17th week of 2022 patent applcation highlights part 46 |
Patent application number | Title | Published |
20220129467 | DISTRIBUTED METADATA-BASED CLUSTER COMPUTING - A shared database platform can interface with a cluster computing platform over a network through a connector. The data transferred over the network can include metadata result packages that can be distributed to worker nodes of the cluster computing platform, which receive the metadata objects and access the result data for further processing on a staging platform, such as a scalable storage platform. | 2022-04-28 |
20220129468 | METHOD, DEVICE, AND PROGRAM PRODUCT FOR MANAGING INDEX OF STREAMING DATA STORAGE SYSTEM - An active layer of the index includes a first shard group, and shards in the first shard group are configured to store indexes of a part of data objects in a streaming storage system. In response to determining that the state of the first shard group meets a predetermined expansion condition, a second shard group is created in the index, and shards in the second shard group are configured to store indexes of data objects that will enter the storage system. The storage system is managed based on the shards in an active layer (where the second shard group is located) and frozen layers (where the second shard group) in the index. The number of shards in the storage system can be dynamically set to process streaming data at a relatively high speed, and it is suitable for processing streaming data that continuously enters the storage system. | 2022-04-28 |
20220129469 | SYSTEM AND METHOD TO ENABLE A DATA ANALYTICS IN A SMART DATA ACCELERATOR INTERFACE DEVICE - An information handling system includes a hardware device having a query processing engine to provide queries into source data and to provide responses to the queries. A processor stores a query to a query address in the memory device, issues a command to the hardware device, the command including the query address and a response address in the memory device, and retrieves a response to the query from the response address. The hardware device retrieves the query from the query address in response to the command, provides the query to the query processing engine, and stores a response to the query from the query processing engine to the response address. | 2022-04-28 |
20220129470 | CONVERGED MERCHANT PROCESSING APPARATUSES, METHODS AND SYSTEMS - The CONVERGED MERCHANT PROCESSING APPARATUSES, METHODS AND SYSTEMS (“CMP”) facilitates the generation of user accounts with merchants. The user may be logged into an electronic wallet or issuer account, and may initiate an account generation process with a one-click mechanism. The CMP may provide information to the merchant in order to facilitate the generation of the account after receiving data from the electronic wallet or issuer. | 2022-04-28 |
20220129471 | FACILITATION OF A CROSS-SERVER EXTENSION - Servers at different locations and storing different data can be designed such that one server can act as an extension of the other server by accepting search queries from the other server and returning a response. The response can also comprise results, from the querying server, from within its own document collection. The other server can then include in its response to its user's queries, results obtained from its extension. One or more of the servers can act as an aggregation server that aggregates data from other servers before sending the data to a querying device or server. Additionally, the aggregation server can modify, add, or delete information from the results, before sending to the querying device, based on previous rules and/or properties associated with the aggregation server. | 2022-04-28 |
20220129472 | USER INTERFACE METHODS AND SYSTEMS FOR SELECTING AND PRESENTING CONTENT - A user-interface method of selecting and presenting a collection of content items based on user navigation and selection actions associated with the content is provided. The method includes associating a relevance weight on a per user basis with content items to indicate a relative measure of likelihood that the user desires the content item. The method includes receiving a user's navigation and selections actions for identifying desired content items, and in response, adjusting the associated relevance weight of the selected content item and group of content items containing the selected item. The method includes, in response to subsequent user input, selecting and presenting a subset of content items and content groups to the user ordered by the adjusted associated relevance weights assigned to the content items and content groups. | 2022-04-28 |
20220129473 | Database Management Service Provision System - Each of a plurality of servers includes a shared information storage region for storing information to be shared with other servers. The servers operate so as to match data of the shared information storage regions with each other. A first server manages a first local database. A second server generates query information for accessing the first local database, and stores the query information in the shared information storage region of the second server. The first server acquires the query information from the shared information storage region of the first server, and stores the result with respect to the query information in the shared information storage region of the first server. The second server acquires the result from the shared information storage region of the second server. | 2022-04-28 |
20220129474 | TECHNIQUES FOR UNIFYING ETL FILTER OPERATORS - Techniques are provided for unifying filter operators in exchange, transform, load (ETL) plans. Such a technique includes a method that may include receiving, by a computer system, an ETL plan including a split operator and a plurality of filter operators. The may include identifying, by the computer system, that the plurality of filter operators are configured to act on data output by the split operator in the ETL plan. The method may include generating, by the computer system, a unified filter operator using the plurality of filter operators. The method may include generating, by the computer system, an updated ETL plan comprising the unified filter operator providing filtered data to the split operator. The method may also include storing the updated ETL plan in a data store. | 2022-04-28 |
20220129475 | A General Purpose Blockchain - A general purpose blockchain (GPB) providing the capability of native arbitrary computation and storage of any type of digital object with distributed verification technology (DVT) implementation that not only allows scalable arbitrary computational verification of digital objects, but also is agnostic as to the types of object. The GPB platform comprises an interface for interacting with arbitrary objects (“GPB arbitrary objects”). The interface transforms unstructured data into structured, extensible data without loss of fidelity of the underlying data. This is accomplished through a transformation function, which takes as input any arbitrary form of data and provides as output a structured data object upon which cryptographic and other operations necessary to the functions of DVTs can be performed collectively by a plurality of GPB blockchains. One proposed method of creating this structured output uses open-standard, extensible markup language (XML) data. | 2022-04-28 |
20220129476 | ENHANCED MECHANISMS FOR MANAGING MULTIDIMENSIONAL DATA - An enhanced multidimensional data management system significantly reduces the resources required to convert a spreadsheet into an enterprise collaborative system. A spreadsheet may be imported as is without modifications. Additional information that cannot be automatically inferred about the data model used in the spreadsheet is obtained. Dimensions, timescale, and measure data are clearly defined and located. The spreadsheet is kept in the system in the form of both a spreadsheet and as a multidimensional data structure such as an online analytical processing (OLAP) cube or structure. This duality allows the spreadsheet to be manipulated as if it was an OLAP cube, modifying iterations within the dimensions, and the OLAP cube to be computed as if it was a spreadsheet. | 2022-04-28 |
20220129477 | SYSTEMS AND METHODS FOR MANAGING EVENT STORAGE - A computer-implemented database system for storing data relating to a series of events may include a memory storing instructions and at least one processor configured to execute the instructions to perform a process. The process may include receiving data relating to a first return request initiated by a first customer via a first user device, and creating a first data structure for the first return request into a first database. The process may also include create a first event for the first return request, and storing the first event in the first data structure. The process may further include receiving data relating to an update associated with the first return request, creating a second event for the update, and inserting the second event into the first data structure. | 2022-04-28 |
