07th week of 2019 patent applcation highlights part 49 |
Patent application number | Title | Published |
20190050509 | Predictive Information For Free Space Gesture Control and Communication - The technology disclosed relates to simplifying updating of a predictive model using clustering observed points. In particular, it relates to observing a set of points in 3D sensory space, determining surface normal directions from the points, clustering the points by their surface normal directions and adjacency, accessing a predictive model of a hand, refining positions of segments of the predictive model, matching the clusters of the points to the segments, and using the matched clusters to refine the positions of the matched segments. It also relates to distinguishing between alternative motions between two observed locations of a control object in a 3D sensory space by accessing first and second positions of a segment of a predictive model of a control object such that motion between the first position and the second position was at least partially occluded from observation in a 3D sensory space. | 2019-02-14 |
20190050510 | DEVELOPMENT OF COMPLEX AGRICULTURAL SIMULATION MODELS FROM LIMITED DATASETS - A multi-step iterative process for simulating complex agricultural situations where limited sets of data are available for such problems first predicts an outcome for each situation in a particular dataset, using initial assumptions of an applied primary model. The process then uses the errors across these situations to identify where opportunities exist among relevant predictive variables for the model to make changes to a response to such predictor variables to reduce the errors when averaged across all situations. The process then develops a correction model to identify adjustments based on combinations of the predictive variables, and applies the adjustments to the primary model to induce an altered outcome. | 2019-02-14 |
20190050511 | TECHNIQUES FOR PROCESSING POWER SYSTEM NETWORK INFORMATION - Techniques and apparatus for parameter error detection in a power system based on state estimation are described. In one embodiment, for example, an efficient process may be used to derive and compute only the necessary subset of the gain matrix and covariance matrix, thus avoiding the computation and storage of large dense matrices. The described efficient process can be applied either to single-scan or multiple-scan schemes. Other embodiments are described. | 2019-02-14 |
20190050512 | METHODS, SYSTEMS, AND DEVICES FOR EFFICIENT COMPUTATION OF SIMULATION RUNS - Methods, systems, and apparatus, including computer programs encoded on non-transitory computer storage medium(s), for efficiently executing autonomous driving (AD) simulations. The AD simulation can include segmented time events that include variations. The simulation including its variations can be implemented as a graph structure in which the simulation may be executed in a manner similar to traversing a graph. | 2019-02-14 |
20190050513 | Dynamic Execution of Predictive Models & Workflows - Disclosed herein are systems, devices, and methods related to assets and predictive models and corresponding workflows that are related to the operation of assets. In particular, examples involve defining and deploying aggregate, predictive models and corresponding workflows, defining and deploying individualized, predictive models and/or corresponding workflows, and dynamically adjusting the execution of model-workflow pairs. | 2019-02-14 |
20190050514 | FAULT INJECTION USING HYBRID SIMULATION MODEL - A method to perform a hybrid Register Transfer Level (RTL)/gate-level (GL) fault injection simulation of a hardware design comprises generating a list of one or more fault nodes in a GL netlist for the hardware design, mapping functionally equivalent comparison points between RTL logic for the hardware design and GL netlist of the hardware design, identifying a nearest set of downstream comparison points for one or more logic paths for the one or more fault nodes, identifying a nearest set of upstream comparison points for the one or more identified downstream comparison points, replacing RTL logic with equivalent GL netlist logic to provide hybrid RTL/GL netlist in code, and performing fault injection simulating using the hybrid RTL/GL netlist code | 2019-02-14 |
20190050515 | ANALOG FUNCTIONAL SAFETY WITH ANOMALY DETECTION - In some examples, systems and methods may be used to improve functional safety of analog or mixed-signal circuits, and, more specifically, to anomaly detection to help predict failures for mitigating catastrophic results of circuit failures. An example may include using a machine learning model trained to identify point anomalies, contextual or conditional anomalies, or collective anomalies in a set of time-series data collected from in-field detectors of the circuit. The machine learning models may be trained with data that has only normal data or has some anomalous data included in the data set. In an example, the data may include functional or design-for-feature (DFx) signal data received from an in-field detector on an analog component. A functional safety action may be triggered based on analysis of the functional or DFx signal data. | 2019-02-14 |
20190050516 | UNIFIED FUNCTIONAL COVERAGE AND SYNTHESIS FLOW FOR FORMAL VERIFICATION AND EMULATION - Synthesis of functional coverage (e.g., covergroups) is optimized for hardware emulation. The optimization may reduce the number of logic gates used to implement the hardware emulator circuits or reduce the computer resources used to synthesize the hardware emulator circuits. The optimization may also prevent the synthesis of unnecessary circuits. In another aspect, the optimization may result in a representation that may be used both to synthesize hardware emulation circuits and as part of formal verification. This may result in a model that can be used for formal verification, hardware emulation, and software simulation. | 2019-02-14 |
20190050517 | INTEGRATED CIRCUIT DESIGN SYSTEM WITH AUTOMATIC TIMING MARGIN REDUCTION - A computer-implemented method for manufacturing an integrated circuit chip is disclosed. The method includes selecting cell-based circuit representations to define an initial circuit design. The initial circuit design is partitioned into multiple sub-design blocks to define a partitioned design. Circuit representations of local clock sources are inserted into the partitioned design. Each local clock source is for clocking a respective sub-design block and based on a global clock source. A timing analysis is performed to estimate skew between each local clock source and the global clock source. The partitioned design is automatically modified based on the estimated skew. | 2019-02-14 |
20190050518 | ELECTRONIC COMPONENT FOOTPRINT VERIFICATION SYSTEM AND A METHOD THEREOF - An electronic component footprint verification system and a method thereof are provided in the present disclosure. The system is available to an external user for selecting an electronic component footprint to be verified, reading a verification rule checklist in an external database, extracting characteristics of the electronic component footprint, accessing characteristic data from the electronic component footprint, verifying the characteristic data based on the verification rule checklist, and displaying a verification result. | 2019-02-14 |
20190050519 | DIE INTERFACE ENABLING 2.5 D DEVICE-LEVEL STATIC TIMING ANALYSIS - A circuit design verification method suitable for use with a 2.5D transceiver device potentially having hundreds of dice mounted on an interposer. An illustrative method includes: (a) retrieving a design of a circuit that includes multiple integrated circuit dice connected via an interposer, each die having at least one contact for receiving or transmitting a digital signal conveyed by an interchip connection of the interposer, said circuit including an IO cell for each such contact; (b) obtaining a timing model for components of said circuit, the timing model accounting for propagation delays of said IO cells and propagation delays of said interchip connections; (c) performing a static timing analysis of the design using the timing model to determine data required times and data arrival times at each of said components; (d) comparing the data required times with the data arrival times to detect timing violations; and (e) reporting said timing violations. | 2019-02-14 |
20190050520 | SIMULATED VEHICLE OPERATION MODELING WITH REAL VEHICLE PROFILES - Systems and techniques for simulated vehicle modeling with real vehicle profiles are described herein. In an example, a simulated vehicle modeling system is adapted to obtain a vehicle performance fingerprint, such as from a vehicle performance fingerprint that includes vehicle performance data collected from a unique vehicle while experiencing real world driving conditions. The simulated vehicle modeling system may be further adapted to present, in a driving simulator, a simulated driving experience with a simulated vehicle, such as for a simulated vehicle that is constructed based on the vehicle performance fingerprint. The simulated vehicle modeling system may be further adapted to update a set of driving directives for an autonomous vehicle based on the simulated driving experience and upload the set of driving directive to an autonomous vehicle. | 2019-02-14 |
