10th week of 2022 patent applcation highlights part 48 |
Patent application number | Title | Published |
20220075790 | DYNAMIC VALUATION SYSTEM USING OBJECT RELATIONSHIPS AND COMPOSITE OBJECT DATA - The disclosed embodiments relate to systems and methods for generating an optimal solution for determining a value for one or more base data objects. A plurality of solutions include one or more composite data objects transacted by a transaction system processor. The composite data objects include the one or more base data objects. An optimal solution is generated by using data indicative of a level of activity and a number of sources for each of the plurality of composite data objects. | 2022-03-10 |
20220075791 | STORING DATA ITEMS AND IDENTIFYING STORED DATA ITEMS - In one aspect, a data item is written to a data chunk of a stream segment. The stream segment includes a stream segment header and a plurality of data chunks. A first identifier of the data item is written to the stream segment header of the stream segment. A second identifier of the data item is written to a header of the data chunk of the stream segment. In another aspect, a stream segment header of a stream segment is queried with a query identifier. The querying identifies if any of the data items in the data chunks of the stream segment have the query identifier. If any of the data items in the data chunks of the stream segment have the query identifier, the data chunks of the stream segment are queried with the query identifier to identify which data chunks of the stream segment have the query identifier. | 2022-03-10 |
20220075792 | CONTINUOUSLY SCROLLABLE CALENDAR USER INTERFACE - A method is provided to scroll a calendar user interface (UI) comprising: displaying on a device display screen a visible range of a calendar UI, wherein the calendar UI includes a display grid that includes individual date display panes that are associated with individual dates, wherein the date panes are arranged in rows corresponding to weeks and columns corresponding to days of the week and wherein the visible range of the calendar UI includes multiple rows of date panes; receiving user input to indicate a scroll direction in which to scroll the display grid to display a different date range that includes earlier or later date display panes; and in response to the user input, scrolling the calendar UI by rows to the different date range. | 2022-03-10 |
20220075793 | Interface Analysis - This invention translates input information (such as a data set, API, or document) into a format that is interface-compliant (meaningful/explanatory/descriptive/generative/predictive), returning output (such as insights, patterns, functions, definitions, meaning, cause, structure, etc), according to a supported interface analysis intent that was input by the user or derived. | 2022-03-10 |
20220075794 | SIMILARITY ANALYSES IN ANALYTICS WORKFLOWS - Examples include bypassing a portion of an analytics workflow. In some examples, execution of an analytics workflow may be monitored upon receipt of a raw data and the execution may be interrupted at an optimal bypass stage to obtain insights data from the raw data. A similarity analysis may be performed to compare the insights data to a stored insights data in an insights data repository. Based, at least in part, on a determination of similarity, a bypass operation may be performed to bypass a remainder of the analytics workflow. | 2022-03-10 |
20220075795 | IN-FLIGHT TRANSFORMATIONS OVER A DATA STREAM - Disclosed herein are system, method, and computer program product embodiments for performing in-flight transformations of data streams. Complex event processing (CEP) operating on event records from various data streams can operate by storing the streamed event record data in a database, and then querying the data to perform a data transformation. However, in order to improve the performance of the data transformations and streamline CEP, a serverless architecture is introduced that can perform data transformations directly on streams, using attributes of the streamed record data defined in a schema. The resulting transformed data can then be provided by the serverless architecture to the CEP for direct access of the data most needed by the CEP. | 2022-03-10 |
20220075796 | ARCHITECTURE FOR DATA MAP CONVERTERS - A reusable converter framework provides a set of tools for (1) loading existing data formats and transformation instructions of a source technology and (2) enabling the result of step (1) to be queried through Java code and analyzed. The source technology may follow a particular data transformation strategy such as data-drive, script-driven, or query driven. The reusable converter framework has a Java representation, referred to herein as an interpreted form, that can hold the information of a target technology, which follows a different data transformation strategy. The source and target technologies operate on different computing platforms having different computing environments. The interpreted form is utilized in step (3) to streamline and optimize the information from step (2) and produce a working data map suitable for the target technology. | 2022-03-10 |
20220075797 | Systems and Methods for Enabling Situational Awareness for Events Via Data Visualization - Aspects of the present disclosure relate to data visualization, and more specifically, to technology that automatically visualizes various analytics and predictions generated for mass participation endurance events, or other mass participation events of interest. | 2022-03-10 |
20220075798 | ADAPTABLE LEGACY STATEFUL WORKLOAD - Embodiments of the present invention provide a computer system a computer program product, and a method that comprises identifying replicated data within a respective data container in a plurality of data containers based on an indicative marker that reflects replication; calculating an amount of time to interact with the identified replicated data based on an alert threshold that, when triggered, alerts remaining data containers in the plurality of data containers; and synchronizing the identified replicated data within each respective data container such that reduces a wait time to interact with the identified replicated data based on a priority order of the calculated amount of time to interact, wherein the priority order places higher calculated interaction times higher than lower calculated interaction times. | 2022-03-10 |
20220075799 | TERMINAL, STORAGE MEDIUM, AND DATABASE SYNCHRONIZATION METHOD THEREOF - A terminal, a storage medium, and a database synchronization method thereof are disclosed. The database synchronization method includes reading data from a first database and capturing a dynamic data log in the first database; joining data to a waiting queue read from the first database; determining a dislocation category of the data in the waiting queue, and rearranging the dislocation data in the waiting queue into a first category according to the dynamic data log; and synchronizing the rearranged data to a second database. According to the database synchronization method provided by the present invention caches the data read from the first database to the waiting queue, and dislocation data in the waiting queue is rearranged and then synchronized to the second database, so that a problem of poor data identity after database synchronization is avoided. | 2022-03-10 |
20220075800 | SYSTEM AND METHOD FOR COMPUTING AND MANAGING DATASETS USING HIERARCHICAL ANALYTICS - Disclosed are a method and system for propagating data changes in a hierarchy of dataset models in which each dataset model comprises an analytic and one or more parent datasets, including a primordial dataset. The analytic is executed to instantiate a first instance of the data model. After a change in a primordial dataset, each instance of a dataset model that descends from the primordial dataset is invalidated, and the analytic is re-executed to create a second instance of the data model. Analytical results may be displayed. The first dataset model may include a metric in which the definition of the metric comprises metadata of the dataset model. Metric values may be stored in a first cache, re-computed on a new instance of the dataset model, and stored in a second cache. | 2022-03-10 |
20220075801 | Data Classification by On-The-Fly Inspection of Data Transactions - A data classification system includes a proxy and a processor. The proxy is configured to intercept transactions that are conducted over a network between clients and a data store. The processor is configured to construct, based on the intercepted transactions, a classification map including a classification of at least some of the data that is stored in the data store into predefined classes. | 2022-03-10 |
20220075802 | METHOD AND SYSTEM FOR SELECTING TARGET DATA - Disclosed are a method and system for selecting target data. The method of selecting target data may include steps of grouping data included in a database into objects each being a minimum process processing unit based on dependency between tables within the database, setting a selection criterion for target data based on at least one field of the data included in the database, and extracting target data corresponding to the set selection criterion by taking into consideration dependency between tables included in the object. | 2022-03-10 |
20220075803 | GRAPH FRAMEWORK (DATABASE METHODS) TO ANALYZE TRILLION CELL RESERVOIR AND BASIN SIMULATION RESULTS - Systems and methods include a computer-implemented method for generating and using a graph/document structure to store reservoir simulation results. A graph is generated that represents reservoir simulation results of a reservoir simulation performed on a reservoir using a reservoir simulation model. The graph represents a full set of relational data and non-relational data included in the reservoir simulation results. The graph stores graph information and relational data in a graph/document structure. Objects of the reservoir, elements of the reservoir simulation results, and inputs of the reservoir simulation model are represented as vertices in the graph. Relationships between vertices are represented as edges in the graph. An edge is defined by a pair of vertices in the graph. | 2022-03-10 |