20220129478 | RESOURCE PROVISIONING SYSTEMS AND METHODS - A method and apparatus managing a set of processors for a set of queries is described. In an exemplary embodiment, a device receives a set of queries for a data warehouse, the set of queries including one or more queries to be processed by the data warehouse. The device further provisions a set of processors from a first plurality of processors, where the set of processors to process the set of queries, and a set of storage resources to store data for the set of queries. In addition, the device monitors a utilization of the set of processors as the set of processors processes the set of queries. The device additionally updates a number of the processors in the set of processors provisioned based on the utilization. Furthermore, the device processes the set of queries using the updated set of processors. | 2022-04-28 |
20220129479 | PUSH MODEL FOR INTERMEDIATE QUERY RESULTS - A system and method for managing data storage and data access with querying data in a distributed system without buffering the results on intermediate operations in disk storage. | 2022-04-28 |
20220129480 | CLONING CATALOG OBJECTS - Example systems and methods for cloning catalog objects are described. In one implementation, a method identifies an original catalog object associated with data and creates a duplicate copy of the original catalog object without copying the data itself. The method allows access to the data using the duplicate catalog object and supports modifying the data associated with the original catalog object independently of the duplicate catalog object. The duplicate catalog object can be deleted upon completion of modifying the data associated with the original catalog object. | 2022-04-28 |
20220129481 | SYSTEM AND METHOD FOR IMPLEMENTING CONSENSUS IN DISTRIBUTED LEDGER ARRANGEMENT - Disclosed is a system having an input arrangement and an output arrangement. The system includes a plurality of data processing nodes to processes input data and generates output data, depending on operation of a distributed ledger arrangement to which an entry is added. A directed acyclic graph (DAG) is utilized to agree upon a set of data transactions required for adding the entry to the distributed ledger arrangement. The system employs decentralized beacon arrangement that randomly elects data processing nodes that operate to form consensus of entry to be added to the distributed ledger arrangement, pseudo-random number generator engine to rank the data processing nodes within the group; and control arrangement that enables the leading node to provide final proposal to be included in the DAG, wherein a remainder of the data processing nodes operate to notarize the final proposal to add the entry to the distributed ledger arrangement. | 2022-04-28 |
20220129482 | MULTI-MODAL-BASED GENERATION OF DATA SYNCHRONIZATION INSTRUCTIONS - In certain embodiments, multi-modal-based generation of settlement instructions may be facilitated. In some embodiments, a portfolio of a live environment may be emulated in a projected environment. A target portfolio may be generated in the projected environment based on the emulated portfolio. Partial synchronization between the target portfolio of the projected environment and the portfolio of the live environment may be performed such that a first subset of changes to the portfolio of the live environment are reflected in the target portfolio of the projected environment. Subsequent to the partial synchronization, the target portfolio of the projected environment may be updated such that the update of the target portfolio accounts for the first subset of changes. Subsequent to the update of the target portfolio, settlement instructions may be generated based on differences between the target portfolio of the projected environment and the portfolio of the live environment. | 2022-04-28 |
20220129483 | DATA PROCESSING METHOD AND DEVICE, COMPUTING DEVICE AND MEDIUM - A data processing method is disclosed, the method comprising: after data synchronization, obtaining data offset of synchronous data related to a data integration task to be performed, the data offset representing deviation of the synchronous data from corresponding source data; determining whether the synchronous data is complete based on the data offset; in response to the synchronous data being complete, performing the data integration task to the synchronous data. | 2022-04-28 |
20220129484 | RELIABLE HIERARCHICAL STORAGE MANAGEMENT WITH DATA SYNCHRONIZATION - A system hosts a file system representing a replica of file systems hosted on a plurality of nodes, each node storing data on a first storage medium. The system stores data on a second storage medium that is slower than the first storage medium. The system stores on the second storage medium a file received from one of the nodes when the file remains un-accessed by the nodes for a predetermined period of time. The first storage medium on the plurality of nodes stores a pointer to the file and not the data content of the file stored on the second storage medium. The system provides the file from the second storage medium to the first storage medium on one of the nodes while providing the plurality of nodes read and write access to the file stored on the second storage medium using the pointer on the first storage medium. | 2022-04-28 |
20220129485 | SYSTEM AND METHOD FOR INTERMEDIARY MAPPING AND DE-IDENTIFICATION OF NON-STANDARD DATASETS - Disclosed is a method for an intermediary mapping an de-identification comprising steps of retrieving datasets and meta data from a data source; selecting a target standard; mapping the retrieved datasets and the metadata to the target standard, wherein the datasets and the metadata are mapped to the target standard using one of, a schema mapping, a variable mapping, or a combination thereof; infer one or more of, variable classifications, variable connections, groupings, disclosure risk settings, and de-identification settings using the dataset mapping and metadata; perform a de-identification propagation using the mapped datasets, the mapped metadata, the inferred variable classifications, the inferred variable connections, the inferred groupings, the inferred disclosure risk settings, the inferred de-identification settings, or a combination thereof. | 2022-04-28 |
20220129486 | SYSTEMS AND METHODS FOR INTERACTIVE LARGE-SCALE DATA SEARCH AND PROFILING - Described herein are systems and methods for profiling structured or semi-structured datasets. An example computer-implemented method includes grouping, using a machine learning classifier, a plurality of tables in a dataset that are associated with an object into a cluster, where each of the tables of the cluster includes respective data and respective metadata, the respective metadata including at least one respective attribute, generating a metadata-profile for the cluster, where the metadata-profile includes the at least one respective attribute of each of the tables of the cluster; and querying the cluster using the metadata-profile. | 2022-04-28 |
20220129487 | SHARED KEY PREFIX VALUES ACROSS OBJECTS - A relational database system may receive, from a client, a query for a data object of a first type. The system may be configured to store a plurality of data objects of a second type such that each data object of the second type is associated with a respective data table and a respective value of a key prefix of an object identifier field. The key prefix may result in an upper limit of data objects supportable by the system. The system may determine that the query is indicative of the data object of the first type of a plurality of data objects of the first type that share a key prefix value such that the upper limit is exceeded. The system may identify a result based on determining that the query indicates data object of the first type and return a query response that indicates the result. | 2022-04-28 |
20220129488 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING TRAFFIC DATA USING SUBTREE DATA STRUCTURE - A method, a system, and a computer program product may be provided for providing traffic data to a client device. The system may receive from the client device, a request for traffic data corresponding to road segments of at least one map area, said request identifying the at least one map area and determine road segment identifiers corresponding to each of the road segments of the at least one map area and determine traffic data for at least a portion of the road segment identifiers, said traffic data obtained from a traffic data source. The system may further determine a plurality of traffic ranges based on the obtained traffic data and generate a subtree data structure set, each subtree data structure of the subtree data structure set corresponding to a traffic range of the plurality of traffic ranges, wherein each subtree data structure encodes road segment identifiers corresponding to the respective traffic range. | 2022-04-28 |
20220129489 | BUILDING AND MODIFYING CONVERSATIONAL USER JOURNEYS - A computer-implemented system and method for searching comprises, in an initial training phase, storing a plurality of user journeys in a stored journey database (SJDB), and storing a plurality of intents in a stored intents database (SIDB). The plurality of user journeys comprise a plurality of intents linked together by weighted links. In a first use phase, the method comprises determining a first intent of a first user or a second user, and modifying a first weighting of the weightings based on the first intent. In a second use phase, the method comprises receiving, from the second user, a second user question, determining a second intent from the second user question, and locating a user journey from the plurality of user journeys in the SJDB related to the second intent. | 2022-04-28 |