20190050521 | METHOD FOR DESIGNING STRUCTURE, AND STRUCTURE - A method is for designing a structure in which a composite material including fibers and a resin is arranged as a damping material in a structure body. The method includes selecting a divided arrangement area in which the composite material is to be arranged, the divided arrangement areas being one of divided arrangement areas into which a composite material arrangement area of the structure in which the composite material is arrangeable is divided; selecting a lamination position where the composite material is to be arranged in a thickness direction of the structure; selecting a fiber direction of the fibers; and determining whether a design performance of the structure satisfies performance requirements, the design performance being derived from design parameters including at least the selected divided arrangement area, the selected lamination position, and the selected fiber direction. | 2019-02-14 |
20190050522 | HETEROGENEOUS COMPUTE ARCHITECTURE HARDWARE/SOFTWARE CO-DESIGN FOR AUTONOMOUS DRIVING - Methods and apparatus relating to heterogeneous compute architecture hardware/software co-design for autonomous driving are described. In one embodiment, a heterogeneous compute architecture for autonomous driving systems (also interchangeably referred to herein as Heterogeneous Compute Architecture or “HCA” for short) integrates scalable heterogeneous processors, flexible networking, benchmarking tools, etc. to enable (e.g., system-level) designers to perform hardware and software co-design. With HCA system engineers can rapidly architect, benchmark, and/or evolve vehicle system architectures for autonomous driving. Other embodiments are also disclosed and claimed. | 2019-02-14 |
20190050523 | System and Methods for Disease Module Detection - The present disclosure discusses a system and method for disease module detection. More particularly, a protein network and list of seed proteins are provided to the system. The system iteratively selects one or more candidate proteins for inclusion in the list of seed proteins. The system calculates a connectivity factor for each of the connections of the candidate proteins to proteins listed as seed proteins. Responsive to the calculated connectivity factors the system adds one or more of the candidate proteins to list of seed proteins. At the end of the iterative process the list of seed proteins can be indicative of the disease module. | 2019-02-14 |
20190050524 | ENHANCED APPLICATIONS OF MOLECULAR LIBRARIES BASED ON STRUCTURE/FUNCTION ANALYSIS - Methods and applications for relating the structure of a molecule in a library to its function are described. Embodiments described herein relate structure to function by considering the covalent structure of the molecule, the components of that structure that are common to many molecules in the library, and the properties of those components as they relate to the function in question. Applications include, for example, enhancement and amplification of the diagnostic and prognostic signals provided by peptide arrays for use in analyzing the profile of antibodies in the blood produced in response to a disease, condition or treatment. | 2019-02-14 |
20190050525 | RIESKE-TYPE OXYGENASE/REDUCTASE TARGETED DRUGS FOR DIAGNOSTIC AND TREATMENT OF DISEASES - Embodiments of a method and/or system can include administering, to a patient with one or more conditions associated with at least one of TMA, TMAO, and/or derivatives thereof, a therapeutically effective amount of a compound for affecting inhibiting one or more CutC enzymes and/or CntA enzymes associated with microorganisms from at least one taxon from a set of microorganism taxa. | 2019-02-14 |
20190050526 | METHODS FOR IDENTIFYING INHIBITORS OF AMYLOID PROTEIN AGGREGATION - Methods for identifying compounds that are inhibitors or are likely to be inhibitors of amyloid protein aggregation, as well as three-dimensional, non-crystallographic models (i.e. “pseudo-crystal structures”) of amyloid aggregation utilized in the methods, are described. Means for creating the three-dimensional, non-crystallographic models (i.e. “pseudo-crystal structures”) of amyloid aggregation are also described. | 2019-02-14 |
20190050527 | Materials and Methods for Determining Metabolizer Status in Humans - The present invention provides methods and materials useful for determining metabolizer status. Embodiments of the present invention provide an approach using a genotyping panel and integration of genotypes of CYP3A4 and CYP3A5 to assess CYP3A metabolizer status, applicable to all CYP3A substrates, including approximately 40% of all drugs. Algorithms for CYP3A metabolizer status are described. Where the contribution ratios of CYP3A4 and CYP3A5 to overall drug levels or drug effects are known, the algorithm can be used to calculate optimal dosing. Where the contributory ratios to overall drug effects are not available, the contributory ratios can be calculated with use of the genotypes for use in drug development. Embodiments of the present invention can be used in optimizing drug treatments, selecting dose, designing therapeutics, and predicting efficacy. | 2019-02-14 |
20190050528 | METHYLATION PATTERN ANALYSIS OF TISSUES IN A DNA MIXTURE - The contributions of different tissues to a DNA mixture are determined using methylation levels at particular genomic sites. Tissue-specific methylation levels of M tissue types can be used to deconvolve mixture methylation levels measured in the DNA mixture, to determine fraction contributions of each of the M tissue types. Various types of genomic sites can be chosen to have particular properties across tissue types and across individuals, so as to provide increased accuracy in determining contributions of the various tissue types. The fractional contributions can be used to detect abnormal contributions of a particular tissue, indicating a disease state for the tissue. A differential in fractional contributions for different sizes of DNA fragments can also be used to identify a diseased state of a particular tissue. A sequence imbalance for a particular chromosomal region can be detected in a particular tissue, e.g., identifying a location of a tumor. | 2019-02-14 |
20190050529 | SYSTEMS AND METHODS FOR VARIABLE FITTING ON THE BASIS OF MANUAL REVIEW - Systems and methods for variable fitting include communicating one or more descriptions for a system exhibiting a variable value. In response, a response consisting of a first or second indication is received from the user of the disclosed systems and methods. The first and second indications being that the one or more descriptions are respectively considered to be in a first or second class with respect to the variable. The variable value is changed based on the received response. This communicating, receiving, and changing is repeated until an exit condition is considered to exist. | 2019-02-14 |
20190050530 | Systems and Methods for Analyzing Nucleic Acids - Provided herein are systems, software media, networks, kits, and methods for performing computational analyses on sequencing data of samples from an individual. An analysis can extract germline and somatic information and compare both types of information to identify sequence variants based on probabilistic modeling and statistical inferences. The analysis can comprise distinguishing between germline variants, e.g., private variants, and somatic mutations. The identified variants can be used by clinics to provide better health care. | 2019-02-14 |
20190050531 | DNA SEQUENCE PROCESSING METHOD AND DEVICE - A DNA sequence processing method and device are used to resolve a prior-art problem of low-efficiency mutation detection on a DNA sample. The method includes: performing alignment computation on each read in the read group according to a reference sequence of a chromosome to obtain an alignment result record of the read relative to the reference sequence; determining a chromosome region in which each read is located; and merging alignment result records of reads located in a same chromosome region into one intermediate result file; determining a target sequence file of each chromosome region according to the N intermediate result files corresponding to the chromosome region; and determining mutation site information of each chromosome region according to the target sequence file of the chromosome region. | 2019-02-14 |
20190050532 | Distributed systems and methods for learning about a bioprocess from redox indicators and local conditions - The present invention concerns methods and systems for learning about the redox status of a biological process experienced by a biological entity under local conditions by postulating hidden states that are locally inaccessible but are related to the redox status. The learning system uses a reference bioprocess model from which a master learner establishes an observable basis of redox indicators that are real-valued, measureable, and exclude hidden states. Meanwhile, a local learner receives at least a portion of model redox data from the reference bioprocess model, and measured redox data from the biological entity. The learning system runs a distributed learning algorithm using the observable basis established by the master learner to determine an optimal composition of redox data to be included in measured redox data collected under local conditions. | 2019-02-14 |
