20th week of 2020 patent applcation highlights part 52 |
Patent application number | Title | Published |
20200151323 | SYSTEM AND METHODS FOR MINIMIZING ORGANIZATION RISK FROM USERS ASSOCIATED WITH A PASSWORD BREACH - System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach. Utilizing information from such a test identifies users that have weak passwords, reused passwords or shared passwords that have been associated with an earlier breach. With this information, the organization can seek to reduce risk by training staff for this specific issue in a timely and appropriate manner to significantly reduce the risk of a future breach by those identified users. Training can be customized and targeted at those users who attempt to use passwords that have been associated with a breach (either of their own account or of another account on the same or related domain. | 2020-05-14 |
20200151324 | Security for Active Data Request Streams - Securing data exchanged between components such as hardware sub-systems of a computing device (e.g., internal communications) during a request-response cycle is desirable. In some implementations, methods and systems as disclosed to secure computing devices against attackers attempting to take physical control of a computer system (or portion thereof) to compromise the system or steal data managed by the computer system. In one example, data transmission request from sender to a receiver may be identified and associated with a unique identifier to individually identify the data transmission request (e.g., a request internal to the computer system). The request may then be provided to the receiver and a later response may be identified and validated prior to returning the response data to the requestor. The validation may include ensuring an associated tag (e.g., unique identifier) is provided with the response to tie it to the request for which the response is being sent. | 2020-05-14 |
20200151325 | System and Method for Operating a Protected Endpoint Device - A method, system and computer-usable medium are disclosed for operating a protected endpoint. In various embodiments, operation of the protected endpoint device comprises: receiving, at an endpoint collector operating on the protected endpoint device, information corresponding to activities occurring on an endpoint platform; placing, by the endpoint collector, a plurality of events corresponding to the activities on a message bus; receiving, at an endpoint agent, one or more of the plurality of events from the message bus; selectively processing, by the endpoint agent, one or more of the plurality of events received on the message bus, wherein the plurality of events selectively processed by the endpoint agent are events to which the endpoint agent has subscribed; and providing a service connection between the endpoint agent and a software service, wherein communications between the endpoint agent and software service include information corresponding to one or more of the subscribed events. | 2020-05-14 |
20200151326 | SYSTEM AND METHOD TO INFER INVESTIGATION STEPS FOR SECURITY ALERTS USING CROWD SOURCING - Techniques are provided to dynamically generate response actions that may be used to investigate and respond to a security alert. Different prediction models are initially trained using a corpus of training data. This training data is obtained by identifying previous security alerts and then grouping together alert clusters. An analysis is performed to identify which steps were used to respond to the alerts in each group. These steps are fed into a prediction model to train the model. After multiple models are trained and after a new security alert is received, one model is selected to operate on the new alert, where the model is selected because it is identified as being most compatible with the new alert. When the selected model is applied to the new alert, the model generates a set of recommended steps that may be followed to investigate and/or respond to the new alert. | 2020-05-14 |
20200151327 | System and Method for Operating a Collector at an Endpoint Device - A method, system and computer-usable medium are disclosed for operating a collector at an endpoint device are disclosed. Certain embodiments include a computer-implemented method for operating an endpoint collector at an endpoint device, including: receiving, at an endpoint collector operating on the endpoint device, information corresponding to activities occurring on an endpoint platform; receiving, at the endpoint collector, one or more filter definitions; and selectively placing, by the endpoint collector, a plurality of events on a message bus, wherein a determination as to which events are placed by the endpoint collector on the message bus is based on the one or more filter definitions. Certain embodiments may include corresponding stand-alone and/or network computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform one or more of these actions. | 2020-05-14 |
20200151328 | System and Method for Operating an Endpoint Agent at an Endpoint Device - A method, system and computer-usable medium are disclosed for operating an endpoint agent at an endpoint device. Certain embodiments include a computer-implemented method for operating an endpoint agent at an endpoint device, including: operating the endpoint agent to selectively subscribe to events corresponding to activities occurring at an endpoint platform; processing events received from a message bus by the endpoint agent, where the events processed by the endpoint agent are events to which the endpoint agent has subscribed; and communicating, to a service, information corresponding to the events processed by the endpoint agent. Other embodiments of this aspect of the invention may include corresponding stand-alone and/or network computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform one or more of these actions. | 2020-05-14 |
20200151329 | System and Method for Operating an Endpoint Core at an Endpoint Device - A method, system and computer-usable medium are disclosed for operating an endpoint court at an endpoint device. Certain embodiments include a computer-implemented method for operating an endpoint core at an endpoint device, the method including: receiving an event subscription request from an endpoint agent over a message bus; and managing communication of events for processing by the endpoint agent based on the event subscription request so that events to which the endpoint agent has subscribed are selectively processed at the endpoint agent. Certain embodiments may include corresponding stand-alone and/or network computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform one or more of these actions. | 2020-05-14 |