20220129490 | PREDICTION METHOD BASED ON UNSTRUCTURED DATA - The present invention discloses a prediction method based on unstructured data, applied in a prediction system comprising an analyzing module and a model-building module to predict future behaviors of a user. The prediction method comprises steps of: with the analyzing module, analyzing a recording file with a natural language processing algorithm to generate at least one feature vector, wherein the recording file is related to a subject behavior in a predetermined observation period, at least one record in a form of unstructured data is stored therein, and the record comprises a time stamp and a recording text; and with the model-building module, using a surprised machine learning algorithm building a model with information corresponding to the feature vector as input for predicting future behaviors of a user, wherein the record is one of query record of domain name system, transaction record of automated teller machine, transaction record of structured query language and literal record. | 2022-04-28 |
20220129491 | METHOD FOR SUPPORTING AGENT AND COMPUTING DEVICE THEREOF - According to the present disclosure, an agent support method including acquiring information on or regarding at least one keyword related to counseling, identifying information on or regarding an index corresponding to the at least one keyword, and displaying a title related to a counseling record and an answer content list related to the index based on the information on the index and a computing device thereof is provided. | 2022-04-28 |
20220129492 | METHOD FOR DETERMINING RELEVANT SEARCH RESULTS - A method for determining relevant search results includes provided a searchable database containing a plurality of source documents with corresponding citations. The source documents and the corresponding citations have keywords. The keywords are extracted from the source documents and citations using a parser and are stored in the searchable database in association with the source documents and citations. The citations are linked to their source documents in a graph databased based upon the keywords shared between them. | 2022-04-28 |
20220129493 | SYSTEM AND METHOD FOR DECISION DRIVEN HYBRID TEXT CLUSTERING - The present invention discloses a method and a system for clustering of short and long text documents. The documents are input through an input module and a pre-processing module overtakes the documents from the input module. The pre-processing module refines the documents and removes unwanted text from the documents. Then a decision driven hybrid text clustering algorithm is applied via different modules to achieve clustering of the documents. Firstly, a context module computes a moment value of a feature signifying at least one feature importance value of the feature for the documents. The moment value is used by a decision module to calculate a decision score. Basis the decision score the documents are split into two sets. A clustering module then forms clusters of the two sets of documents basis n-tuple word distribution. Finally, a convergence module congregates the clusters in a final set of documents. | 2022-04-28 |
20220129494 | BLOCK-LEVEL CLASSIFICATION OF UNSTRUCTURED DATA - Methods, apparatus, and processor-readable storage media for block-level classification of unstructured data are provided herein. An example apparatus includes a host device comprising a processor coupled to memory, the host device being configured to communicate over a network with a storage system, and further being configured to: obtain a pointer to a page cache associated with an input-output operation for at least one page of unstructured data of a file; obtain an index node object of the file based at least in part on the pointer to the page cache; derive at least one characteristic of the file based at least in part on the obtained index node object; and provide an indication of the at least one characteristic to the storage system. The storage system determines whether to apply one or more functions to the unstructured data based on the indication. | 2022-04-28 |
20220129495 | Retrieving And Playing Out Media Content For A Personalized Playlist - An example method involves receiving a playlist defining a sequence of media content items including a first media content item and a second media content item; retrieving, from one or more server devices, first data representing the media content items of the received playlist, and using the retrieved first data to play out the media content items in accordance with the sequence defined by the playlist; making a determination of whether a condition has been satisfied, wherein the condition corresponds to a content category type; and responsive to the determination being that the condition has been satisfied, (i) retrieving second data representing a media content item of the content category type, and (ii) using the retrieved second data to play out the media content item of the content category type in between playing out the first and second media content items. | 2022-04-28 |
20220129496 | DYNAMIC QUERY ADJUSTMENT BASED ON DATA PROTECTION CONFIGURATIONS - Aspects of the present disclosure relate to systems and methods for dynamically adjusting queries based on data protection configurations. In one example, a request for data is received from an application. The data is indexed in at least one of a first index database, a second index database and a third index database. A first key notification indicating a protection status of a personal device is received. A query is sent to each of the first index database, the second index database and the third index database for the requested data based on the protection status of the personal device. The requested data is loaded into the application. A second key notification indicating a change in the protection status of the personal device is received. At least some of the loaded data is removed from the application based on the change in the protection status of the personal device. | 2022-04-28 |
20220129497 | SYSTEMS AND METHODS FOR FILTERING PRODUCTS BASED ON IMAGES - A method for filtering products based on images, comprising the steps of: receiving image data representing an image, the image being associated with a product identifier; analyzing the image data by a plurality of machine learning models; generating a plurality of image scores for the image, each image score being generated by each of the plurality of machine learning models; determining, based on the plurality of image scores, whether the image has a sensitive status; and assigning an unsafe category to the product identifier associated with the image having the sensitive status. | 2022-04-28 |
20220129498 | Generating Occurrence Contexts for Objects in Digital Content Collections - In implementations of systems for generating occurrence contexts for objects in digital content collections, a computing device implements a context system to receive context request data describing an object that is depicted with additional objects in digital images of a digital content collection. The context system generates relationship embeddings for the object and each of the additional objects using a representation learning model trained to predict relationships for objects. A relationship graph is formed for the object that includes a vertex for each relationship between the object and the additional objects indicated by the relationship embeddings. The context system clusters the vertices of the relationship graph into contextual clusters that each represent an occurrence context of the object in the digital images of the digital content collection. The context system generates, for each contextual cluster, an indication of a respective occurrence context for the object for display in a user interface. | 2022-04-28 |
20220129499 | NETWORK SERVER AND METHOD FOR MANAGING PLAYLIST PROVIDED TO USER TERMINAL THROUGH NETWORK - A network server includes a communicator connected to a network; and at least one processor configured to communicate, through the communicator, with a user terminal connected to the network. The processor is configured to include or associate content IDs, determined according to one or more requests from the user terminal, in or with a playlist, the content IDs corresponding to content files, respectively, stored in a database; reflect actions of the user terminal, associated with one or more of the content files, on log data sets corresponding to the content IDs; and determine one or more of the content IDs as one or more target IDs to be selectively deleted or excluded from the playlist, on the basis of the log data sets. | 2022-04-28 |
20220129500 | SYSTEMS AND METHODS FOR TRANSCRIPT PROCESSING - The technology relates to systems and methods for transcribing audio of a meeting. Upon transcribing the audio, the systems and methods can parse different portions of the prescribed audio so that they may attribute the different portions to a particular speaker. These transcribed portions that are attributed to a particular speaker are made available for viewing and interacting using a graphical user interface. | 2022-04-28 |