20190050533 | Redox-related context adjustments to a reference bioprocess model used in learning systems and methods based on redox indicators - The present invention concerns methods and systems for learning or discovering redox-related context adjustments to be applied to model conditions, e.g., in a laboratory, in which a reference biological entity is undergoing the bioprocess. A reference bioprocess model that may be used under field or local conditions is constructed based on the reference biological entity's experience of the bioprocess. The bioprocess is postulated to have hidden states associated with redox reactions. Among other, the reference biological entity may be a model cell line set up to undergo the bioprocess in vitro. A mechanism is provided for perturbing the model conditions to transition from a baseline redox-related context to a perturbed redox-related context. Redox-related context change is learned using operator matrices that transform model feature vectors containing redox indicators from baseline to perturbed redox-related context. | 2019-02-14 |
20190050534 | DISEASE-ASSOCIATED MICROBIOME CHARACTERIZATION PROCESS - Embodiments of a method and/or system for characterizing one or more microorganism-related conditions can include: determining a microorganism dataset associated with a set of subjects; and with a set of microsome characterization modules, applying analytical techniques to perform a characterization process for the one or more microorganism-related conditions based on the microorganism dataset. | 2019-02-14 |
20190050535 | Method Of Classifying A Biological Sample - The present invention relates to a method for classifying a measurement biological sample, comprising: acquisition of at least one DNA melting curve of the measurement biological sample, called at least one measurement curve; and determination that the measurement biological sample belongs to a defined group among different possible groups, by analysis of descriptors originating from the at least one measurement curve, characterized in that the descriptors comprise one or more points of the first derivative of each measurement curve and/or comprise one or more points of the second derivative of each measurement curve and/or one or more points of each measurement curve and/or one or more percentiles of each measurement curve. The invention also relates to a device implementing this method. | 2019-02-14 |
20190050536 | DISCOVERY ROUTING SYSTEMS AND ENGINES - The inventive subject matter provides apparatus, systems, and methods that improve on the pace of discovering new practical information based on large amounts of datasets collected. In most cases, anomalies from the datasets are automatically identified, flagged, and validated by a cross-validation engine. Only validated anomalies are then associated with a subject matter expert who is qualified to take action on the anomaly. In other words, the inventive subject matter bridges the gap between the overwhelming amount of scientific data which can now be harvested and the comparatively limited amount analytical resources available to extract practical information from the data. Practical information can be in the form of trends, patterns, maps, hypotheses, or predictions, for example, and such practical information has implications in medicine, in environmental sciences, entertainment, travel, shopping, social interactions, or other areas. | 2019-02-14 |
20190050537 | PREDICTION AND GENERATION OF HYPOTHESES ON RELEVANT DRUG TARGETS AND MECHANISMS FOR ADVERSE DRUG REACTIONS - A system framework and method for predicting adverse drug reactions (ADRs). Structures represented in three-dimensions were prepared for small drug molecules and unique human proteins and binding scores between them were generated using molecular docking. Machine learning models were developed using the molecular docking features to predict ADRs. Using the machine learning models, it can successfully predict a drug-induced ADR based on drug- target interaction features and known drug-ADR relationships. By further analyzing the binding proteins that are top ranked or closely associated with the ADRs, there may be found possible interpretation of the ADR mechanisms. The machine learning ADR models based on molecular docking features not only assist with ADR prediction for new or existing known drug molecules, but also have the advantage of providing possible explanation or hypothesis for the underlying mechanisms of ADRs. | 2019-02-14 |
20190050538 | PREDICTION AND GENERATION OF HYPOTHESES ON RELEVANT DRUG TARGETS AND MECHANISMS FOR ADVERSE DRUG REACTIONS - A method for predicting adverse drug reactions (ADRs). Structures represented in three-dimensions were prepared for small drug molecules and unique human proteins and binding scores between them were generated using molecular docking. Machine learning models were developed using the molecular docking features to predict ADRs. Using the machine learning models, it can successfully predict a drug-induced ADR based on drug-target interaction features and known drug-ADR relationships. By further analyzing the binding proteins that are top ranked or closely associated with the ADRs, there may be found possible interpretation of the ADR mechanisms. The machine learning ADR models based on molecular docking features not only assist with ADR prediction for new or existing known drug molecules, but also have the advantage of providing possible explanation or hypothesis for the underlying mechanisms of ADRs. | 2019-02-14 |
20190050539 | System and Method for Tracking Wellness Activity Using A Fitness Tracking Device - A method for tracking and incentivizing wellness activity using a fitness tracking device includes: receiving user wellness data collected over a time period from at least one fitness tracking device of a user, the user wellness data including at least one wellness metric corresponding to the user; analyzing user transaction data including transactions initiated by the user with a portable financial device over the time period; automatically determining a wellness award for the user based at least partially on the user wellness data and the user transaction data for the time period; and automatically initiating the wellness award for the user. A system for tracking and incentivizing a wellness activity using a fitness tracking device is also disclosed. | 2019-02-14 |
20190050540 | JOINT EXAMINATION SYSTEM - A joint examination system includes an examination server transmitting request information for performing examination of a joint of a patient to a patient terminal, receiving execution information from the patient terminal in response to the request information, and storing and analyzing the execution information. | 2019-02-14 |
20190050541 | A METHOD AND SYSTEM FOR SECURING COMPUTER SOFTWARE USING A DISTRIBUTED HASH TABLE AND A BLOCKCHAIN - A computer-implemented method ( | 2019-02-14 |
20190050542 | SYSTEM AND METHOD TO PROTECT ORIGINAL MUSIC FROM UNAUTHORIZED REPRODUCTION AND USE - Provided is a new digital music storage and readout system and method that incorporates layers of anti-pirating features to inhibit unauthorized reproduction of device music content. This concept and device design may be extended to video storage and playback. | 2019-02-14 |
20190050543 | MANAGING AUTHORIZATION CODES FROM MULTIPLE SOURCES - The present disclosure describes apparatus, systems and methods in which a first data storage is maintained for a first group of authorization codes, for example those associated with a local POS system, and second data storage, logically separate from the first data storage, is maintained for a second group of authorization codes, such as those associated with a remote or online sales system. Access control is achieved by checking a received authorization code for validity against one or both groups of authorization codes, without needing to integrate different code assignment systems or different sales systems with one another. The technology has particular utility for automated car wash systems, although it is not limited thereto, and embodiments of the technology may be retrofit to existing car wash control interfaces. | 2019-02-14 |
20190050544 | METHOD AND APPARATUS FOR UNLOCKING TERMINAL SCREEN - A method and apparatus for unlocking a terminal screen are provided. A specific embodiment of the method includes: determining a current screen state of the terminal being a state of awaiting unlocking; acquiring illumination information of an environment of the terminal in a predetermined period of time, the illumination information comprising an illumination intensity and a duration of the illumination intensity; judging whether the illumination information meets a predetermined condition; and switching the current screen state of the terminal to a successfully unlocked state in response to determining that the illumination information meets the predetermined condition. The embodiment achieves high-precision unlocking of a terminal screen without the need of manual operations on the terminal screen. | 2019-02-14 |
20190050545 | AUTHENTICATION VIA A DYNAMIC PASSPHRASE - A computerize method for voice authentication of a customer in a self-service system is provided. A request for authentication of the customer is received and the customer is enrolled in the self-service system with a text-independent voice print. A passphrase from a plurality of passphrases to transmit to the customer is determined based on comparing each of the plurality of passphrases to a text-dependent or text-independent voice biometric model. The passphrase is transmitted to the customer, and when the customer responds, an audio stream of the passphrase is received. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print. If the customer is authenticated, then storing the audio stream of the passphrase and the topic of the passphrase | 2019-02-14 |
