclosed herein are methods and systems for selecting a detection model for detection of a malicious file. An exemplary method includes: monitoring a file during execution of the file within a computer system by intercepting commands of the file being executed and determining one or more parameters of the intercepted commands. A behavior log of the file being executed containing behavioral data is formed based on the intercepted commands and based on the one or more parameters of the intercepted commands. The behavior log is analyzed to form a feature vector. The feature vector characterizes the behavioral data. One or more detection models are selected from a database of detection models based on the feature vector. Each of the one or more detection models includes a decision-making rule for determining a degree of maliciousness of the file being executed. | 2022-02-10 |
20220043911 | METHOD AND SYSTEM FOR GENERATING A LIST OF INDICATORS OF COMPROMISE - A method and a system for identifying indicators of compromise are provided. The method comprises: obtaining a given malware carrier configured for execution a main malware module; generating, based on the given malware carrier, an attack roadmap, the attack roadmap including a plurality of malware carriers; determining a malware class of each one of the plurality of malware carriers; generating a current list of indicators of compromise of each of the plurality of malware carriers; searching a database to locate at least one stored attack roadmap including a plurality of stored malware carriers; retrieving from the database a stored list of indicators of compromise for each of the plurality of stored malware carriers; generating an amalgamated list of indicators of compromise based on the current list of indicators and the stored digital list of indicators of compromise; storing, in the database, the amalgamated list of indicators of compromise. | 2022-02-10 |
20220043912 | Systems, Methods and Devices for Memory Analysis and Visualization - Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts. | 2022-02-10 |
20220043913 | ANALYTICS WITH SHARED TRAITS - A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software. | 2022-02-10 |
20220043914 | SECURING NODE GROUPS - A method for securing a plurality of compute nodes includes authenticating a hardware architecture of each of a plurality of components of the compute nodes. The method also includes authenticating a firmware of each of the plurality of components. Further, the method includes generating an authentication database comprising a plurality of authentication descriptions that are based on the authenticated hardware architecture and the authenticated firmware. Additionally, a policy for securing a specified subset of the plurality of compute nodes is implemented by using the authentication database. | 2022-02-10 |
20220043915 | STORAGE OF NETWORK CREDENTIALS - Aspects of the present disclosure are directed to storage of network credentials. In an example, a computing apparatus for storage of network credentials includes a processor, a first memory to store an operating system of the computing apparatus, a second memory to store firmware for initiating the computing apparatus, a third memory, and a controller. Responsive to power-on of the computing apparatus, the operating system of the computing apparatus can access an agent application in the first memory, provision a wireless network credential using the agent application, and encrypt the wireless network credential using the agent application. The firmware stored by the second memory can, in response to receiving the encrypted wireless network credential from the first memory, store the encrypted wireless network credential in the third memory. | 2022-02-10 |