20220129501 | METHOD AND SYSTEM FOR PERFORMING A STORAGE TIER OPERATION ON VIDEO DATA USING A DATA PROCESSING UNIT - A method for processing video data is performed by a data processing unit (DPU). The method includes obtaining, by the DPU of an edge device, video data; processing the video data to obtain video data chunks and video processing engine outcomes; generating storage tier metadata based on the video data chunks and the video processing engine outcomes; associating the storage tier metadata with the video data chunks; and storing the storage tier metadata and the video data chunks in the appropriate storage based on the storage tier metadata. | 2022-04-28 |
20220129502 | METHOD AND SYSTEM FOR PERFORMING A COMPLIANCE OPERATION ON VIDEO DATA USING A DATA PROCESSING UNIT - A method for processing video data is performed by a data processing unit (DPU). The method includes obtaining, by the DPU, video data; processing the video data to obtain video data chunks and video processing engine outcomes; generating compliance metadata based on the video data chunks and the video processing engine outcomes; associating the compliance metadata with the video data chunks; and storing the compliance metadata and the video data chunks in appropriate storages based on the compliance metadata. | 2022-04-28 |
20220129503 | METHOD FOR DATA EXTRACTION, TERMINAL DEVICE AND COMPUTER-READABLE STORAGE MEDIUM - The present application relates to the technical field of data extraction, and provides a method for data extraction, a terminal device, and a computer-readable storage medium. The method for data extraction determines the target cursor from the ordered cursor group based on the quoted keywords contained in the target instruction when the target instruction for extracting target data from the data set is detected and the cursor group in the data set is the ordered cursor group, and then extracts the target data from the data set based on the target instruction and the target cursor, which provides a basis for the movement extraction or movement processing of sequence data, without considering the limitations of query rules or structured query logic in the data, and improving the efficiency of data extraction. | 2022-04-28 |
20220129504 | METHOD AND DEVICE FOR DISPLAYING REPRESENTATION INDICATOR OF OBJECT - Embodiments of this application provide a method and a device for displaying a representation indicator of an object. In the method for displaying a representation indicator of an object, values of representation indicators of a plurality of monitored objects at a plurality of sampling time points are determined; and image information used to display changes of the representation indicators is generated, where the image information includes the plurality of sampling time points, values of representation indicators of a plurality of objects that meet a sorting requirement at the sampling time points, and association information, and the association information is used to associate values of representation indicators that are at a same sorting position at the sampling time points, to reflect changes of the values of the representation indicators that are at the same sorting position. | 2022-04-28 |
20220129505 | OBJECT STORAGE DATA STORAGE APPROACHES - A method includes receiving, by a processor, a data retrieval command from a host requesting data. In response to the data retrieval command, the method includes searching a mapping for the requested data. The mapping includes a tree structure with a series of nodes and a linked list associated with each node. The method further includes identifying portions of the linked list associated with the requested data and communicating the requested data to the host. | 2022-04-28 |
20220129506 | SINGLE VIEW PRESENTATION OF MULTIPLE QUERIES IN A DATA VISUALIZATION APPLICATION - Embodiments of the present disclosure provide a method, system and computer program product for single view presentation of multiple query. In an embodiment of the disclosure, a method for single view presentation of multiple query includes directing a query against a database along a selected dimension of multiple different elements. In response, a primary result set is received. The result set is then organized into a tabular view of cells according to the selected dimension and values for the selected dimension. Thereafter, a set of nested queries may be directed for each of the elements in the selected dimension against the result set utilizing a different dimension. In response to each directed set of nested queries, a corresponding result set is thus received. Finally, each corresponding result set is inserted into a cell associated with a common one of the elements. | 2022-04-28 |
20220129507 | System and Method for Personalized Query and Interaction Set Generation using Natural Language Processing Techniques for Conversational Systems - A conversational system and a method for personalized query and interaction set generation. The conversational system includes a system server, a business database server, a user device. The system server further includes a system processing unit. The data points are extracted by a system processing unit from a business database server. The system processing unit creates improved multiple datasets that include the grammatically correct query, corresponding responses of the grammatically correct query, and corresponding data points related to the grammatically correct query. The multiple datasets are being fed into the conversational module to train the conversational module. The user sends queries to the system server through the user device. The system processing unit sends a query to the conversational module. The conversation module sends the query to a search engine that searches data and sends data to an answer generating module to send the answer to the user. | 2022-04-28 |
20220129508 | SYSTEM AND METHOD FOR EFFICIENTLY DETERMINING AND DISPLAYING OPTIMAL PACKAGES OF DATA ITEMS - Various systems and methods for aggregating data from disparate sources to determine an optimal package of data items are disclosed. For example, the system described herein can obtain data items from various sources, aggregate and/or organize the data items into an optimal package based on various criteria, and present, via an interactive user interface, the optimal package. Furthermore, the interactive user interface may enable a user to adjust the criteria used to aggregate and/or organize the data items. The system may interactively re-aggregate and re-organize the data items using the adjusted criteria as the user interacts with the package via the user interface. The system and user interface may thus enable the user to optimize the packages of data items based on multiple factors quickly and efficiently. | 2022-04-28 |
20220129509 | DYNAMIC CONFIGURABILITY OF WEB PAGES - A method including accessing a website comprising one or more webpages. The method may also include determining, by a processor, one or more modifications to the one or more webpages of the web site configured to improve a search engine optimization (SEO) of the web site. The method may also include determining, by the processor, software code configured to enact the one or more modifications. The method may also include determining, by the processor, group-specific instructions configured to insert the software code into the one or more webpages of the website via attribute overwriting. The method may also include installing the group-specific instructions into an application stack of the web site so that device browsers executing code of the web site, to render the one or more of the webpages, execute the software code. | 2022-04-28 |
20220129510 | REMOTE EQUIPMENT MONITORING AND CONTROL SYSTEM - A device receives, from a user device, a request for a webpage, where the request is received in response to a scan of bar code affixed to a pump equipment or to an Internet of Things (IoT) device associated with the pump equipment. The device provides to the user device, upon receipt of the request, the webpage, where the webpage includes functionality for monitoring and controlling the pump or the IoT device. The device receives, as first user input from the user device, selection of an operational parameter of the pump and an adjustment to the selected operational parameter. The device sends, to the pump equipment or the IoT device, a message indicating the selected operational parameter and the adjustment to the selected operational parameter to control the selected operational parameter of the pump equipment. | 2022-04-28 |
20220129511 | SEARCH ENGINE FOR CONTENT SEARCHING - A search engine for searching digital content items has been disclosed herein. The search engine may be utilized by one or more users to perform keywords-based search for retrieving digital content items from the World Wide Web or one or more databases in real time. The search engine includes a search bar for receiving keywords from a user for searching relevant digital content items. The search engine further includes searching modes, such as a value mode, a popularity mode, and an expert mode, that is selectable by the user to perform the search. The search engine further includes privacy modes including a private mode and a public mode. One of the privacy modes is selected by the user to set the user's privacy. The search engine may further execute the search request based on the one or more keywords, the selected searching mode, and the set user's privacy. | 2022-04-28 |