20220075804 | METHOD AND DEVICE FOR PROVIDING GUIDE INFORMATION FOR ENHANCEMENT OF ARTIST'S REPUTATION - Disclosed is a method and device for providing guide information for enhancement of an artist's reputation. According to an embodiment of the inventive concept, guide information that may help to positively form an artist's reputation in an artist's main field or a field in which the artist intends to break new ground is provided. Thereby, it is possible to reduce the cost and time required for the artist or the artist's agency to positively form the artist's reputation by providing guide information. | 2022-03-10 |
20220075805 | MEDIUMS, METHODS, AND SYSTEMS FOR CLASSIFYING COLUMNS OF A DATA STORE BASED ON CHARACTER LEVEL LABELING - Exemplary embodiments pertain to new techniques for classifying or labeling organized data. A major impediment to implementing high-quality machine learning is the lack of readily accessible labeled data. In some cases, data can be classified using a classifier, but these solutions can be inaccurate and slow. Exemplary embodiments address the problem of obtaining accurate labeled data in a timely manner by applying a classifier configured to operate on character-level embeddings. Among other advantages, this can help the classifier to recognize information contained within a data unit, such as a cell of a table. The classifier may operate within the organizational structure of the data, such as by operating across a particular row or column of a table. Because data within a particular row or column is often temporally organized (e.g., transactions that are logged in chronological order), row- or column-based approaches can yield more accurate results. | 2022-03-10 |
20220075806 | NATURAL LANGUAGE IMAGE SEARCH - Natural language image search is described, for example, whereby natural language queries may be used to retrieve images from a store of images automatically tagged with image tags being concepts of an ontology (which may comprise a hierarchy of concepts). In various examples, a natural language query is mapped to one or more of a plurality of image tags, and the mapped query is used for retrieval. In various examples, the query is mapped by computing one or more distance measures between the query and the image tags, the distance measures being computed with respect to the ontology and/or with respect to a semantic space of words computed from a natural language corpus. In examples, the image tags may be associated with bounding boxes of objects depicted in the images, and a user may navigate the store of images by selecting a bounding box and/or an image. | 2022-03-10 |
20220075807 | SYSTEMS AND METHODS FOR SHARING DOCUMENTS - Methods and systems for sharing electronic documents are described herein. The example method includes storing the electronic documents in a relational database storage; storing entity identifiers in the relational database storage, each entity identifier representing an entity type; recording in a non-relational database storage associations between the electronic documents and at least one entity identifier, each association comprising a relationship between a set of electronic documents and the at least one entity identifier; associating a delegate account with the at least one entity identifier; and based on an association recorded in the non-relational database storage for the at least one entity identifier, granting the delegate account a subset of document management functions available for the set of documents. | 2022-03-10 |
20220075808 | METHOD FOR DETERMINING COMPETITIVE RELATION OF POINTS OF INTEREST, DEVICE - A method for determining a competitive relation of Points of Interest (POI), and a device are provided in the present disclosure. The specific implementation includes: determining POI representation data between two target POIs based on service-related data of the target POIs; and determining a competitive relation between the target POIs based on the POI representation data. | 2022-03-10 |
20220075809 | BOOTSTRAPPING OF TEXT CLASSIFIERS - Computer-implemented methods and systems are provided for generating training datasets for bootstrapping text classifiers. Such a method includes providing a word embedding matrix. This matrix is generated from a text corpus by encoding words in the text as respective tokens such that selected compound keywords in the text are encoded as single tokens. The method includes receiving, via a user interface, a user-selected set of the keywords a nearest neighbor search of the embedding space is performed for each keyword in the set to identify neighboring keywords, and a plurality of the neighboring keywords are added to the keyword-set. The method further comprises, for a corpus of documents, string-matching keywords in the keyword-sets to text in each document to identify, based on results of the string-matching, documents associated with each text class. The documents identified for each text class are stored as the training dataset for the classifier. | 2022-03-10 |
20220075810 | METHOD AND APPARATUS FOR THE CONVERSION AND DISPLAY OF DATA - A configuration workstation generates configuration tables representative of applications that each comprise one or more object data structures. Each of the object data structures are linked to one or more staging databases that, in turn, obtain data from one or more standalone data sources. Each of the object data structures comprises at least one property that defines available data for the object data structure. The configuration tables are provided to a controller that obtains data from the staging database(s). The controller also causes the obtained data to be converted to the semantic data format and stored in a semantic database. A web server obtains requested semantic data from the semantic database for at least some of the object data structures for an application. The web server then generates a user interface based on the requested semantic data and provides it to a user device for display. | 2022-03-10 |
20220075811 | Media Sequencing Method to Provide Location-Relevant Entertainment - Systems, methods, and computer-program products are described for determining current location information which includes determining whether an object is moving by comparing the current location information with previous location information. Future location information is calculated and a point of interest is filtered using the future location information. A media asset is then matched to the filtered point of interest and a current score is determined for the matched media asset. Determining a current score includes determining a window in which the matched media asset is geographically relevant to the future location information, and updating the matched media asset score when the future location information changes. An ordered playlist is dynamically generated according to the future location information by repeatedly prioritizing and sequencing matched media assets according to the current score for each matched media asset, and matched media assets are played or displayed in the ordered playlist. | 2022-03-10 |
20220075812 | USING CONTENT - Among other things, the ability of people and entities to produce, distribute, and use text, images, video, and other items of digital content is enhanced by providing software tools that enable them to (a) clip items of the digital content on any platform that is capable of presenting the digital content, (b) store copies of the clipped items along with copies of items clipped by other people or entities, in a common storage place controlled by a host, (c) form and store meshes of tags to represent their mindsets about items of content. The tags include primary tags that express their direct observations about the content and secondary tags that express their observations about the primary tags and the secondary tags. Meshes of the tags are made available to the people who formed them and, if permitted by them, to other people and entities for use in understanding their mindsets and in producing, delivering, and using digital content. | 2022-03-10 |
20220075813 | Media Playback Queuing for Playback Management - Management or coordination of playback of digital media assets by an electronic device (e.g., a computing device), that supports media playback is disclosed. According to one embodiment, the electronic device can be controlled such that a user is able to schedule playback of distinct digital media assets. | 2022-03-10 |
20220075814 | DATABASE CREATION AND MANAGEMENT OF MULTIPLE DIGITAL INTERACTIONS - Systems and methods are disclosed for creating a digital interaction database. A first digital interaction dataset can be received. A second input file may be received. The first and second input files may include a plurality of digital records of interaction between individuals recorded by a different providers. In some embodiments, the second provider being different and distinct from the first provider. A digital interaction database may be created from digital records in both the first digital interaction dataset and the second input file. In some embodiments, each digital interaction within the digital interaction database comprises at least a date of the digital interaction, a time of the digital interaction, an identifier associated with the sender of the digital interaction, and an identifier associated with the receiver of the digital interaction. | 2022-03-10 |