20190050546 | Authentication Using Facial Image Comparison - Computer systems and methods are provided for transmitting authorization information to an image capturing device. A computing system receives, from an image capturing device, captured image data that includes a first facial image and an image of a document that includes a second facial image. The first facial image and the second facial image are included a single image frame. The captured image data is analyzed to determine a first portion of the captured image data that corresponds to the first facial image and a second portion of the captured image data that corresponds to the second facial image. The first portion of the captured image data is compared with the second portion of the captured image data. In accordance with a determination that the first facial image and the second facial image meet matching criteria, authorization information is transmitted to the image capturing device. | 2019-02-14 |
20190050547 | Systems and Methods for Authenticating Users in Virtual Reality Settings - Systems and methods are provided for authenticating users in virtual settings. One exemplary method includes receiving a network transaction request from a user in a virtual setting and prompting the user for a motion ID associated with an account available for use in the virtual setting to facilitate the network transaction. The method also includes capturing a movement of the user in the virtual setting while masking the movement from other users in the virtual setting. The exemplary method further includes comparing the captured movement to the motion ID and compiling and transmitting an authorization request for the network transaction when the captured movement matches the motion ID. | 2019-02-14 |
20190050548 | Method For Controlling Unlocking And Related Products - A method for controlling unlocking and related products are provided. An electronic device includes at least one processor and a computer readable storage coupled to the at least one processor. The computer readable storage stores at least one computer executable instruction thereon, which when executed by the at least one processor, cause the at least one processor to carry out actions, including: obtaining a face image; carrying out a group of rough features and a group of fine features from the face image; carrying out a verification operation for the group of rough features and the group of the fine features; carrying out a next unlocking process when verification of the group of rough features and the group of fine features is passed. | 2019-02-14 |
20190050549 | A METHOD AND SYSTEM FOR IDENTIFICATION VERIFICATION FOR MOBILE DEVICES - The present invention relates to a method for identification verification for a device. The method includes the steps of capturing user identity information at a first stage prior to an interaction at the device; capturing user identity information at a second stage following the interaction; and verifying identity during the interaction using the information captured at the first and second stages. A system for identification verification is also disclosed. | 2019-02-14 |
20190050550 | DEVICE FOR COLLECTING PERSONAL DATA FROM USER - A device for collecting personal data from a user includes a processor, a sensing device, a document scanner, and a scene camera. The sensing device is configured to capture a biometric of user. The document scanner is configured to produce a visual representation of an identifying document that includes personally identifying information. The scene camera monitors and captures a video of an uninterrupted area surrounding the kiosk including the user, the sensing device, and the document scanner. The processor transmits the captured video to a remote station that can send a signal back to the device. | 2019-02-14 |
20190050551 | SYSTEMS AND METHODS FOR AUTHENTICATING USERS - A computer-implemented method for authenticating users may include (i) identifying, on a computing system, an attempt by a user to access an application that requires authentication, (ii) sending, in response to identifying the attempt to access the application, a request for an authentication token for the application to a third-party platform for which the user has a pre-existing user account and to which the user is currently authenticated on the computing system, (iii) receiving the authentication token for the application from the third-party platform that is associated with the pre-existing user account for the user in response to sending the request for the authentication token, and (iv) authenticating the user to the application on the computing system via the authentication token associated with the pre-existing user account in response to receiving the authentication token. Various other methods, systems, and computer-readable media are also disclosed. | 2019-02-14 |
20190050552 | LIGHT SEQUENCED CARD VALIDATION - A multi-point validation device includes an elongate rail extending in a generally horizontal direction, a plurality of radio frequency antennas spaced apart along the length of the elongate rail, at least one reader module coupled with the plurality of radio frequency antennas, at least one visual indicator associated with each of the plurality of antennas and positioned proximate a corresponding one of the antennas, a processor, and a memory. The memory stores instructions that cause the processor to activate a single one of the radio frequency antennas, cause an indication that the single one of the radio frequency antennas is active to be produced by the at least one visual indicator associated with the single one of the radio frequency antennas, and receive data, at the at least one reader module, from at least one access media via the single one of the radio frequency antennas. | 2019-02-14 |
20190050553 | SYSTEM AND METHOD FOR PIN ENTRY ON MOBILE DEVICES - A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device that are connected via a data communication link. The mobile computing device includes a mobile application and a display and the mobile application runs on the mobile computing device and displays a grid on the mobile computing device display. The peripheral device includes a display and an encryption engine, and the peripheral device display displays a grid corresponding to the grid displayed on the mobile computing device display. Positional inputs on the mobile computing device grid are sent to the peripheral device and the peripheral device decodes the positional inputs into PIN digits and generates an encrypted PIN and then sends the encrypted PIN back to the mobile computing device. | 2019-02-14 |
20190050554 | LOGO IMAGE AND ADVERTISING AUTHENTICATION - Methods and systems described herein perform a method or system of authentication. In some embodiments, the system of authentication uses visual images and/or text phrases that advertise an institution, person, product or service. In some embodiments, a display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. | 2019-02-14 |
20190050555 | Enforcing Trusted Application Settings for Shared Code Libraries - Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API. | 2019-02-14 |
20190050556 | SYSTEM, METHOD, AND PROGRAM FOR PROVIDING VIRTUAL CODE, VIRTUAL CODE GENERATING DEVICE, AND VIRTUAL CODE VERIFYING DEVICE - A system, a method, and a program for providing a virtual code, a virtual code generating device, and a virtual code verifying device are provided. The method includes receiving, by a virtual code verifying means, a virtual code from a virtual code generating means, extracting, by the virtual code verifying means, a plurality of detailed codes included in the virtual code, and searching for, by the virtual code verifying means, a storage location of a real code based on the plurality of detailed codes. | 2019-02-14 |
20190050557 | METHODS AND SYSTEMS FOR MANAGING PASSWORD USAGE IN A SYSTEM FOR SECURE USAGE OF SHARED ACCOUNTS - A method for managing password usage in a system for secure usage of shared accounts includes generating, by a password manager executing on a first computing device, a first credential assigned to a first user, the first credential used for accessing a first user account in an application executing on a second computing device. The method includes transferring, by the password manager, ownership of the first credential from the first user to a second user. The method includes receiving, by the password manager, over a network, a request from the first user to access the first credential. The method includes verifying, by the password manager, ownership of the first credential by the second user. The method includes denying, by the password manager, the request from the first user. | 2019-02-14 |
20190050558 | SYSTEM, METHOD AND APPARATUS FOR AUTOMATIC PROGRAM COMPARTMENTALIZATION - The disclosed embodiments relate to system, method and apparatus to compartmentalize information in a program so as to protect against malware. In one embodiment, the disclosed provides a compiler that is enhanced to automatically define multiple compartments within a program based on the data sets that they access. The disclosed embodiments may be implemented at a compiler and certain embodiments may be referred to as compartmentalizing compiler. For each data set, an exemplary compartmentalizing compiler separates program elements that need direct access to the data set from those that do not and it defines a boundary around the data set and the program elements that need to access it. In certain embodiments, other portions of the program may still need to invoke the compartment. Thus, the disclosure also generates interface routines to copy data back and forth through the compartment boundary. | 2019-02-14 |