20220129512 | CONTENT ITEM AUDIENCE SELECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selecting an audience for content are disclosed. In one aspect, a method includes receiving, from a content item provider, a request to distribute content items to users that have been deemed interested in a particular entity. First users that have expressed an interest in the particular entity are identified. Expansion entities for the particular entity are identified in a knowledge graph. At least one of the expansion entities can be connected to the particular entity by a relationship path. Second users are identified. The second users are deemed interested in the particular entity based on the second users having expressed an interest in an expansion entity. The content items are provided to at least a portion of the first users and at least a portion of the second users. | 2022-04-28 |
20220129513 | AUTONOMOUSLY PROVIDING SEARCH RESULTS POST-FACTO, INCLUDING IN ASSISTANT CONTEXT - Methods, apparatus, and computer readable media related to determining that no resources responsive to a query of a user at a first time satisfy one or more criteria (e.g., one or more quality criteria) and, in response to such a determination: providing for presentation to the user at a later time, content that is based on a given resource that is responsive to the query at the later time and that satisfies the criteria. The given resource that is responsive to the query at the later time may be a resource that is in addition to any resources responsive to the query at the first time or may be a refined version of a resource that was responsive to the query at the first time. | 2022-04-28 |
20220129514 | SYSTEM AND METHOD FOR URL FETCHING RETRY MECHANISM - A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved. | 2022-04-28 |
20220129515 | SYSTEM AND METHOD FOR URL FETCHING RETRY MECHANISM - A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved. | 2022-04-28 |
20220129516 | SYSTEM AND METHOD FOR URL FETCHING RETRY MECHANISM - A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved. | 2022-04-28 |
20220129517 | SERVER SIDE WEB BASED AD STITCHING AND USER SPECIFIC OPTIMIZATION - A request for a page is received. A page structure and content elements associated with the page are determined. An optimized version of the page is provided at least in part by determining dynamically an optimized content element for the page based at least in part on the determined page structure and the determined content elements associated with the page and including the optimized content element as a static element in the optimized version of the page in place of one of the determined content elements that corresponds to a script. | 2022-04-28 |
20220129518 | SYSTEM AND METHOD FOR PROVIDING BOOK-BASED PERSONALIZED SOCIAL MEDIA SERVICE - A system and method for providing a book-based personalized social media service is proposed. The system and method for providing a book-based personalized social media service enables a user to write and post, in the form of a book including a plurality of various pieces of content, a post to be posted on a social media web page that provides the social media service, and manage the book, which is a personally posted post, through management tools in the form of a library and a bookshelf, so as to freely implement and share the content. | 2022-04-28 |
20220129519 | APPARATUS AND METHOD FOR MATRIX MULTIPLICATION USING PROCESSING-IN-MEMORY - Embodiments of apparatus and method for matrix multiplication using processing-in-memory (PIM) are disclosed. In an example, an apparatus for matrix multiplication includes an array of tiles that each include one or more PIM blocks. A PIM block may include a hybrid-mode PIM block that may be configured into a digital mode or an analog mode. The PIM block configured into digital mode may perform operations associated with depth-wise (DW) convolution. On the other hand, a PIM block configured into analog mode may perform operations associated with point-wise (PW) convolution. A controller may be used to configure the PIM block into either digital mode or analog mode, depending on the computations. | 2022-04-28 |
20220129520 | DEEP LEARNING SYSTEM FOR FINITE ELEMENT APPROXIMATION AND STIFFNESS MATRIX GENERATION APPARATUS ACCORDING TO REFERENCE DATA MODEL - The present disclosure includes a data generation unit to generate a normalized finite element as training data, a strain computation unit to compute reference strain values based on the generated training data, a deep learning network including a plurality of layers each having a preset weight and to generate a matching matrix, in which the reference strain values and displacements set for the training data match each other based on arbitrary attribute information and geometric information as position information related to variable points, and a training control unit to train the deep learning network based on a cost function by which differences between strain values computed according to the matching matrix and the reference strain values are equal to or smaller than a threshold value. | 2022-04-28 |
20220129521 | SYSTOLIC DISAGGREGATION WITHIN A MATRIX ACCELERATOR ARCHITECTURE - Embodiments described herein include software, firmware, and hardware logic that provides techniques to perform arithmetic on sparse data via a systolic processing unit. One embodiment provides techniques to optimize training and inference on a systolic array when using sparse data. One embodiment provides techniques to use decompression information when performing sparse compute operations. One embodiment enables the disaggregation of special function compute arrays via a shared reg file. One embodiment enables packed data compress and expand operations on a GPGPU. One embodiment provides techniques to exploit block sparsity within the cache hierarchy of a GPGPU. | 2022-04-28 |
20220129522 | Expanded Kernel Generation - A method comprises receiving a kernel used to convolve with an input tensor. For a first dimension of the kernel, a square block of values for each single dimensional vector of the kernel that includes all rotations of that single dimensional vector is generated. For each additional dimension of the kernel, group blocks of an immediately preceding dimension into sets of blocks, each set of blocks including blocks of the immediately preceding dimension that are aligned along a vector that is parallel to the axis of the dimension; and generate, for the additional dimension, one or more blocks of values, each block including all rotations of blocks within each of the sets of blocks of the immediately preceding dimension. The block of values corresponding to the last dimension in the additional dimensions of the kernel is output as the expanded kernel. | 2022-04-28 |
20220129523 | METHOD, CIRCUIT, AND SOC FOR PERFORMING MATRIX MULTIPLICATION OPERATION - A method for performing a matrix multiplication operation is provided. The method includes: obtaining a matrix B | 2022-04-28 |
20220129524 | OPTIMIZATION FOR DECONVOLUTION - Disclosed herein includes a system, a method, and a device for improving computational efficiency of deconvolution by reducing a number of dot products. In one aspect, an input image having a set of pixels is received. A first dot product may be performed on a subset of the set of pixels of the input image and a portion of a kernel, to generate a first pixel of an output image. A number of multiplications performed for the first dot product performed may be less than a number of elements of the kernel. A second dot product on a remaining portion of the kernel to generate the first pixel of the output image may be bypassed. | 2022-04-28 |
20220129525 | METHOD AND SYSTEM FOR GENERATING AND VERIFYING LICENSES WITH MULTIPLE SIGNATURES - A method for verifying licenses is performed by a legacy management controller (LMC) and a non-legacy management controller (NLMC). The method includes obtaining, by the LMC, a first license installation request and a license, wherein the license comprises license data and a plurality of signatures; in response to the first license installation request: making a first determination, by the LMC, that a first signature of the plurality of signatures is valid; in response to the first determination: installing, by the LMC, the license on the LMC; obtaining, by the NLMC, a second license installation request and the license; in response to the second license installation request: making a second determination, by the NLMC, that a second signature of the plurality of signatures is valid; and in response to the second determination: installing, by the NLMC, the license on the NLMC. | 2022-04-28 |
20220129526 | DATA PROVENANCE TRACKING SERVICE - Disclosed in some examples are methods, systems, devices, and machine-readable mediums which utilize digital tracking tags attached to data to monitor and/or control the data as it moves between applications and/or computing devices. The digital tracking tag may be embedded in the data (e.g., as a digital watermark) or associated with the data e.g., as metadata. In some examples, the digital tracking tag may include an address of a tracking database with which to record one or more events related to the data. For example, recipients, senders, or other participants in a data transfer event may register the data transfer event with the tracking database. | 2022-04-28 |