20220075815 | IMAGE RETRIEVAL SYSTEM AND IMAGE RETRIEVAL METHOD - An image retrieval system that enables high-accuracy image retrieval in a short time is provided. The image retrieval system includes a processing portion provided with a neural network. The neural network includes a layer provided with a neuron. The processing portion has a function of comparing query image data with a plurality of pieces of database image data, and extracting the database image data including an area with a high degree of correspondence to the query image data as extracted image data. The processing portion has a function of extracting data of the area with a high degree of correspondence to the query image data from the extracted image data, as partial image data. The layer has a function of outputting an output value corresponding to the features of the image data input to the neural network. The processing portion has a function of comparing the above output values in the case where the respective pieces of partial image data are input with the above output value in the case where the query image data is input. | 2022-03-10 |
20220075816 | SYSTEM AND METHOD FOR SHARING ACCIDENT INFORMATION OF VEHICLE - A system for sharing accident information related to a vehicle and a method thereof, may include an accident vehicle that collects accident information and requests an accident image including the accident information, and a server that determines whether the accident image and a request for the accident image are received from the accident vehicle, identifies a reporting vehicle capable of providing a reporting image corresponding to the accident information and the accident image when the accident information and the request for the accident image are received, and requests the reporting vehicle to transmit the reporting image acquired by the reporting vehicle to the accident vehicle. When a vehicle accident occurs, the cause of the accident may be more accurately determined by sharing the surrounding image with vehicles driving around the accident vehicle. | 2022-03-10 |
20220075817 | MULTI-STATE PROGRAMMING OF MEMORY CELLS - The present disclosure includes apparatuses, methods, and systems for multi-state programming of memory cells. An embodiment includes a memory having a plurality of memory cells, and circuitry configured to program a memory cell of the plurality of memory cells to one of a plurality of possible data states by applying a voltage pulse to the memory cell, determining the memory cell snaps back in response to the applied voltage pulse, turning off a current to the memory cell upon determining the memory cell snaps back, and applying a number of additional voltage pulses to the memory cell after turning off the current to the memory cell. | 2022-03-10 |
20220075818 | METHOD FOR CREATING AN ALBUM BY AUTO POPULATING IN REAL TIME BY AN APPLICATION AND SYSTEM THEREOF - The present application discloses a method. for creating an album in real-time by an application, once selecting the titled album; entering camera mode in the application. Text function bar shown within camera mode; ability to contribute personalized text entry while in camera mode before and after captured if needed; capturing the at least one media. Photo, video or text entry, via the application; showing the at least one media with text entries by the application; and automatically, self-populating, in real time, directly into selected album. All entries will have date and time under each entry to ensure the accuracy. In addition, application allows user to invite additional contributors to contribute and capture directly, into the same album at the same time. When the album is finalized, the album may automatically include date of the first and last entry on cover and spine of album, alongside the title. | 2022-03-10 |
20220075819 | AUTOMATED RANKING OF VIDEO CLIPS - Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing at least one program and a method for ranking videos. The program and method include storing, in a database, a plurality of videos; obtaining, for a first of the plurality of videos, first data representing a first interaction performed by a creator of the first video in association with the first video; and obtaining, for the first video, second data representing a second interaction performed by a consumer of the first video in association with the first video. A score is computed for the first video based on the first and second data and the first video is ranked relative to a remaining subset of the plurality of videos by comparing the computed score for the first video with respective scores of videos in the remaining subset of the plurality of videos. | 2022-03-10 |
20220075820 | INTERACTING WITH HIERARCHICAL CLUSTERS OF VIDEO SEGMENTS USING A METADATA SEARCH - Embodiments are directed to techniques for interacting with a hierarchical video segmentation by performing a metadata search. Generally, various types of metadata can be extracted from a video, such as a transcript of audio, keywords from the transcript, content or action tags visually extracted from video frames, and log event tags extracted from an associated temporal log. The extracted metadata is segmented into metadata segments and associated with corresponding video segments defined by a hierarchical video segmentation. As such, a metadata search can be performed to identify matching metadata segments and corresponding matching video segments defined by a particular level of the hierarchical segmentation. Matching metadata segments are emphasized in a composite list of the extracted metadata, and matching video segments are emphasized on the video timeline. Navigating to a different level of the hierarchy transforms the search results into corresponding coarser or finer segments defined by the level. | 2022-03-10 |
20220075821 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a first search unit configured to search for a feature of an object extracted from a video image in a registration list in which a feature indicating a predetermined object to be detected and identification information for identifying the predetermined object are registered, a generation unit configured to generate a first list in which at least the ID information about the predetermined object corresponding to the extracted object is registered in a case where the feature of the extracted object is detected in the registration list and generate a second list in which the feature of the extracted object is registered in a case where the feature of the extracted object is not detected in the registration list, and a second search unit configured to search for a target object designated by a user in the first list or the second list. | 2022-03-10 |
20220075822 | ORDINAL TIME SERIES CLASSIFICATION WITH MISSING INFORMATION - A method classifies missing labels. The method computes, using a neural network model trained on training data, rank-based statistics of a feature of a time series segment to attempt to select two candidate labels from the training data that the segment most likely belongs to. The method classifies the segment using k-NN-based classification applied to the training data, responsive to the two candidate labels being present in the training data. The method classifies the segment by hypothesis testing, responsive to only one candidate label being present in the training data. The method classifies the segment into a class with higher values of the rank-based statistics from among a plurality of classes with different values of the rank-based statistics, responsive to no candidate labels being present in the training data. The method corrects a prediction by an applicable one of the classifying steps by majority voting with time windows. | 2022-03-10 |
20220075823 | SYSTEM AND METHOD FOR PROVIDING IMPROVED INTERFACES FOR DATA OPERATIONS BASED ON A CONNECTIONS GRAPH - A system and method for providing an improved user interface for executing data operations. A method includes: identifying a first node and a second node from different connections graphs, each node representing a respective user account, the user accounts of the first and second nodes sharing at least one common attribute; generating, based on the different connections graphs, an influence indicator for each of the first node and the second node; identifying a data operation executed by the first node on a dataset when the influence indicator of the first node is higher than the influence indicator of the second node, wherein the identified data operation causes generation or retrieval of business intelligence system data when executed; and sending data indicating the identified data operation to a device of the second node, wherein the device is configured to display a user interface including the identified data operation. | 2022-03-10 |
20220075824 | EXPLORABLE VISUAL ANALYTICS SYSTEM HAVING REDUCED LATENCY - A method and system for processing datasets having a number of data points are described. A portion of the dataset is received and processed in parallel. A view on a display is updated to include a first section of the portion of the dataset after the first section completes processing but before a remainder of the portion of the dataset completes processing. In some aspects, the portion of the dataset can include up to one million or more data points. In some aspects, if a change from the view to a second view is received before processing has completed, an unusable part of the dataset is discarded and/or a reusable part of the dataset that has completed processing is reused for the second view. In some aspects, columns of different dataset may be correlated and/or processed data is provided such that the processed data may be rapidly rendered. | 2022-03-10 |