20190050559 | IDENTIFICATION OF VISUAL INTERNATIONAL DOMAIN NAME COLLISIONS - Various embodiments of the invention disclosed herein provide techniques for detecting a homograph attack. An IDN collision detection server retrieves a first domain name that includes a punycode element. The IDN collision detection server converts the first domain into a second domain name that includes a Unicode character corresponding to the punycode element. The IDN collision detection server converts the second domain name into an image. The IDN collision detection server performs one or more optical character recognition operations on the image to generate a textual string associated with the image. The IDN collision detection server determines that the textual string matches at least a portion of a third domain name. | 2019-02-14 |
20190050560 | SYSTEMS AND METHODS FOR AUDITING ISOLATED COMPUTING ENVIRONMENTS - The techniques described herein enable client APIs to be deployed within isolated computing environments while externally exposing and/or maintaining a log of computing events that the client APIs perform and/or attempt to perform within the isolated computing environments. Generally described, configurations disclosed herein enable audit parameters associated with client application programming interfaces (APIs) to be deployed within an isolated computing environment to generate a log of computing events performed by the client APIs. Ultimately, access to the log of computing events is provided externally to the isolated computing environment without exposing sensitive computing resources (e.g., a host operating system (OS)) to the various client APIs. | 2019-02-14 |
20190050561 | INTER-APPLICATION DEPENDENCY ANALYSIS FOR IMPROVING COMPUTER SYSTEM THREAT DETECTION - A method and system are provided for improving threat detection in a computer system by performing an inter-application dependency analysis on events of the computer system. The method includes receiving, by a processor operatively coupled to a memory, a Tracking Description Language (TDL) query including general constraints, a tracking declaration and an output specification, parsing, by the processor, the TDL query using a language parser, executing, by the processor, a tracking analysis based on the parsed TDL query, generating, by the processor, a tracking graph by cleaning a result of the tracking analysis, and outputting, by the processor and via an interface, query results based on the tracking graph. | 2019-02-14 |
20190050562 | PATH-BASED PROGRAM LINEAGE INFERENCE ANALYSIS - Systems and methods are disclosed for securing an enterprise environment by detecting suspicious software. A global program lineage graph is constructed. Construction of the global program lineage graph includes creating a node for each version of a program having been installed on a set of user machines. Additionally, at least two nodes are linked with a directional edge. For each version of the program, a prevalence number of the set of user machines on which each version of the program had been installed is determined; and the prevalence number is recorded to the metadata associated with the respective node. Anomalous behavior is identified based on structures formed by the at least two nodes and associated directional edge in the global program lineage graph. An alarm is displayed on a graphical user interface for each suspicious software based on the identified anomalous behavior. | 2019-02-14 |
20190050563 | VISUALIZATION OF ASSOCIATIONS AMONG DATA RECORDS IN A SECURITY INFORMATION SHARING PLATFORM - Examples disclosed herein relate to visualization of associations among data records in a security information sharing platform. Some examples may enable creating, in the security information sharing platform, an association between a first data record comprising a security indicator, and a second data record. Some examples may further enable providing a visual representation of the first data record, the second data record, and the association, wherein the first data record represents a first node in the visual representation, the second data record represents a second node in the visual representation, and the association represents an edge that connects the first node and the second node. | 2019-02-14 |
20190050564 | PROTECTION FOR INFERENCE ENGINE AGAINST MODEL RETRIEVAL ATTACK - An embodiment of a semiconductor package apparatus may include technology to perform run-time analysis of inputs and outputs of a machine learning model of an inference engine, detect an activity indicative of an attempt to retrieve the machine learning model based on the run-time analysis, and perform one or more preventive actions upon detection of the activity indicative of the attempted model retrieval. Other embodiments are disclosed and claimed. | 2019-02-14 |
20190050565 | PROTECTIVE METHOD OF AN ELECRONIC DEVICE AGAINST ATTACKS BY FAULT INJECTION - The present invention relates to a method for protection of an electronic device (1) against attacks by fault injection, the method comprising steps of
| 2019-02-14 |
20190050566 | TECHNOLOGIES FOR CONTROL FLOW EXPLOIT MITIGATION USING PROCESSOR TRACE - Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a process, the processor generates trace data indicative of control flow of the process. The computing device analyzes the trace data to identify suspected control flow exploits. The computing device may use heuristic algorithms to identify return-oriented programming exploits. The computing device may maintain a shadow stack based on the trace data. The computing device may identify indirect branches to unauthorized addresses based on the trace data to identify jump-oriented programming exploits. The computing device may check the trace data whenever the process is preempted. The processor may detect mispredicted return instructions in real time and invoke a software handler in the process space of the process to verify and maintain the shadow stack. Other embodiments are described and claimed. | 2019-02-14 |
20190050567 | SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES FOR DETECTION OF MALICIOUS FILES BASED ON MACHINE LEARNING MODEL - The present disclosure provides a system for managing computer resources for detection of malicious files based on machine learning model. In one aspect, the system may comprise: a hardware processor configured to: form at least one behavior pattern on the basis of commands and parameters, calculate the convolution of the formed behavior pattern, calculate the degree of harmfulness the convolution and a model for detection of malicious files, manage the computing resources used to ensure the security of that computing device, based on the degree of harmfulness, wherein the degree of harmfulness is within a predetermined range of values and if the obtained degree of harmfulness of applications exceeds the predetermined threshold value, send a request to allocate additional resources of the computing device, otherwise send a request to free up previously allocated resources of the computing device. | 2019-02-14 |
20190050568 | PROCESS SEARCH APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM - An activity process list ( | 2019-02-14 |
20190050569 | SYSTEMS AND METHODS OF PROCESSING DATA ASSOCIATED WITH DETECTION AND/OR HANDLING OF MALWARE - The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples. | 2019-02-14 |
20190050570 | COMPUTER RESOURCE ACCESS CONTROL BASED ON THE STATE OF A NON-ACCESSING COMPONENT - A processor is configured to assess the state of a first component of a computing system, and then control whether a second component can access a third component based on the state of the first component to, e.g., mitigate malicious attacks that would exploit changes to the third component. In one example, the computing system includes multiple central processing units (CPUs), at least one of which is equipped to operate in a secure mode for executing secure code that may access sensitive information such as cryptographic keys. In the example, non-secure code is blocked and/or delayed from accessing clock or voltage control registers when any of the CPUs of the system is running secure code. This prevents non-secure code from causing transient faults when secure code is running In some examples, the registers are locked using a global secure-side lock. The lockable registers are referred to herein as grey-list registers. | 2019-02-14 |
20190050571 | AUTOMATED SOFTWARE SAFENESS CATEGORIZATION WITH INSTALLATION LINEAGE AND HYBRID INFORMATION SOURCES - Systems and methods are disclosed for enhancing cybersecurity in a computer system by detecting safeness levels of executables. An installation lineage of an executable is identified in which entities forming the installation lineage include at least an installer of the monitored executable, and a network address from which the executable is retrieved. Each entity of the entities forming the installation lineage is individually analyzed using at least one safeness analysis. Results of the at least one safeness analysis of each entity are inherited by other entities in the lineage of the executable. A backtrace result for the executable is determined based on the inherited safeness evaluation of the executable. A total safeness of the executable, based on at least the backtrace result, is evaluated against a set of thresholds to detect a safeness level of the executable. The safeness level of the executable is output on a display screen. | 2019-02-14 |