20220129527 | Secure Reduced Power Mode - Techniques are disclosed relating to maintaining device security associated with reduced power modes. In some embodiments, a computing device receives a request to place the computing device in a reduced power mode in which a first memory of the computing device is powered off. Based on the request, the computing device offloads a memory page from the first memory to a second memory such that the offloading includes encrypting the memory page. Based on a request to resume from the reduced power mode, the computing device restores the memory page from the second memory to the first memory such that the restoring includes decrypting the encrypted memory page. After initiating the restoring, the computing device presents a user authentication prompt asking for a user credential. | 2022-04-28 |
20220129528 | Platform Agnostic Object Processing - The present disclosure describes an integration platform providing a secure collaboration platform that simplifies and optimizes interactions between multiple users by facilitating secure cross-platform communications among users of the platform. Additionally, the present platform can provide a designated collaboration workspace for interactions within the platform. | 2022-04-28 |
20220129529 | BIOMETRIC-VALIDATED CHARACTER PASSWORD AUTHENTICATION PROCEDURE - A computing device for generating and communicating a linear security code sequence, individual ones or combinations of the generated security code sequence associated with at least one device-generated bio signature from a user operating the device, the device comprising a computer housing, a power source, a micro controller, a boot device, a memory device, a wireless communications chip or modem, an electronic display, and a data entry interface. | 2022-04-28 |
20220129530 | METHOD FOR CONTROLLING AN ACCESS DEVICE AND AN ACCESS SYSTEM - A method for controlling an access device and an access system. The method includes a verification step for verifying a user. The verification step includes receiving, in the access device, a biometric input of the user, detecting, by the access device, the mobile user device in proximity of the access device and receiving, in the mobile user device, the biometric input from the access device when the mobile user device is detected by the access device. The method further includes maintaining, in the mobile user device, one or more digital biometric templates, and determining, by the mobile user device, verification of the user based on the biometric input received in the mobile user device and the one or more digital biometric templates. | 2022-04-28 |
20220129531 | OPTIMIZED PRIVATE BIOMETRIC MATCHING - A homomorphic encryption scheme, such as Paillier encryption in combination with a bit packing process allows biometric matching at a terminal without exposing a biometric template stored at a user's device. Because such encryption schemes are data intensive, the bit packing process allows reductions in data being sent and processed so that the biometric matching process can be accomplished in near real time. The high speed of this optimized process allows the technique to be applied to many real world processes such as access control and transaction processing. | 2022-04-28 |
20220129532 | BIOMETRIC IDENTIFICATION PLATFORM - An improved authentication, identification, and/or verification system is provided in various embodiments. The system is provided for use in relation to provisioning access or establishing identity in relation to one or more human users, and may be used in a single site/scenario/system, or across multiple sites/scenarios/systems. A combination of biometric modalities and authentication mechanisms having diverse characteristics are utilized to establish identity, the diverse characteristics being utilized to modify aspects of identity management and access provisioning. | 2022-04-28 |
20220129533 | CONTROL SYSTEM AND CONTROL METHOD - A technique for managing, in a centralized manner, user accounts in a control system which includes two or more units is provided. A control system ( | 2022-04-28 |
20220129534 | ELECTRONIC AUTHENTICATION SYSTEM, DEVICE AND PROCESS - Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more processing devices to facilitate and/or support one or more operations and/or techniques for authenticating an identity of a subject. In particular, some embodiments are directed to techniques for authentication of an identity of a subject as being an identity of a particular unique individual based, at least in part, on involuntary responses by the subject to sensory stimuli. | 2022-04-28 |
20220129535 | EDGE COMPUTING DEVICE WITH CONNECTOR PIN AUTHENTICATION FOR PERIPHERAL DEVICE - A computing device is provided that includes a processor having a plurality of pins that are electrically coupled to a plurality of pins of a connector, and a memory device storing a state table that maps the plurality of pins of the connector to a plurality of connection types. The processor is configured to perform an authentication process for at least one connection type to determine whether an authenticated device configured for the at least one connection type is coupled to the connector. The authentication process is performed at least in part by sending an authentication signal to one or more of the plurality of pins of the connector mapped to the at least one connection type, and receiving an expected authentication signal response on one or more of the plurality of pins of the connector mapped to the at least one connection type. | 2022-04-28 |
20220129536 | DEVICE ACCESS CONTROL SYSTEM - A device access control system includes a first computing system that is coupled to a second computing system via a network, and that includes a device access controller subsystem coupled to devices, a central processing subsystem, and a device access control manager subsystem. The device access control manager subsystem identifies first application(s) configured for provisioning by the central processing subsystem and second application(s) configured for provisioning by the second computing system, configures the device access controller subsystem to provide the central processing subsystem access to a first subset of the devices to allow the central processing subsystem to provide the first application(s), and configures the device access controller subsystem to provide the second computing system access via the device access control manager subsystem to a second subset of the devices to allow the second computing device to provide the second application(s) using the second subset of the devices. | 2022-04-28 |
20220129537 | CONFIGURATION AUTHENTICATION PRIOR TO ENABLING ACTIVATION OF A FPGA HAVING VOLATILE CONFIGURATION-MEMORY - A method and system for authenticating and enabling activation of a configuration used for controlling a product, where the configuration is implemented as safety critical logic functions in programmable logic blocks of a Field Programmable Gate Array, FPGA, having a volatile configuration-memory. The configuration is loaded into the volatile configuration-memory of the FPGA via an external interface input of the FPGA. The content of the configuration-memory of the FPGA is read via an interface of the FPGA. This is done immediately after completed loading of the configuration into the memory of the FPGA. A Cyclic Redundancy Check, CRC, checksum of the read content of the configuration-memory is computed in an CRC checksum generator, and a resulting generated CRC checksum value is compared with an externally stored valid CRC checksum value of the expected FPGA configuration. It is then checked if the generated CRC checksum value and the stored valid CRC checksum value match and the outputs of selected logic functions of the FPGA are enabled only if the generated CRC check value and the stored valid CRC checksum values match. | 2022-04-28 |
20220129538 | PASSWORD INTEGRITY SCORING - Examples of password integrity scoring are described. In an example, an integrity score for a password may be determined based on a comparison of the password with a set of passwords for multiple users stored in a database. In some examples, the set of passwords may include in-use passwords and previously-used passwords for the multiple users. In some examples, the password may be stored into the database for scoring future passwords. | 2022-04-28 |
20220129539 | EMBEDDING SECURITY REQUIREMENTS IN CONTAINER IMAGES - Embodiments of the present disclosure relate to specifying security settings for containers and extracting and applying such security settings from container images provided by e.g., developers or vendors of an application. More specifically, a developer of an application may determine a minimum level of security that is necessary for the application to operate and generate custom security settings based on the determined minimum level of security. The custom security settings may be embedded into a container image corresponding to the application. A user of the application may retrieve the container image and extract the custom security settings and compare them to default security settings. In response to determining that the custom security settings are a subset of the default security settings, the custom security settings may be applied to a container that is run based on the container image. | 2022-04-28 |
20220129540 | RUNTIME SECURITY ANALYTICS FOR SERVERLESS WORKLOADS - Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats. | 2022-04-28 |