20220075825 | MULTIPLE DEVICES FOR UPDATING REPOSITORIES - Provided is a method including obtaining a first set of queries from an application of a first device for a set of values of a record, determining a numeric boundary based on the set of value, and providing a UI to the first device, where the UI including a UI element displaying the numeric boundary. The method includes obtaining an interface-selected value, obtaining devices using a second set of queries, and obtaining a first location of the first device and a plurality of locations associated with the devices. The process includes selecting a second device of the devices based on distances between the first location and the plurality of locations. The method includes determining whether an authentication value is received from the second device and updating a field of the record based on the interface-selected value in response to receiving the authentication value from the second device. | 2022-03-10 |
20220075826 | CONTACT GENERATIO DEVICE - Techniques for generating a list of selective contacts are described. An address book of the user may be stored on a relational database to free up the memory space occupied by the address book. Further, selection parameters for evaluation of the plurality of contacts are determined. A plurality of contacts is filtered, based on the determined selection parameters, to generate a first set of selective contacts. Thereafter, dynamic filtering parameters are identified and based on the dynamic filtering parameters, the first set of selective contacts are filtered to generate a second set of selective contacts, wherein the second set of selective contacts are stored in the memory space of the device, and wherein the second set of selective contacts are available to the user for utilization for a predetermined time period. | 2022-03-10 |
20220075827 | SYSTEMS AND METHOD FOR GENERATING CONTEXT RELEVANT SEARCH RESULTS - A method of generating search results, comprising; receiving, by a computing system, an instruction to generate search results relating to a SKU stored in a database; extracting, by the computing system, a context based on information relating to the SKU; generating, by the computing system, a dynamic search string, by: generating a key based on the instruction; identifying a dictionary based on the context, the dictionary containing a plurality of dictionary term; and generating the dynamic search string by determining the dictionary term corresponding to the key; searching, by the computing system, using the dynamic search string, in content data; returning results from the content data matching the dynamic search string; and generating for display on a client device, the results. | 2022-03-10 |
20220075828 | METHOD AND APPARATUS FOR DATA SEARCH, SYSTEM, DEVICE AND COMPUTER READABLE STORAGE MEDIUM - The present disclosure provides a data search method, and relates to the field of computer technology. The method includes determining semantic-understanding information corresponding to a received search term by subjecting the search term to semantic understanding; analyzing the semantic-understanding information to obtain timeliness requirement information of the search term; determining an acquisition mode of resource result corresponding to the search term based on the timeliness requirement information of the search term; and obtaining the resource result corresponding to the search term by using the determined acquisition mode. The present disclosure further provides a data search apparatus, a system, a device, and a computer readable storage medium. | 2022-03-10 |
20220075829 | VOICE SEARCHING METADATA THROUGH MEDIA CONTENT - Techniques for searching metadata through media content. User input identifying a search criteria is received from a user device. Metadata associated with media content files is searched to identify a subset of the media content files. Search results identifying the subset of the media content files are provided to the user device. The metadata is generated by an originator of each media content file and describes each scene. | 2022-03-10 |
20220075830 | RESUMABLE ORDERED RECURSIVE TRAVERSAL OF AN UNORDERED DIRECTORY TREE - Described herein are technologies directed to resumable ordered recursive traversal of an unordered directory tree. Using the techniques described herein, a lexicographic listing of stored objects can be efficiently built from a directory tree that is not lexicographically ordered. Furthermore, the techniques provided herein can output an initial partial lexicographic listing of stored objects having a start location and an end location, and later resumed to output a subsequent lexicographic listing of stored objects which begins after the end location. | 2022-03-10 |
20220075831 | DYNAMIC DETECTION OF CROSS-DOCUMENT ASSOCIATIONS - Systems and methods are configured to generate a set of related document objects for a predictive entity and/or to generate an optimal document sequence for a set of related document objects. In one embodiment, a set of related document objects for a predictive entity is generated by processing entity metadata features associated with the predictive entity using an entity-document correlation machine learning model, and an optimal document sequence is generated for the set of related document objects by processing the set of related document objects using a document sequence optimization machine learning model. | 2022-03-10 |
20220075832 | Related Notes And Multi-Layer Search In Personal And Shared Content - Displaying relevant data subsets of at least one data collection includes providing an input data subset, determining a plurality of partial relevance values for different characteristics of each of the plurality of data subsets of the at least one data collection with respect to the input data subset according to a term frequency of terms in the input data subset and term in each of the plurality of data subsets of the at least one data collection and according to an inverse document frequency of the terms, determining a relevance of each of the plurality of data subsets of the at least one data collection based on the partial relevance values of the different characteristics, and displaying at least a portion of the data subsets of the at least one data collection in order of relevance. | 2022-03-10 |
20220075833 | WEB SERVICES FOR DATA AGGREGATION AND APPLICATION FOR PATH TRAVERSAL IN KNOWLEDGE GRAPHS - Embodiments generally relate to real-time profile search interfaces and web services with the ability to real-time search for and view details on entities and visualizations of the network. The computer service enables real-time profile search of entities and performs a sequence of data aggregation heuristics to present a consolidated view of an individual. | 2022-03-10 |
20220075834 | SEMANTIC MEANING ASSOCIATION TO COMPONENTS OF DIGITAL CONTENT - A method, system, apparatus and product for semantic meaning association to components of digital content. The method comprising obtaining a digital content, which comprises multiple visually separated components. The method comprises analyzing at least a portion of the digital content to extract features associated with a component and automatically determining, based on the extracted features, a semantic meaning of the component. The automatic determination is performed without relying on manually inputted hints in the digital content. The method further comprises automatically and without user intervention, performing an action associated with the digital content, wherein the action is determined based on the semantic meaning. | 2022-03-10 |
20220075835 | FEATURE RECOMMENDATION BASED ON USER-GENERATED CONTENT - Provided is a system and method for automated recommendation of new features for addition to an item based on user-generated feedback. In one example, the method may include receiving, via a user interface, a search query associated with an object, retrieving user-generated content that describes the object based on the received search query, identifying, via a machine learning model, one or more features to be added to the object based on the retrieved user-generated content, and outputting identifiers of the one or more features to be added to the object via the user interface. | 2022-03-10 |
20220075836 | System And Method For Identifying Places Using Contextual Information - The present disclosure provides a computing device and method for providing personal specific information based on semantic queries. The semantic queries may be input in a natural language form, and may include user specific context, such as by referring to prior or future events related to a place the user is searching for. With the user's authorization, data associated with prior or planned activities of the user may be accessed and information from the accessed data may be identified, wherein the information is correlated with the user specific context. One or more query results are determined based on the identified information and provided for output to the user. | 2022-03-10 |
20220075837 | METHODS AND SYSTEMS FOR BROWSING TEMPORAL INFORMATION - The preferred embodiments comprise computer-program instructions stored in a temporal-browsing module of non-transient machine-readable memories which, upon effectuation via one or more data processors, execute operations to, in a timeline, (i) retrieve, display, and locomote among indicia of a plurality of temporal information on times superlatively proximate to a present time or time specified; (ii) append a plurality of temporal information on clients bidirectionally therefrom via traversing up or down; and (iii) sequence the plurality of temporal information in accordance with temporal arguments instantiated; and, neighboring or within a calendar, (a) retrieve and display indicia on temporal information on a present or superlatively proximate month and day maintaining temporal information; (b) retrieve and display indicia on temporal information on superlatively proximate posterior and anterior months maintaining temporal information upon generating an event on an indicium; and (c) efface indicia on which events are otherwise generated to traverse towards posterior and anterior months barring temporal information on posterior and anterior months. It will be appreciated by those skilled in the computer-software art that the methods and systems disclosed herein impart efficient temporal-browsing mechanisms, the temporal information browsed relative to a present time or time specified and temporal information appended and traversed towards therefrom. | 2022-03-10 |