20190050572 | OPERATING SYSTEM BASED AUTHENTICATION - Methods, systems, and computer program products are included for authenticating computing devices. An exemplary method includes associating a security key with an operating system of a first computing device, wherein the security key is generated from a serial number corresponding to the first computing device. A token corresponding to the security key is sent to a second computing device. The token is accessed by the second computing device to authenticate the first computing device. An authenticated session is established between the first computing device and the second computing device. Within the authenticated session, a connection is provided between the first computing device and the second computing device. | 2019-02-14 |
20190050573 | SECURE BOOT PROCESSOR WITH EMBEDDED NVRAM - A processor semiconductor chip is described. The processor semiconductor chip includes at least one processing core. The processor semiconductor chip also includes a memory controller. The processor semiconductor chip also includes an embedded non flash non-volatile random access memory having a stack of storage cells disposed above the processor semiconductor chip's semiconductor substrate. The embedded non-volatile random access memory is to store boot up program code that, when executed by the processor semiconductor chip, is to analyze a subsequent module of program code so that a maliciously modified version of the subsequent module of program code can be identified. The embedded non-volatile random access memory to also store the subsequent module of program code. | 2019-02-14 |
20190050574 | AUTOMATIC IMPACT DETECTION AFTER PATCH IMPLEMENTATION WITH ENTRY POINT FINDER - A computer-based method is disclosed for assessing impact of a patch on a target business-critical application computer system. The method includes receiving information at a computer-based impact assessment system about end-user activities on the target business-critical application computer system over a specified period of time; identifying, with a computer-based fixed objects identifier, one or more software objects in the target business-critical application computer system fixed by the patch; identifying, with a computer-based entry point finder, one or more entry points associated with the fixed software object(s) at the target business-critical application system; and cross-referencing the information about the end-user activities on the target business-critical application system against the one or more entry points associated with the fixed software object(s) at the target business-critical application system. The cross-referencing may reveal which of the entry points associated with the fixed software object(s) also have been used by the end-users of the target business-critical application system during the specified time period. | 2019-02-14 |
20190050575 | CHECKING FOR UNNECESSARY PRIVILEGES WITH ENTRY POINT FINDER - A computer-based method is disclosed for checking a target computer system for unnecessary privileges. The method includes receiving, at a computer-based privileges checking system, a listing of all privileges available the target computer system; receiving, at the computer-based privileges checking system, information about end-user activities on the target computer system over a specified period of time; for each respective one of the end-user activities, querying a computer-based entry point finder for any privileges that were checked at the target system for that activity; and removing the privileges that were checked at the target system for the end-user activities from the listing of all privileges available at the target system to produce a listing of unnecessary privileges at the target system. | 2019-02-14 |
20190050576 | GENERATING SECURITY MANIFESTS FOR SOFTWARE COMPONENTS USING BINARY STATIC ANALYSIS - Systems, methods, and software can be used to generating security manifests for software components using binary static analysis. In some aspects, one computer-implemented method includes performing a binary static analysis of a binary software component to determine one or more security characteristics of the binary software component; generating a security manifest for the binary software component including the determined one or more security characteristics of the binary software component; and providing the security manifest to a software management system configured to determine whether to deploy the binary software component based on the security manifest. | 2019-02-14 |
20190050577 | SYSTEM AND METHOD OF ENSURING SECURE CHANGING OF SYSTEM CONFIGURATIONS - A system and method is provided for changing parameter values of a computer system without changing security properties. An exemplary method includes receiving a request to change a system configuration of the computer system and identifying a parameter relating to system configurations based on the received request. Furthermore, based on the identified parameter, the method includes receiving instructions to change the identified at least one parameter and initiating a transaction to change the identified at least one parameter based on the received instructions. The initiated transaction is then analyzed to determine whether the change to the parameter will lower a security level of the computer system. If not, the method will execute the change of the identified parameter related to the system configuration. | 2019-02-14 |
20190050578 | APPARATUS AND METHOD FOR ASSESSING CYBERSECURITY VULNERABILITIES BASED ON SERIAL PORT - An apparatus and method for assessing cybersecurity vulnerabilities based on a serial port. The apparatus includes a vulnerability DB for storing vulnerability assessment items, a communication unit for configuring an environment for serial communication with an assessment target device and configuring a network environment, a vulnerability scanning unit for selecting a vulnerability assessment item for which cybersecurity vulnerability assessment is to be performed on the assessment target device, and performing scanning for checking the selected vulnerability assessment item on the assessment target device, a response analysis unit for analyzing a response of the assessment target device to the scanning, and setting one or more of an operating system, an application, and a protocol corresponding to the assessment target device, and a vulnerability presence determination unit for determining, using the set one or more of the operating system, application, and protocol, whether a vulnerability is present. | 2019-02-14 |
20190050579 | ENTRY POINT FINDER - A computer-based method of analyzing a business-critical application computer system includes extracting a plurality of software objects from the business-critical application computer system, storing the extracted software objects in a computer-based search platform, finding relationships between the extracted software objects that are stored in the computer-based search platform, and creating a database that represents the extracted software objects and the relationships between the extracted software objects. Each software object (a unique piece of code, a file, a data string, or other aspect of the business-critical application computer system) may represent an element of the business-critical application computer system whose graphical representation as a node connected to another node based on relationships, functional or otherwise, between the corresponding elements is desirable in view of a particular goal of the analysis. | 2019-02-14 |
20190050580 | SURVEILLANCE CAMERA SYSTEM AND RELATED SURVEILLANCE SYSTEM THEREOF - A surveillance camera system includes a camera and an image recorder. The image recorder receives a plurality of images captured by the camera and selectively encrypting the plurality of images captured by the camera to generate an encrypted file. | 2019-02-14 |
20190050581 | TECHNIQUES FOR ENCLAVE CONFIDENTIALITY MANAGEMENT - Various embodiments are generally directed to techniques for enclave confidentiality management, such as for protecting cross enclave confidentiality on servers, for instance. Some embodiments are particularly directed to a computing platform including hardware and/or instruction set architecture (ISA) extensions that ensure enclaves cannot access confidential data of other enclaves. For example, key programming ISA extensions and/or hardware changes to the page miss handler (PMH) may ensure that the key uniquely associated with an enclave is used for its memory accesses. | 2019-02-14 |
20190050582 | GENERATING FILES HAVING COLUMN-ORIENTED LAYOUTS - A computer-implemented method is provided herein of generating a file having a column-oriented layout and having a file header and a data block. The method includes a step of inserting length information of an encryption vector into the data block; a step of inserting the encryption vector into the data block; and a step of inserting data array of the encrypted column after referring to the encryption vector. | 2019-02-14 |
20190050583 | MULTI-LEVEL ACCESS CONTROL FOR DISTRIBUTED STORAGE SYSTEMS - System and method for accessing a distributed storage system uses a storage-level access control process at a distributed file system that interfaces with the distributed storage system to determine whether a particular client has access to a particular first file system object using an identifier of the particular client and storage-level access control rules in response to a file system request from the particular client to access a second file system object in the particular first file system. The storage-level access control rules are defined for a plurality of clients and a plurality of first file system objects of the distributed storage system to allow the particular client access to the second file system object in the particular first file system object only if the particular client has been determined to have access to the particular first file system object according to the storage-level access control rules. | 2019-02-14 |