20220129541 | CONTAINERS SYSTEM AUDITING THROUGH SYSTEM CALL EMULATION - Embodiments of the present disclosure provide a substitute audit log for use by applications in the user-space of a host operating system to write audit information. When a container makes a system call attempting to write audit information to an audit log of the kernel, the kernel may utilize a predefined set of instructions indicating how to detect such system calls and how such system calls are to be modified so as to reroute the system call to an unprivileged socket. The kernel write the audit information of the system call to an unprivileged socket that is connected to a substitute audit log. A container management program monitoring the unprivileged socket may write the audit information to the substitute log which is defined in container specific directories of the container. | 2022-04-28 |
20220129542 | DETERMINISTIC TRUSTED EXECUTION CONTAINER THROUGH MANAGED RUNTIME LANGUAGE METADATA - Various embodiments are generally directed to an apparatus, system, and other techniques for executing program code, such as managed runtime language, entirely in a hardware trusted execution environment (TEE) while enforcing and abiding by security requirements. Components in the TEE may receive the program, which may include metadata, perform analysis on the metadata, determine whether any API should be disabled from accessing untrusted resources, and execute an exception if the API attempts to access an untrusted resource. One or more security domains may be used in the TEE along with respective protection keys to enhance and maintain security. | 2022-04-28 |
20220129543 | SECURE VOICE INTERFACE IN A STREAMING MEDIA DEVICE TO AVOID VULNERABILITY ATTACKS - An apparatus, method, and computer-readable recording medium receives secure voice commands by an application executing within a smart media device while attached to the Internet. A controller of a smart media device activates an application within the smart media device, determines whether or not the application uses secure voice commands, and when the smart media device determines that the application uses secure voice commands, performs the following: enables the trusted execution environment to receive and decrypt the encrypted audio data and generate application commands corresponding to processing decrypted voice commands, receives, by the application, application commands corresponding to processing decrypted voice commands, and performs the application commands. | 2022-04-28 |
20220129544 | Apparatus and Method for Disk Attestation - In a method for software attestation, an enclave including an operating system (OS) library is initialized in a trusted execution environment, wherein software attestation is performed to verify an identity of the enclave, wherein an application is executed inside the enclave using the OS library, and wherein performing the software attestation includes attestation of a content of a disk image associated with the application. | 2022-04-28 |
20220129545 | FAULT INJECTION ATTACK SYSTEM - Disclosed is a fault injection attack method including determining a trigger start point in time based on an input signal for a crypto device; determining a trigger end point in time based on an output signal of the crypto device; setting a trigger based on the trigger start point in time and the trigger end point in time; and performing a fault injection attack based on the set trigger. | 2022-04-28 |
20220129546 | SYSTEM LEVEL FUNCTION BASED ACCESS CONTROL FOR SMART CONTRACT EXECUTION ON A BLOCKCHAIN - Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains. | 2022-04-28 |
20220129547 | APPARATUS AND METHOD FOR PREVENTING SIDE CHANNEL ATTACK FOR NTRU LPRime ALGORITHM - A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an N | 2022-04-28 |
20220129548 | DATA LEAKAGE AND MISUSE DETECTION - A computer-implemented system and method for a data leakage and misuse detection system comprises receiving an evaluation dataset A, and building a signature of the evaluation dataset A (sig(A)), where A signature of a dataset is a multi-level evaluation data abstraction representation of the dataset. The method further comprises building a signature for each of existing datasets B (B1, B2, . . . , Bn) (sig(B | 2022-04-28 |
20220129549 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SOFTWARE IN NVME OVER FABRICS DEVICES - A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data. | 2022-04-28 |
20220129550 | Method for constructing behavioural software signatures - A method for constructing behavioral software signatures. The method includes: embedding execution traces of a set of software in a vector space, an execution trace of a software agent including at least one event and being representative of the execution of the software, the embedding representing an event of the execution trace by a vector encoding a context for occurrence of the event; partitioning the vectors associated with the software of the set to generate a data group representative of a behavior, a behavioral label being associated with the data group; associating a behavioral label with a vector, which is representative of the data group to which the vector belongs, and associating a trace of behavioral labels with a trace of vectors, the trace of labels being representative of execution of a software agent, and extracting in the trace of labels at least one behavioral signature associated with the software. | 2022-04-28 |
20220129551 | FILE INTEGRITY MONITORING - A file integrity monitoring system supports monitoring of system-critical, enterprise-critical and user-critical data by reporting events to a threat management facility in response to changes in certain files, folders, registry keys and registry values of the computing environment in which the system is operating and/or monitoring. The file integrity monitoring system may dynamically create, adapt and apply context-based rules to improve the sensitivity and relevance of reported events to undesirable changes in the data footprint of a monitored device. | 2022-04-28 |
20220129552 | USE OF DATA ENTANGLEMENT FOR IMPROVING THE SECURITY OF SEARCH INDEXES WHILE USING NATIVE ENTERPRISE SEARCH ENGINES AND FOR PROTECTING COMPUTER SYSTEMS AGAINST MALWARE INCLUDING RANSOMWARE - A method for preprocessing cleartext strings is provided. In some embodiments, the method includes creating dynamic multidimensional spaces based on a key. The method further includes creating a position specific variability for the cleartext strings to form a preprocessed strings, where characters that appear in different positions within the cleartext strings are encoded differently in the preprocessed strings. The method also include applying encryption to the preprocessed strings or to preprocessed string fragments to form encrypted preprocessed strings, wherein the encrypted preprocessed strings are searchable in a search index. | 2022-04-28 |
20220129553 | SYSTEM AND METHOD FOR IMPLEMENTING ADDED SERVICES FOR OBD2 SMART VEHICLE CONNECTION - Novel tools and techniques might provide for implementing Internet of Things (“IoT”) functionality, and, in particular embodiments, implementing added services for OBD2 connection for IoT-capable vehicles. In various embodiments, a portable device (when connected to an OBD2 DLC port of a vehicle) might monitor wireless communications between a vehicle computing system(s) and an external device(s), might monitor vehicle sensor data from vehicular sensors tracking operational conditions of the vehicle, and might monitor operator input sensor data from operator input sensors tracking input by a vehicle operator. The portable device (or a server) might analyze either the monitored wireless communications or a combination of the monitored vehicle sensor data and the monitored operator input sensor data, to determine whether vehicle operation has been compromised. If so, the portable device (or the server) might alert the operator of the vehicle via a user interface, and might initiate one or more remediation operations. | 2022-04-28 |
20220129554 | DETECTING MALWARE VIA SCANNING FOR DYNAMICALLY GENERATED FUNCTION POINTERS IN MEMORY - Techniques for detecting malware via scanning for dynamically generated function pointers in memory are disclosed. In some embodiments, a system/process/computer program product for detecting malware via scanning for dynamically generated function pointers in memory includes detecting a dynamically generated function pointer in memory based on an analysis of monitored changes in memory during execution of a malware sample in a computing environment; and generating a signature based on detection of the dynamically generated function pointer in memory, wherein the malware sample was determined to be malicious. | 2022-04-28 |
20220129555 | INCREASING CONFIDENCE SCORES VIA DCF EQUATION MAPPING AND AUTOMATED STREAM INSPECTION - One example method includes receiving a data stream at a node of a data confidence fabric that comprises a group of nodes that are each operable to assign trust metadata to data of the data stream, inspecting the data stream to determine a data type of data in the data stream, accessing a configuration file that applies to all the nodes of the data confidence fabric, and obtaining an equation from the configuration file, mapping the equation to the data, performing a trust insertion process on the data, as specified in the equation, and generating trust metadata that is associated with the data and based on the trust insertion process. | 2022-04-28 |