20200151330 | COUNTER-FRAUD OPERATION MANAGEMENT - Disclosed aspects relate to counter-fraud operation management. A counter-fraud operation may be executed using an initial set of parameter values for a set of parameters of the counter-fraud operation. A set of user counter-fraud activities of a user may be monitored corresponding to a user interface. A set of user feedback data may be captured to determine a feedback-driven set of parameter values for a set of parameters of the counter-fraud operation. The feedback-driven set of parameter values may be determined for the set of parameters of the counter-fraud operation. The counter-fraud operation using the feedback-driven set of parameter values may be executed. | 2020-05-14 |
20200151331 | IMAGE DATA ALTERATION DETECTION DEVICE, IMAGE DATA ALTERATION DETECTION METHOD, AND DATA STRUCTURE OF IMAGE DATA - To provide an image data alteration detection device, an image data alteration detection method, and a data structure of image data that can easily detect an alteration in image data. Metadata in image data includes a first hash value calculated based on predetermined data, a second hash value calculated based on a character string of a script, and the script. An image alteration detection device calculates a third hash value based on the predetermined data and the script included in the metadata, calculates a fourth hash value based on a character string of the script included in the metadata, compares the first hash value included in the metadata with the calculated third hash value and the second hash value included in the metadata with the calculated fourth hash value, and detects that the image data is altered when one of the values is not equal. | 2020-05-14 |
20200151332 | SYSTEM AND METHOD OF PROTECTING CLIENT COMPUTERS - A threat response platform to act as a bridge between non-inline security programs and inline security programs. The threat response platform receives event reports, relating to client devices, from the non-inline security programs and creates incident reports for a user. The incident reports describe the event report and also additional data gathered by an active correlation system of the threat response platform. The active correlation system automatically gathers various types of data that are potentially useful to a user in determining whether the reported event is an incidence of malware operating on the client device or a false positive. The active correlation system places a temporary agent on the client device to identify indications of compromise. | 2020-05-14 |
20200151333 | IMAGE FORMING APPARATUS AND CONTROL PROGRAM FOR IMAGE FORMING APPARATUS - An image forming apparatus includes: a hardware processor that detects multiple files stored in the external storage when an external storage is installed to the image forming apparatus, determines a scan order of each of the multiple files detected by the hardware processor, and scans each of the multiple files for viruses in the scan order; and an acceptor that accepts a print instruction for a file stored in the external storage, wherein the hardware processor determines whether it is necessary to execute virus scanning on a print target file before printing depending on whether the hardware processor has completed virus scanning on the print target file, which is the file for which the print instruction has been accepted by the acceptor. | 2020-05-14 |
20200151334 | INFORMATION PROCESSING APPARATUS CAPABLE OF DETECTING SOFTWARE TAMPERING AND CONTROL METHOD THEREFOR - An information processing apparatus includes a verification unit that performs verification of software to be executed by an execution unit, a retaining unit that retains information indicating a voltage supposed to be applied to the execution unit, a power supply unit that applies a predetermined voltage to the execution unit on the basis of the information, and a clock signal output unit that outputs clock signals having frequencies, and the clock signal output unit outputs a clock signal having a first frequency to the verification unit when verification of the software is performed, outputs a clock signal having a second frequency lower than the first frequency to the execution unit before the predetermined voltage is applied to the execution unit, and outputs a clock signal having a third frequency higher than the second frequency to the execution unit after the predetermined voltage is applied to the execution unit. | 2020-05-14 |
20200151335 | SECURE OVER-THE-AIR FIRMWARE UPGRADE - Methods, systems, devices and apparatuses for securely providing an over-the-air firmware upgrade. The system includes an embedded device configured to receive the firmware upgrade. The system includes a server having a memory configured to store a first key encryption key, the firmware upgrade and a firmware key and having a processor coupled to the memory. The processor is configured to obtain the firmware upgrade, the firmware key and the first key encryption key. The processor is configured to encrypt the firmware upgrade using the firmware key. The processor is configured to encrypt the firmware key with the first key encryption key and transmit the encrypted firmware upgrade and the encrypted firmware key to the embedded device. | 2020-05-14 |
20200151336 | SECURE BOOT ASSIST FOR DEVICES, AND RELATED SYSTEMS, METHODS AND DEVICES - Systems, methods, and devices of the disclosure relate, generally, to secure boot assist for devices. In one or more embodiments, a first device includes firmware that needs to be verified as secure as part of a secure boot process, and a second device assists the first device to secure the secure boot process. In some embodiments the second device verifies security of the firmware responsive to security data provided by the first device, or verifies security of a program provided by the first device, the program for verifying security of the firmware. In some embodiments the second device provides a program for verifying security of the firmware to the first device. | 2020-05-14 |