20220075838 | TAXONOMY-BASED SYSTEM FOR DISCOVERING AND ANNOTATING GEOFENCES FROM GEO-REFERENCED DATA - Systems and methods for discovering and annotating geo-fences from geo-referenced data are disclosed. The systems and methods input an area of interest containing a plurality of geo-referenced points having associated labels, and divides the area interest into cells. Each cell is assigned an initial label from among the plurality of labels and hierarchical clustering is used to find clusters of cells having a common label based on a maximization of an objective function for each cell with the objective function being dependent upon favoring spatially adjacent cells having a common label and limiting overgeneralization of the common label. | 2022-03-10 |
20220075839 | DIGITAL MULTIMEDIA PINPOINT BOOKMARK DEVICE, METHOD, AND SYSTEM - Embodiments of the inventive concept enable a user to define exactly what and/or where they would like to set a digital pinpoint bookmark, and at a later time, engage the use of the pinpoint bookmark so that they can jump back to the very spot where they left off. In an augmented reality environment, the pinpoint bookmark may point to a real object or a virtual object. In a virtual reality environment, the pinpoint bookmark may point to a virtual object. The pinpoint bookmark is a visual mark that overlays the digital content and that points directly to the spot (i.e., directly to a punctuation mark, letter, word, paragraph, image, video clip, audio clip, real object, virtual object, or the like) so that it is easy and quick for the user to get back to the exact position. The pinpoint bookmark can be cleared using a button. Multiple pinpoint bookmarks across various different personal computing devices associated with a single user can be centrally stored and managed using a remote pinpoint bookmark database. | 2022-03-10 |
20220075840 | DEEP LEARNING APPROACH TO MITIGATE THE COLD-START PROBLEM IN TEXTUAL ITEMS RECOMMENDATIONS - A method for mitigating cold starts in recommendations includes receiving a request that identifies a requested page and identifying a content vector of the requested page. The content vector is generated based on providing text of the requested page to a neural network text encoder. The method further includes selecting, based on the content vector, a link to a cold start page that does not satisfy a threshold level of interaction data. The selected link is ranked above a second link to a warm page that does satisfy the threshold level of the interaction data. The method further includes presenting the requested page with the selected link. | 2022-03-10 |
20220075841 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND COMPUTER-READABLE RECORDING MEDIUM RECORDING INFORMATION PROCESSING PROGRAM - The information processing device outputs an optimal solution to a binary optimization problem when the binary optimization problem including a linear inequality constraint represented by a linear inequality is input includes a constraint transformation unit which transforms the constraint to a constraint represented by the linear inequality with a coefficient size smaller than the coefficient size of the linear inequality, and an optimization unit which calculates the optimal solution of the binary optimization problem on the basis of the constraint including the linear inequality transformed by the constraint transformation unit. | 2022-03-10 |
20220075842 | PROCESSOR AND SYSTEM FOR AUTOMATIC FUSION OF MATRIX MULTIPLICATION AND REDUCTION OPERATIONS - Apparatuses, systems, and techniques to perform matrix multiplication fused with reduction using a graphics processing unit. In at least one embodiment, one or more circuits are used to multiply two or more sub-portions of one or more matrices and generate two or more vectors therefrom using two or more parallel operations. | 2022-03-10 |
20220075843 | METHODS AND SYSTEMS FOR PRODUCT QUANTIZATION-BASED COMPRESSION OF A MATRIX - Methods and systems for compressing a matrix are described. The matrix, having a plurality of rows formed by a respective plurality of vectors, is partitioned into a plurality of submatrices, each submatrix containing sub-vectors from a respective group of one or more contiguous columns of the matrix. For each given submatrix, the sub-vectors are clustered into a plurality of clusters. For each given cluster, a centroid and a variance are computed and stored, based on the sub-vectors belonging to the given cluster. A mapping relating each vector to a respective cluster in each submatrix is stored. The stored centroids, stored variances and stored mapping form a set of compressed data for reconstruction of the matrix. | 2022-03-10 |
20220075844 | FAST SPARSE OPTIMIZATION DEVICE, FAST SPARSE OPTIMIZATION METHOD, AND PROGRAM - An object is to make it possible to find a high-quality solution at a high speed even for a nonconvex sparse optimization problem of bad conditions. A computation unit | 2022-03-10 |
20220075845 | COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS - A computer-aided design (CAD) system utilizes an image analysis engine to identify objects in a video frame. Customization rules and object identifiers assigned by the image analysis engine and associated with the frame are used to determine if the frame is permitted to be used to customize a product. If the frame is not permitted to be used, an indicator is stored configured to inhibit the frame from being used to customize the product and/or cause the frame to be edited to obscure frame objects. A user request is received for the product. A determination is made as to what frames have been used to customize instances of the product. A first frame is selected that has not been used to customize physical instances of the product. The first frame is printed on the product. The first frame is inhibited from being used to customize other instances of the product. | 2022-03-10 |
20220075846 | SYSTEMS AND METHODS OF DIGITAL CONTENT CERTIFICATION AND VERIFICATION USING CRYPTOGRAPHY AND BLOCKCHAIN - A verification computer system is provided that provides for content certification and verification using cryptography and a blockchain. | 2022-03-10 |
20220075847 | CODE PROTECTION - A method includes receiving a request to execute bytecode that corresponds to secured program code, the secured program code including an encrypted version of the bytecode. Based on receiving the request to execute the bytecode, the method resolves the request, the resolving including identifying a location on disk of the secured program code. Based on resolving the request, a license file for decrypting the encrypted version of the bytecode for execution is accessed, the license file including an encrypted key-value. The encrypted key-value is used in decrypting the encrypted version of the bytecode to obtain decrypted bytecode, where the decrypting places the decrypted bytecode in working memory, and the decrypted bytecode is executed. | 2022-03-10 |
20220075848 | SYSTEMS AND METHODS FOR DOMAIN-DRIVEN DESIGN AND EXECUTION OF MODULAR AND DYNAMIC SERVICES, APPLICATIONS AND PROCESSES - A context of one or more interactions is determined. Base objects are transformed into interpreted objects by interpreting the base objects based on evaluation of the context, and by resolving references of the base objects relative to domain model types and concepts, each of the base objects modeled using a same declarative modeling language, the same declarative modeling language enabling transitions between the interpreted objects, at least one of the interpreted objects including at least one post-condition providing hooks for transition policies which allow the at least one of the interpreted objects to be logically chained in a non-linear process. Transitioning between at least two of the interpreted objects by chaining the at least two interpreted objects based on a particular post-condition of a particular interpreted object to create at least a portion of a particular non-linear process. At least a portion of the particular non-linear process is executed. | 2022-03-10 |
20220075849 | SYSTEM FOR DECRYPTING AND RENDERING CONTENT - The present invention relates to a system for rendering a content, the rendering of which is subject to conditional access security conditions. A system is described, comprising a host device and a detachable security device, the security device configured to decrypt the encrypted content, re-encrypt it under a local key and to deliver the re-encrypted content to the host device while ensuring that the host device applies or otherwise enforces any conditions associated with the rendering of the content. | 2022-03-10 |
20220075850 | SYSTEMS AND METHODS FOR USER AUTHENTICATION - Methods and systems for user authentication. At a server, receiving unique fingerprint information for an unauthenticated browsing session with the server by a first user device. The unique fingerprint information received is compared with respective historical fingerprint information associated with a plurality of user accounts stored on the server. Based on the comparison, determining that one of the plurality of user accounts has associated historical fingerprint information that matches the unique fingerprint information with at least a threshold confidence level. In response to receiving user input from a second device indicating that the unauthenticated browsing session corresponds to the one of the plurality of user accounts, associating the unauthenticated browsing session with the one of the plurality of user accounts. | 2022-03-10 |