20190050584 | COLLECTION FOLDER FOR COLLECTING AND PUBLISHING FILE SUBMISSIONS - A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions. Once collected, the collector can publish the files thereby allowing the submitters access to the published files. | 2019-02-14 |
20190050585 | Security Systems GUI Application Framework - A method, system and computer-usable medium are disclosed for injecting functionality into a security intelligence platform, comprising: providing the security intelligence platform with a plurality of backend endpoints; generating a modification to the security intelligence platform according to an application framework, the modification comprising metadata associated with functionality, the metadata corresponding to a predefined format; and, merging the modification with the security intelligence platform via a secure container system container. | 2019-02-14 |
20190050586 | SECURE RELEASE OF PRINT JOBS IN PRINTING DEVICES - In one example, a method is disclosed in which a key is generated in a client device when a print job is triggered at the client device. The key and the print job are provided to a printing device. Further, a first thumbnail of a page of the print job is generated in the client device. The page is determined as a function of the key. A first secure image is generated in the client device using the key and the first thumbnail. The first secure image is shared with the printing device. The first secure image is verified by the printing device using the provided key and then the print job is released upon successful verification. | 2019-02-14 |
20190050587 | GENERATING ELECTRONIC AGREEMENTS WITH MULTIPLE CONTRIBUTORS - An electronic signature system includes infrastructure for securely managing document preparation during signing workflows through the assignment of permissions to users that control user actions to add, remove, and/or edit documents in a document package as part of an electronic signing workflow. The permissions may be assigned based on roles given to each user, and used to manage the signing workflow and user accesses to the document package. The electronic signature system determines whether to authorize the contributors to add, remove, and/or edit documents during the workflow according to the assigned permissions of each user. Document metadata is captured that identifies users and/or user groups associated user actions on particular documents. Access to those documents may be restricted using the document metadata. Once the document package is prepared, the document package is provided to a signer for review and for an electronic signature of documents of the document package. | 2019-02-14 |
20190050588 | SELF-CONFIGURING EXPERTISE VERIFICATION - A computer-implemented method includes detecting initiation of submission of content on a forum. Using a computer processor, an expertise associated with the content is determined. Using the computer processor, challenge data is determined based at least in part on the expertise. Using the computer processor, expected response data corresponding to the challenge data is determined. The challenge data is presented. An entered response is received in reply to the challenge data. The content is allowed to be posted on the forum based at least in part on comparing the entered response data to the expected response data. | 2019-02-14 |
20190050589 | SYSTEM AND ARCHITECTURE FOR SUPPORTING ANALYTICS ON ENCRYPTED DATABASES - A method is provided for generating an encrypted database. The method includes: receiving a plaintext database having plaintext data entries in one or more columns; augmenting the received plaintext database to generate an augmented plaintext database, the augmenting including the addition of one or more columns to the received plaintext database, each added column corresponding to an attribute which is to be made available for conditional queries; and encrypting the augmented plaintext database to generate the encrypted database including encrypted data entries. The encrypted database supports at least one form of conditional query for those attributes corresponding to the added columns, the at least one form of conditional query being computed on the encrypted data entries without the decryption thereof to produce an encrypted result. | 2019-02-14 |
20190050590 | Ensuring Information Security by Utilizing Encryption of Data - Systems for ensuring data security when processing events through various channels are provided. The system may receive a request to process an event. An event processing device identifier may be extracted from the event processing device and encrypted using a first encryption process. The system may receive user identifying information, such as a personal identification number (PIN). The user identifying information may be encrypted with the encrypted event processing device identifier in a second encryption process. The encrypted data may be transmitted for authentication of the user and/or authorization to process the event. A second decryption process may be used to decrypt the encrypted user identifying information and encrypted event processing device identifier. A first encryption process may be used to decrypt the encrypted event processing device. The decrypted information may be used to authenticate the user and/or process the event. | 2019-02-14 |
20190050591 | SYSTEM AND ARCHITECTURE FOR ANALYTICS ON ENRYPTED DATABASES - A method is provided for generating an encrypted database. The method includes: receiving a plaintext database having plaintext data entries therein; and generating an encrypted database using the plaintext database, the encrypted database including encrypted data entries therein. The encrypted database is configured to support at least one form of conditional query such that the at least one form of conditional query returns a correct encrypted result when the query is computed on the encrypted data entries without the decryption thereof. | 2019-02-14 |
20190050592 | SYSTEMS AND METHODS FOR PROCESSING AND HANDLING PRIVACY-SENSITIVE IMAGE DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for handling data including images with privacy-sensitive data. In one aspect, a method may include recognizing privacy-sensitive sub-image(s) in an acquired or captured image. The sub-image(s) can be included in a second image that is encrypted. The acquired image can be changes by obscuring the privacy-sensitive sub-image(s) of the acquired image so as not to reveal any personal identifiable information. | 2019-02-14 |
20190050593 | SECURE ACCESS TO INDIVIDUAL INFORMATION - A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device. | 2019-02-14 |
20190050594 | ACCESS CONTROL METHOD AND TERMINAL DEVICE - An access control method and a terminal device are disclosed. The method includes: receiving an unlock password after receiving an instruction for opening an application program; determining an access type corresponding to the unlock password; obtaining display information corresponding to the access type among current display information of the application program; and displaying the obtained display information. An access type is distinguished according to an unlock password, and display information is determined according to the access type, so that the display information can match the unlock password input by a user, and the user can flexibly and secretly control information to be displayed, thereby preventing a risk that private or other important information of the user is seen by a visitor and improving information security. | 2019-02-14 |
20190050595 | DATA PROCESSING SYSTEMS FOR USE IN AUTOMATICALLY GENERATING, POPULATING, AND SUBMITTING DATA SUBJECT ACCESS REQUESTS - Computer systems and methods for: (1) analyzing electronic correspondence associated with a data subject (e.g., the emails within one or more email in-boxes associated with the data subject); (2) based on the analysis, identifying at least one entity that that the data subject does not actively do business with (e.g., as evidenced by the fact that the data subject no longer opens emails from the entity, and/or has set up a rule to automatically delete emails received from the entity); and (3) in response to identifying the entity as an entity that the data subject no longer does business with, at least substantially automatically populating and/or submitting a data subject access request to the entity (e.g., to delete all personal information being processed by the entity). | 2019-02-14 |
20190050596 | DATA PROCESSING SYSTEMS FOR IDENTIFYING, ASSESSING, AND REMEDIATING DATA PROCESSING RISKS USING DATA MODELING TECHNIQUES - In various embodiments, a Data Model Adaptive Execution System may be configured to take one or more suitable actions to remediate an identified risk in view of one or more regulations (e.g., one or more legal regulations, one or more binding corporate rules, etc.). For example, in order to ensure compliance with one or more standards related to the collection and/or storage of personal data, an entity may be required to modify one or more aspects of a way in which the entity collects, stores, and/or otherwise processes personal data (e.g., in response to a change in a legal or other requirement). In order to identify whether a particular change or other risk trigger requires remediation, the system may be configured to assess a relevance of the risk posed by the risk and identify one or more processing activities or data assets that may be affected by the risk. | 2019-02-14 |