20220129556 | Systems and Methods for Implementing Smart Assistant Systems - In one embodiment, a system includes an automatic speech recognition (ASR) module, a natural-language understanding (NLU) module, a dialog manager, one or more agents, an arbitrator, a delivery system, one or more processors, and a non-transitory memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to receive a user input, process the user input using the ASR module, the NLU module, the dialog manager, one or more of the agents, the arbitrator, and the delivery system, and provide a response to the user input. | 2022-04-28 |
20220129557 | CONFIGURABLE CODE SIGNING SYSTEM AND METHOD - A system is provided for configurably signing a secure data image that includes software code that interprets cryptographic atomic code. In the system, a code signing engine includes an interpreter that interprets atomic code signing operations presented in a recipe defined by a system administrator according to configuration parameter values supplied with the input image. | 2022-04-28 |
20220129558 | IMAGE FORMING APPARATUS, FIRMWARE MANIPULATION PREVENTION METHOD, AND COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM CONTAINING MANIPULATION PREVENTION PROGRAM - An image forming apparatus connectable to a network includes a non-volatile auxiliary storage device containing firmware that causes the image forming apparatus to operate, a manipulation detection device that decides whether the firmware stored in the auxiliary storage device has been manipulated, using the digital signature, a firmware restoration device that deletes the firmware decided to have been manipulated, and installs the firmware provided by another image forming apparatus, a firmware provision device, and a control device. The auxiliary storage device contains firmware that realizes the manipulation detection device, the firmware restoration device, the firmware provision device, and the control device in a boot block writing in which is restricted. | 2022-04-28 |
20220129559 | Endpoint Authentication based on Boot-Time Binding of Multiple Components - A system, method and apparatus to authenticate an endpoint having a secure memory device. For example, at boot time of the endpoint, a cryptographic hash value of the boot loader stored in the memory device is used to generate a device identifier of the memory device; and identification data of multiple components of the endpoint is used with the device identifier of the memory device to generate a first key pair key and a second key. A counter value is retrieved from a monotonic counter to generate a certificate signed using a private key in the first key pair. The certificate can be sent over the computer network to a remote server for authentication using a public key in the first key pair. The second key pair can be authenticated and used to establish encryption for a communication connection between the endpoint and the server. | 2022-04-28 |
20220129560 | AUTOMATED HEALTH-CHECK RISK ASSESSMENT OF COMPUTING ASSETS - Systems and techniques that facilitate automated health-check risk assessment of computing assets are provided. In various embodiments, a system can comprise a baseline component that can generate a baseline health-check risk score that corresponds to non-compliance of a computing asset with a stipulated control. In various aspects, the system can further comprise an adjustment component that can adjust the baseline health-check risk score based on a weakness factor of the stipulated control. In some cases, the weakness factor can be based on a magnitude by which a state of the computing asset deviates from the stipulated control. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on an environmental factor of the computing asset. In various cases, the environmental factor can be based on security mechanisms or security protocols associated with the computing asset. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on a criticality factor. In some instances, the critical factor can be based on a level of importance of the computing asset. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on a maturity factor. In some aspects, the maturity factor can be based on a difference between the stipulated control and a recommended control. | 2022-04-28 |
20220129561 | SECURITY LEVEL-BASED AND TRUST-BASED RECOMMENDATIONS FOR SOFTWARE COMPONENTS - A method includes accessing an input representing a software component list for a software product. The software component list contains information for a given software component. The method includes accessing a knowledge base to determine security level parameters and trust parameters for the given software component based on the information. A security level of the given software component is determined based on an evaluation of the security level parameters. A trust of a source of the given software component is determined based on an evaluation of the trust parameters. The method includes determining a security context of the software product. Based on the security level, the trust and the security context, the method includes providing a recommendation for the given software component. | 2022-04-28 |
20220129562 | EXPLOIT DETECTION VIA INDUCED EXCEPTIONS - Examples of the present disclosure describe systems and methods for exploit detection via induced exceptions. One embodiment of a method can include generating an inspection point, the inspection point causing an exception when a set of software instructions encounters the inspection point during an execution of the set of software instructions by a processor, registering an exception handler to handle the exception associated with by the inspection point; receiving, in response to the set of software instructions encountering the inspection point, an indication of an exception, accessing a context record associated with the execution of the set of software instructions, evaluating the context record to determine if an exploit is present using the first reputation information, and based on a determination that an exploit is present, performing a corrective action for the exploit. | 2022-04-28 |
20220129563 | COMPUTER SYSTEM WITH MOVING TARGET DEFENSES AGAINST VULNERABILITY ATTACKS - A computer system includes an ensemble moving target defense architecture that protects the computer system against attack using one or more composable protection layers that change each churn cycle, thereby requiring an attacker to acquire information needed for an attack (e.g., code and pointers) and successfully deploy the attack, before the layers have changed state. Each layer may deploy a respective attack information asset protection providing multiple respective attack protections each churn cycle, wherein the respective attack information asset protections may differ. | 2022-04-28 |
20220129564 | CENTRALIZED SECURITY ANALYSIS AND MANAGEMENT OF SOURCE CODE IN NETWORK ENVIRONMENTS - Disclosed embodiments relate to systems and methods for centrally analyzing and managing source code. Techniques include identifying, at a centralized resource in a network environment, a first source code; identifying the first source code as a candidate for an execution of an access control action; identifying, at the centralized resource, a security risk indication for the first source code, the security risk indication being based on permissions associated with a functionality of the first source code; performing, based on the security risk indication, at least one of: developing a least privilege set of permissions for the source code, or modifying the least privilege set of permissions. | 2022-04-28 |
20220129565 | OPERATION METHOD, OPERATION APPARATUS, AND DEVICE - A storage circuit stores secret information. A software processing circuit obtains an operation task and generates scheduling instructions corresponding to the operation task. After receiving the scheduling instructions, a hardware processing circuit obtains the secret information from the storage circuit when the flag bit in the scheduling instruction is a valid value, determines, based on the secret information, data addresses of one or more pieces of operation data required for completing the operation corresponding to the scheduling instruction, and obtains the one or more pieces of operation data based on the data addresses to complete the operation corresponding to each scheduling instruction. | 2022-04-28 |
20220129566 | SECURE APPLICATION EXECUTION IN A DATA PROCESSING SYSTEM - A data processing system includes a rich execution environment, a hardware accelerator, a trusted execution environment, and a memory. The REE includes a processor configured to execute an application. A compute kernel is executed on the hardware accelerator and the compute kernel performs computations for the application. The TEE provides relatively higher security than the REE and includes an accelerator controller for controlling operation of the hardware accelerator. The memory has an unsecure portion coupled to the REE and to the TEE, and a secure portion coupled to only the TEE. The secure portion is relatively more secure than the unsecure portion. Data that is to be accessed and used by the hardware accelerator is stored in the secure portion of the memory. In another embodiment, a method is provided for securely executing an application is the data processing system. | 2022-04-28 |