20220075851 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM - Provided is an information processing apparatus acquiring a recipient user who is a delivery destination, determining whether or not to use already issued authentication information for receiving a package based on the recipient user and authentication information stored in a storage unit, the storage unit storing the already issued authentication information in association with a user who is an issuing destination, issuing new authentication information as the authentication information used for receiving the package and storing the issued authentication information in association with the recipient user in the storage unit when it is determined that the already issued authentication information is not used for receiving the package, and acquiring the authentication information stored in the storage unit as the authentication information used for receiving the package when it is determined that the already issued authentication information is used for receiving the package. | 2022-03-10 |
20220075852 | ANTI-TAMPER SYSTEM FOR VEHICLE FIRMWARE - A processing system of a vehicle having at least one processor may obtain, from a network-based security system, at least a first security code, apply a hash operation to a firmware code of the vehicle in accordance with the at least the first security code to generate a first hash value, and transmit the first hash value to the network-based security system. The processing system may then obtain from the network-based security system at least a first verification code, the network-based security system providing the at least the first verification code in response to a confirmation of the first hash value, apply the at least the first verification code to a verification function, and generate a signal to enable the operation of the vehicle, in response to a positive verification via the verification function. | 2022-03-10 |
20220075853 | SYSTEMS AND METHODS FOR INITIATING AN AUTHENTICATED SESSION - A server comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to send, via the communications module and to a remote computing device, a signal causing the remote computing device to display a unique code and a telephone number; monitor at least one instant messaging account associated with the telephone number for the unique code; after determining that the unique code has been received at the at least one instant messaging account associated with the displayed telephone number, determine that authentication for a particular account has been successful; and in response to determining that authentication for the particular account has been successful, initiate an authenticated session. | 2022-03-10 |
20220075854 | DISPLAY VISIBILITY BLOCK - Methods, apparatuses, and non-transitory machine-readable media for displaying information and/or images on a display of a computing device based on received data. Apparatuses can include a display screen, a memory resource, a recognition sensor, and a controller. An example controller can receive data and activate information and/or images on a display screen based in part on the received data. In another example, a method can include storing recognition data in a memory resource, receiving primary recognition data, comparing the primary recognition data to the stored recognition data, and activating the display screen for a viewing angle responsive to authentication of the primary recognition data through the comparison of the primary recognition data and the stored recognition data. | 2022-03-10 |
20220075855 | IDENTITY VERIFICATION METHOD AND APPARATUS - A system detects that a target service program is being executed by a computing device. The target service program is one of a plurality of pre-defined service programs to be suspended to complete an identity verification of a user using the target service program. Execution of the target service program is suspended on the computing device. An identity verification program is executed on the computing device. The identity verification program is configured to perform the identity verification of the user to obtain an identity verification result indicating whether an identity of the user is verified. The identity verification program is independent from the target service program. | 2022-03-10 |
20220075856 | IDENTIFYING AND AUTHENTICATING USERS BASED ON PASSIVE FACTORS DETERMINED FROM SENSOR DATA - The disclosed embodiments relate to a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to detecting a trigger event, the system collects sensor data from one or more sensors in the electronic device. Next, the system extracts a feature vector from the sensor data. The system then analyzes the feature vector to authenticate and/or identify the user, wherein the feature vector is analyzed using a model trained with sensor data previously obtained from the electronic device while the user was operating the electronic device. | 2022-03-10 |
20220075857 | VIRTUAL REALITY SYSTEM WITH HIGH SECURITY - A virtual reality (VR) system including a VR box, a system server and a wearable accessary is provided. The VR box detects a biometric characteristic to identify a user ID according to the biometric characteristic, and outputs an ID signal associated with the identified user ID. The system server receives the ID signal from the VR box, and transmits video stream to the VR box to be shown thereon. The wearable accessary detects movement of the wearable accessary after receiving the ID signal from the VR box, and sends a control signal to the system server to change image content in the video stream according to the detected movement of the wearable accessary. | 2022-03-10 |
20220075858 | Association via Voice - A server has a pool data store that stores ambient sound recordings for matching. A match engine finds matches between ambient sound recordings from devices in the pool data store. The matching ambient sound recordings and their respective devices are then analyzed to determine which device is a source device that provides credentials and which device is a target device that receives credentials. The server then obtains or generates credentials associated with the source device and provides the credentials to the target device. The target device accesses content or services of an account using the credentials. | 2022-03-10 |
20220075859 | ANONYMIZED BIOMETRIC DATA INTEGRATION - Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream. | 2022-03-10 |
20220075860 | SYSTEMS, METHODS, AND APPARATUSES FOR SECURELY AUTHENTICATING DEVICE USAGE AND ACCESS - Provided herein are embodiments of systems, methods, apparatuses, computer program products, and techniques associated with authenticating usage of, and access to, various target devices. In some embodiments, these systems, methods, apparatuses, computer program products, and techniques may be configured to facilitate compliance with predetermined requirements or restrictions, for example age restrictions, associated with the use or sale of certain devices and products. | 2022-03-10 |
20220075861 | AUTHENTICATION WITH FACE COVERING - In an approach to augmenting authentication methods using a face covering, one or more computer processors receive an image of a user wearing a face covering, where a portion of the face of the user is visible in the image, and the face covering covers another portion of the face of the user in the image. One or more computer processors detect an identifier operably coupled with the face covering. One or more computer processors determine whether the first portion of the face of the user is associated with the identifier. In response to determining the first portion of the face of the user is not associated with the identifier, one or more computer processors receive an alternate authentication. One or more computer processors authenticate the user. | 2022-03-10 |
20220075862 | SYSTEM AND METHOD FOR FACIAL RECOGNITION AUTHENTICATION FOR MASK WEARERS - A system and method for authenticating a face mask with a user for providing secure access to a user device whereby received on the user device is a request from the user to pair a user face mask having a pre-printed unique identifier with the user device for user authentication purposes. The user device captures an image of the pre-printed unique identifier on the user face mask so as to associate the captured image of the unique identifier with the user device. Afterwards, when the user requests access to the user device in a locked state, the user device is caused to capture of an image of the unique identifier affixed to the user face mask. The user device may further be caused to capture an image of at least a portion of the user's face to authenticate the captured unique identifier affixed to the user face mask with the captured portion of the user's face to verify the captured unique identifier and the captured portion of the user's face are associated with the user device. | 2022-03-10 |
20220075863 | Trusted Key Provisioning Based on Device Specific Secrets - A system on chip (SoC) includes one or more SoC dies each having a die identification and a die specific secret. A computer obtains the device identification of each chip and extracts from memory the device specific secret of each chip based on the device identification. A challenge is generated based on a random number and encrypted using a first key that is generated based on the die specific secret stored locally in association with each SoC die. After sending the challenge to the SoC, the computer receives a response. The response is generated based on the random number and encrypted using a second key that is generated by the SoC based on the device specific secret of each SoC die stored on the SoC. In accordance with a determination that the response matches the challenge, the computer authenticates the SoC for subsequent trusted operations. | 2022-03-10 |
20220075864 | APPLICATION INTERFACE AND DISPLAY CONTROL IN AN ANALYTE MONITORING ENVIRONMENT - Systems, devices, and methods are provided for the control of interfacing between applications that facilitate the monitoring of diabetes running on a mobile device, including the authentication of a third party user interface application by a sensor interface application. Control of the display of current analyte levels and critical events is also provided. | 2022-03-10 |