20190050597 | DATA PROCESSING SYSTEMS FOR WEBFORM CRAWLING TO MAP PROCESSING ACTIVITIES AND RELATED METHODS - In particular embodiments, a Data Access Webform Crawling System is configured to: (1) identify a webform used to collect one or more pieces of personal data; (2) robotically complete the identified webform; (3) analyze the completed webform to determine one or more processing activities that utilize the one or more pieces of personal data collected by the webform; (4) identify a first data asset in the data model that is associated with the one or more processing activities; (5) modify a data inventory for the first data asset in the data model to include data associated with the webform; and (6) modify the data model to include the modified data inventory for the first data asset. | 2019-02-14 |
20190050598 | SECURE DATA STORAGE - A method and apparatus for storing data and performing logical comparisons and other operations on said data, the results of said comparisons and operations reveal only limited information about the stored data. Stored data may include, but is not limited to, confidential information such as passwords, biometric data, credit card data, personal identifiers that uniquely identify an individual, authorisation levels where an entity may make a claim to have a certain level of access right or authorisation, votes cast in an election, and encryption keys. Control logic within the apparatus prevents direct access to the data store other than via a restricted command interface which prevents data from being revealed. For example, operations such as checking a putative password against a password in the data store is performed by the apparatus which returns a pass or fail, but does not reveal the stored password. | 2019-02-14 |
20190050599 | METHOD AND DEVICE FOR ANONYMIZING DATA STORED IN A DATABASE - A method is provided to anonymize “initial” data stored in a database of a computer system and resulting from aggregating personal data relating to a plurality of individuals. The method includes: an identification act identifying in the initial data a set of data that is “sensitive” that would be affected by personal data relating to one individual being added to or removed from the database; a partitioning act partitioning the sensitive data set into a plurality of subsets as a function of a sensitivity level of the sensitive data; a determination act determining a sensitivity level for each subset; and an anonymization act anonymizing the initial data and including, for each subset, adding noise to the sensitive data of that subset with a noise level that depends on the sensitivity level determined for the subset. | 2019-02-14 |
20190050600 | MASKING DISPLAY OF SENSITIVE INFORMATION - An attempt by a particular program on a computing device to present a particular message on the computing device is detected. Prior to presentation of the particular message on the graphical display, the contents of the particular message are scanned to determined that at least a portion of the content of the particular message includes sensitive information. The content of the particular message is modified to generate a masked version of the particular message, where the masked version masks the portion of the content. The masked version of the particular message is allowed to be presented on the graphical display based on determining that the particular message includes the sensitive information. | 2019-02-14 |
20190050601 | CRYPTOGRAPHIC CIRCUIT AND DATA PROCESSING - A method for cryptographic data processing by means of a circuit comprises using a first circuit section to perform a first cryptographic operation in order to obtain first cryptographic data. The method further includes transmitting the first cryptographic data to a second circuit section via a transmission area of the circuit that physically separates the second circuit section from the first circuit section and whose resistance to attacks is at most as high as the resistance of the first circuit section. The method includes using the second circuit section to perform a second cryptographic operation using the first cryptographic data in order to obtain second cryptographic data. | 2019-02-14 |
20190050602 | Non-volatile Memory Device With Secure Read - Technology that provides security for a requestor of data stored in a non-volatile memory device is disclosed. In one aspect, the non-volatile memory device provides data on a host interface only if a digest for the data matches an expected digest for the data. The non-volatile memory device may store expected digests for data for various logical addresses. Upon receiving a request on the host interface to read data for a logical address, the non-volatile memory device may access the data for the logical address, compute a digest for the accessed data, and compare the computed digest with the expected digest. The non-volatile memory device provides the accessed data on the host interface only if the computed digest matches the expected digest, in one aspect. The non-volatile memory device may be used to provide a secure boot of a host. | 2019-02-14 |
20190050603 | PROGRAMMABLE DEVICE AUTHENTICATION DECRYPTION - Integrated circuit devices and methods include utilizing security features including authenticating incoming data by receiving one or more hash blocks each including multiple hash sub-blocks. Authenticating also includes receiving encrypted data including multiple data sub-blocks. Authenticating also includes authenticating a first hash block of the one or more hash blocks using a root hash of an integrated circuit device. Authenticating further includes authenticating each of the multiple data sub-blocks using a corresponding hash sub-block of the multiple hash sub-blocks. | 2019-02-14 |
20190050604 | ON-DEVICE BITSTREAM VALIDATION - A programmable logic device verifies that configuration data permissibly programs the programmable logic device. The programmable logic device includes a programmable fabric having partitions to be programmed by the configuration data, a secure device manager that may generate masks based on the configuration data, and a local sector manager. The masks determine that the configuration data is configured to permissibly program the permitted partitions or that the permitted partitions have been permissibly programmed. The local sector manager applies the masks to generate an interleaved result, compares the interleaved result to an expected result, and sends an indication that the configuration data is configured to permissibly program the permitted partitions or permissibly programmed the permitted partitions in response to determining that the interleaved result is the expected result, or sends an alert to stop programming in response to determining that the interleaved result is not the expected result. | 2019-02-14 |
20190050605 | FLEXIBLE CRYPTOGRAPHIC DEVICE - A method of programming a device comprising acquiring configuration data, loading the configuration data onto a programmable device, processing at least a portion of the configuration data through a one way function to form processed configuration data, and configuring at least one configurable module of the programmable device using the processed configuration data from the processing step. | 2019-02-14 |
20190050606 | DETECTING CAMERA ACCESS BREACHES - Examples disclosed herein relate to detecting camera access breaches by an application running on a computing device. The examples enable determining, by a computing device comprising a physical processor that implements machine readable instructions, that a type of camera access of a camera on a computing device is requested by an application running on the computing device, wherein the type of camera access comprises a photo, a video, a facial recognition, a bar code scanning, or object detection; determining, by the computing device and based on a set of camera access types associated with the application, whether the requested type of camera access is permitted; and responsive to determining that the requested type of camera access is not permitted, remediating the unpermitted camera access request by causing display, by the computing device, of an alert on the computing device, where the alert comprises information about an improper access of the camera by the application. | 2019-02-14 |
20190050607 | USB DEVICE FILTERING - Example implementations relate to USB device filtering. An example controller can receive a request to accept a USB device class from a USB device, filter device functions of the USB device class based on a comparison of the filtered device functions to a function filter list, and based on the comparison, pass a first device function onto an associated operating system or block a second device function from recognition by the associated operating system. | 2019-02-14 |
20190050608 | METHOD, APPARATUS AND SYSTEM FOR TRANSPARENT TRACKING OF WORKER PERFORMANCE - A method, system and device are provided that collect and provide information related to worker productivity. The goods may be or include consumer products, commodities, equipment, food, food products, agricultural supplies and agricultural products. A label may be employed that includes a display screen, a bar code, a quick response code, an RFID chip and/or a radio frequency or photonic communications device to aid tracking of accomplished piecework and worker behavior. The worker may confirm documentation of piecework credit by both displays of piecework counts by the badge and by accessing a database server. | 2019-02-14 |