20220075865 | AUTOMATED ACCESS DATA CHANGE DETECTION - A user may conduct a plurality of access requests with a plurality of resource provider computers. A processor server computer may determine whether resource provider computers store access data associated with the user in various ways, including detecting patterns in sets of a plurality of access requests conducted between the user and each of the plurality of resource provider computers. Upon detecting that access data has changed, the processor server computer may automatically send the updated access data to each of the identified resource provider computer. | 2022-03-10 |
20220075866 | MOBILE DEVICE WITH SECURE PRIVATE MEMORY - A mobile device includes non-private memory that can store software programs and a private memory that can store copies of the software programs as well as exclusively store trusted programs that are not stored in the non-private memory. The mobile device includes a processor configured to execute the software programs of the non-private memory when the mobile device is in a non-private mode, execute a trusted program only when the mobile device is in a private mode, and enable switching between the non-private mode and the private mode in response to a reboot of the mobile device. | 2022-03-10 |
20220075867 | TEMPORARY REMOVAL OF SOFTWARE PROGRAMS TO SECURE MOBILE DEVICE - A mobile device has a private memory that stores multiple software programs including a trusted software program. A non-private memory stores copies of the software programs except the trusted software program. The mobile device can be set in a full non-private mode, a modified non-private mode, or a private mode. In the full non-private mode, the full non-private memory is restored with copies of the software programs stored at the private memory. In the modified non-private mode, only selected software programs are restored at the non-private memory with a copy from the private memory. In the private mode, the trusted software program at the private memory can be executed. | 2022-03-10 |
20220075868 | MITIGATION OF RETURN-ORIENTED PROGRAMMING ATTACKS - Trampoline and return-oriented programming attacks employ a variety of techniques to maliciously execute instructions on a device in a manner different from a legitimate programmer's original intent. By instrumenting a device to detect deviations from predicted behavior, these exploits can be identified and mitigated. | 2022-03-10 |
20220075869 | SYSTEMS, METHODS, AND APPARATUSES FOR INTRUSION DETECTION AND ANALYTICS USING POWER CHARACTERISTICS SUCH AS SIDE-CHANNEL INFORMATION COLLECTION - Some embodiments described herein include a system that collects and learns reference side-channel normal activity, process it to reveal key features, compares subsequent collected data and processed data for anomalous behavior, and reports such behavior to a management center where this information is displayed and predefine actions can be executed when anomalous behavior is observed. In some instances, a physical side channel (e.g. and indirect measure of program execution such as power consumption or electromagnetic emissions and other physical signals) can be used to assess the execution status in a processor or digital circuit using an external monitor and detect, with extreme accuracy, when an unauthorized execution has managed to disrupt the normal operation of a target system (e.g., a computer system, etc.). | 2022-03-10 |
20220075870 | System and Method for Scalable File Filtering Using Wildcards - A system monitors access to a computer file via a dynamically changeable nonĀ¬ heterogeneous collection load balanced across two hash tables. User activity is monitored on a target device to detect a user entered pattern including a wildcard character. A server in communication with the target device, receives the user entered pattern, selects one of the two hash tables, and calculates an index for a pattern for the selected hash table based on the user entered pattern. The index is used to access the selected hash table to receive a stored pattern. The hash tables each have a plurality of entries, and each entry includes a list of one or more patterns that have the same hash index but different pattern values sorted by length in characters from longest to shortest. | 2022-03-10 |
20220075871 | DETECTING HACKER TOOLS BY LEARNING NETWORK SIGNATURES - Methods, systems and computer program products are provided for detection of hacker tools based on their network signatures. A suspicious process detector (SPD) may be implemented on local computing devices or on servers to identify suspicious (e.g., potentially malicious) or malicious executables. An SPD may detect suspicious and/or malicious executables based on the network signatures they generate when executed as processes. An SPD may include a model, which may be trained based on network signatures generated by multiple processes on multiple computing devices. Computing devices may log information about network events, including the process that generated each network event. Network activity logs may record the network signatures of one or more processes. Network signatures may be used to train a model for a local and/or server-based SPD. Network signatures may be provided to an SPD to detect suspicious or malicious executables using a trained model. | 2022-03-10 |
20220075872 | METHOD AND SYSTEM FOR DETECTING MALICIOUS INFRASTRUCTURE - A method and a system for detecting a malicious infrastructure are provided. The method comprising: receiving a request comprising at least one infrastructure element of a given infrastructure assigned with a respective tag indicative of maliciousness of the given infrastructure; searching a database to identify therein, based at least on the respective tag, and at least one respective parameter of the at least one infrastructure element, and at least one additional infrastructure element and at least one additional respective parameter thereof; determining statistical relationships between the at least one respective parameter of at least one infrastructure element and the at least one additional respective parameter of the at least one additional infrastructure element; determining, based on the statistical relationships, rules for searching the database to identify therein new infrastructure elements; and assigning the respective tag associated with the given malicious infrastructure to the new infrastructure elements, thereby updating the database. | 2022-03-10 |
20220075873 | FIRMWARE SECURITY VERIFICATION METHOD AND DEVICE - The present disclosure relates to a firmware security verification method and device, including a processor and a read-only memory for storing instructions executable by the processor. While executing the instructions, the processor implements the following steps: acquiring firmware data and a digital signature; verifying the digital signature with a pre-stored public key; and running the firmware data upon determining that the digital signature passes the verification. With the firmware security verification method and device provided in embodiments of the present disclosure, the security of the firmware data can be acquired before the running of firmware. | 2022-03-10 |
20220075874 | END-POINT VISIBILITY - A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a monitoring application comprising computer-executable instructions on the medium. The instructions are readable by the processor. The monitoring application is configured to receive an indication that a client has been affected by malware, cause the client to boot from a trusted operating system image, cause a launch of a secured security application on the client from a trusted application image, and analyze a malware status of the client through the secured security application. | 2022-03-10 |
20220075875 | LANGUAGE-INDEPENDENT APPLICATION MONITORING THROUGH ASPECT-ORIENTED PROGRAMMING - To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application. | 2022-03-10 |
20220075876 | RUNTIME APPLICATION MONITORING WITHOUT MODIFYING APPLICATION PROGRAM CODE - To facilitate runtime monitoring and analysis of an application without modifying the actual application code, an agent monitors and analyzes an application through detection and evaluation of invocations of an API of a runtime engine provided for execution of the application. The agent registers to receive events which are generated upon invocation of target functions of the runtime engine API based on its load. Once loaded, the agent initially determines the language and language version number of the runtime engine. The agent determines associations of events for which to monitor and corresponding analysis code to execute upon detection of the invocations based on the language and version number information. When the agent detects an event during execution of the application based on invocations of the runtime engine API, the agent can monitor and analyze execution of the application based on execution of analysis code corresponding to the detected event. | 2022-03-10 |
20220075877 | INTERFACE AND SYSTEM FOR UPDATING ISOLATED REPOSITORIES - Provided is a method including obtaining a first web message from a device and retrieving values of a profile. The method may include obtaining a first value of a first account based on the profile, respectively. The process may include determining a boundary based on the first value and providing a user interface (UI) to a computing device via a response to the first web message. The UI may include a UI element that is movable from a first configuration to a second configuration, where positioning the UI element in the first configuration and second configuration causes a first and second limit associated with the first and second configuration to be displayed, respectively. The method may include obtaining a second web message having a third value determined from an updated configuration of the UI element and adjusting a second value based on the third value. | 2022-03-10 |
20220075878 | APPLICATION OF TRAINED ARTIFICIAL INTELLIGENCE PROCESSES TO ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT - The disclosed embodiments include computer-implemented processes that predict a credit score for a customer in real-time based on an application of a trained machine-learning or artificial-intelligence process to encrypted event data at a third-party computing cluster. For example, an apparatus may transmit encrypted event data to a third-party computing system. The third-party computing system may apply a trained artificial intelligence process to encrypted feature data that includes the encrypted event data, and the apparatus may receive, from the third-party computing system, encrypted output data representative of a predicted credit score during at least one temporal interval. The apparatus may decrypt the encrypted output data using a homomorphic decryption key, and transmit a notification that includes the decrypted output data to a device. An application program executed at the device may present a graphical representation of at least a portion of the decrypted output data within a digital interface. | 2022-03-10 |
20220075879 | PROTECTION OF CRYPTOGRAPHIC OPERATIONS BY INTERMEDIATE RANDOMIZATION - Aspects of the present disclosure involve a method and a system to support execution of the method to perform a cryptographic operation involving a first vector and a second vector, by projectively scaling the first vector, performing a first operation involving the scaled first vector and the second vector to obtain a third vector, generating a random number, storing the third vector in a first location, responsive to the random number having a first value, or in a second location, responsive to the random number having a second value, and performing a second operation involving a first input and a second input, wherein, based on the random number having the first value or the second value, the first input is the third vector stored in the first location or the second location and the second input is a fourth vector stored in the second location or the first location. | 2022-03-10 |
20220075880 | HOMOMORPHIC ENCRYPTION OF COMMUNICATIONS INVOLVING VOICE-ENABLED DEVICES IN A DISTRIBUTED COMPUTING ENVIRONMENT - The disclosed exemplary embodiments include computer-implemented systems, devices, apparatuses, and processes that maintain data confidentiality in communications involving voice-enabled devices in a distributed computing environment using homomorphic encryption. By way of example, an apparatus may receive encrypted command data from a computing system, decrypt the encrypted command data using a homomorphic private key, and perform operations that associate the decrypted command data with a request for an element of data. Using a public cryptographic key associated with a device, the apparatus generate an encrypted response that includes the requested data element, and transmit the encrypted response to the device. The device may decrypt the encrypted response using a private cryptographic key and to perform operations that present first audio content representative of the requested data element through an acoustic interface. | 2022-03-10 |
20220075881 | Information Processing Apparatus, Information Processing Method, and Information Processing Program - An information processing apparatus includes a behavior detector that detects a behavior performed by a user when the user makes a request to an information providing apparatus with respect to information from the user, and a response determination section that determines a response to be made by the information providing apparatus to the request. | 2022-03-10 |
20220075882 | WORK-FROM-HOME AGENT SECURITY COMPLIANCE - Working from home is becoming more and more commonplace. Ensuring that remote workers are following prescribed data protection measures becomes more important, and challenging. Safe and Secure Remote Working Environment (SSRWE) monitors an environment and determines if a non-compliant element is present. For example, a condition of working from home may be that no notetaking or electronic devices, especially ones comprising a camera, be visible to a system camera capturing the field of view in front of a display. If a non-compliant situation is discovered, the display may be redacted and/or other action taken to protect sensitive information. | 2022-03-10 |
20220075883 | CENTER DEVICE, DATA DISTRIBUTION SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DISTRIBUTION CONTROL - A center device includes: a consent request unit that is configured to make a consent request to a plurality of devices for data distribution to a vehicle; a consent determination unit that is configured to judge a consent response from each of the plurality of devices; a distribution control unit that is configured to control the data distribution to the vehicle according to a determination result by the consent determination unit; and a necessity determination unit that is configured to determine whether the consent request to the plurality of devices is needed before the consent request are made to the plurality of devices. The consent request unit is further configured to determine whether to make the consent request to the plurality of devices according to a determination result by the necessity determination unit. | 2022-03-10 |
20220075884 | COMPUTER SECURITY SYSTEM AND METHOD - Examples provide a computer security system comprising one or more sensors operably couplable to a remote computing device, wherein the one or more sensors are operable to detect a physical security breach of a location where the remote computing device is located, wherein, in response to detection of the physical security breach by the one or more security sensors, the remote computing device is operable to obfuscate one or more activities running on the remote computing device. | 2022-03-10 |
20220075885 | SIGNING AND VERIFYING MUTABLE STRUCTURED DOCUMENTS - A structured document is verified for changes that are made during and after deployment of an application. The structured document includes first fields that are designated as mutable, and second fields that are designated as immutable. An attempted change is detected to the structured document during or after deployment of the application. Upon detecting the attempted change, a digital signature is generated of the second fields of the structured document. A determination is made whether the generated digital signature of the second fields matches a reference digital signature of the second fields. Upon determining that the generated digital signature matches the reference digital signature, the change to the structured document is permitted. Upon determining that the generated digital signature does not match the reference digital signature, the change is blocked to the structured document. | 2022-03-10 |
20220075886 | FILE INTERFACE TO DYNAMICALLY MANAGE ACCESS TO REMOTE FILES - Various embodiments of the present application set forth a computer-implemented method for accessing data comprising determining a manifest associated with a given user of an application, where the manifest identifies one or more assets that are accessible by the given user, for each of the one or more assets, one of a plurality of endpoint stores that stores data associated with the asset, and for each of the one or more assets, one of the plurality of endpoint stores that stores metadata associated with the asset, generating, based on the manifest, a user namespace that includes a unique reference for each of the one or more assets, and presenting the user namespace to the user. | 2022-03-10 |
20220075887 | SERVER WITH DATA SECURITY MEASURE - A server includes a management module that includes a memory device and that is configured to be connected to multiple data storage devices. The management module is configured to perform an initialization procedure, in which the management module obtains multiple pieces of storage identifier information corresponding to the data storage devices, determines, for each of the pieces of storage identifier information, whether the piece of storage identifier information matches any piece of default identifier information contained in a list stored in the memory device, and generates piece(s) of log data for matched piece(s) of storage identifier information. | 2022-03-10 |
20220075888 | INFORMATION PROCESSING APPARATUS, SERVICE PROVIDING SYSTEM, AND METHOD - An information processing apparatus, a service providing system, and a method. The information processing apparatus stores in one or more memories, information on execution of each of a plurality of applications, which are available for use under a license contract and outputs suggestion to change the license contract according to a usage count of each application obtained from the information on execution of each application. | 2022-03-10 |
20220075889 | System of decentralized Zero-Trust services for creating, using and analyzing securely commingled Self-Governing data sets - System of decentralized Zero-Trust services for creating, using and analyzing securely commingled Self-Governing data sets that prevents extraction by any party and unauthorized in contradiction to the Self-Governing need-to-know policies defined by each Publisher. Such an invention enables performance of combinatorial analytics, machine learning or artificial intelligence (AI) or other permitted data usage processes applied to commingled data without exposing the Self-Governing data in any manner contravening the embedded and enforced fine-grained security and governance settings which control how and by whom and in what context each data element can be used. | 2022-03-10 |