20200151337 | PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS - Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers. | 2020-05-14 |
20200151338 | PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS - Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers. | 2020-05-14 |
20200151339 | PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS - Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers. | 2020-05-14 |
20200151340 | MONITORING A BLOCKCHAIN - Provided is a method for monitoring a blockchain including the following steps: evaluating a characteristic of a physical infrastructure on which the blockchain is based; comparing the determined evaluation to a predetermined parameter; and outputting a signal if the evaluation is less than the predetermined parameter. | 2020-05-14 |
20200151341 | SECURITY OF AUTHENTICATION DATA ON MOBILE DEVICES - Embodiments disclosed herein describe systems and methods for providing secure entry of authentication data on computing devices, such as mobile devices. In some embodiments, the systems and methods are implemented on a mobile device having one or more vibration motors configured to operate at one or more speeds, and a touch-sensitive display. The mobile device may determine that an application executing on the mobile device is requesting entry of authentication data from a user via the touch-sensitive display. The mobile device may detect entry of a first character of the authentication data from the user. During the entry of the first character of authentication data, the mobile device activates a vibration motor at a first speed. | 2020-05-14 |
20200151342 | APPARATUS AND METHOD FOR UNBREAKABLE DATA ENCRYPTION - An encryption specification named “MetaEncrypt” implemented as a method and associated apparatus is disclosed for unbreakable encryption of data, code, applications, and other information that uses a symmetric key for encryption/decryption and to configure the underlying encryption algorithms being utilized to increase the difficulty of mathematically modeling the algorithms without possession of the key. Data from the key is utilized to select several encryption algorithms utilized by MetaEncrypt and configure the algorithms during the encryption process in which block sizes are varied and the encryption technique that is applied is varied for each block. Rather than utilizing a fixed key of predetermined length, the key in MetaEncrypt can be any length so both the key length and key content are unknown. MetaEncrypt's utilization of key data makes it impossible to model its encryption methodology to thereby frustrate cryptographic cracking and force would be hackers to utilize brute force methods to try to guess or otherwise determine the key. | 2020-05-14 |
20200151343 | Apparatus and method for unbreakable data encryption - An encryption specification named “MetaEncrypt” implemented as a method and associated apparatus is disclosed for unbreakable encryption of data, code, applications, and other information that uses a symmetric key for encryption/decryption and to configure the underlying encryption algorithms being utilized to increase the difficulty of mathematically modeling the algorithms without possession of the key. Data from the key is utilized to select several encryption algorithms utilized by MetaEncrypt and configure the algorithms during the encryption process in which block sizes are varied and the encryption technique that is applied is varied for each block. Rather than utilizing a fixed key of predetermined length, the key in MetaEncrypt can be any length so both the key length and key content are unknown. MetaEncrypt's utilization of key data makes it impossible to model its encryption methodology to thereby frustrate cryptographic cracking and force would be hackers to utilize brute force methods to try to guess or otherwise determine the key. | 2020-05-14 |
20200151344 | DISTRIBUTED DATA METHOD FOR ENCRYPTING DATA - Techniques for performing data encryption on data to be stored within a storage system are provided. A client application executing on a host machine may generate a data storage write request to write data to a storage system. A host-side module, executing on the host machine receives the write request. The host-side module is configured to generate one or more fingerprints for the data corresponding to the write request, where the one or more fingerprints are unique identifiers used to identify data blocks that make up the data. The host-side module generates encrypted data by encrypting the data blocks using an encryption technique. The encrypted data is then sent to a storage node within the storage system. Deduplication may be performed on the encrypted data using the one or more generated fingerprints. | 2020-05-14 |
20200151345 | SYSTEMS AND METHODS FOR SCREENSHOT MEDIATION BASED ON POLICY - In some aspects, a method for mediation of a screenshot capture by a client application based on policy includes identifying, by a client application on a client device, a policy for mediating one or more screenshots of content displayed via the client application. An embedded browser within the client application accesses a network application of one or more servers. The method further includes intercepting, by the client application, a request to capture a screenshot of at least a portion of the network application being displayed, determining, by the client application, one or more mediation actions to perform on the screenshot responsive to the policy, performing, by the client application, the one or more mediation actions on the screenshot, and providing, by the client responsive to the request, the screenshot resulting from the one or more mediation actions. | 2020-05-14 |
20200151346 | METHOD AND SYSTEM FOR IMPLEMENTING A CLOUD MACHINE LEARNING ENVIRONMENT - An embodiment of the present invention is directed to leveraging GPU farms for machine learning where the selection of data is self-service. The data may be cleansed based on a classification and automatically transferred to a cloud services platform. This allows an entity to leverage the commoditization of the GPU farms in the public cloud without exposing data into that cloud. Also, an entire creation of a ML instance may be fully managed by a business analyst, data scientist and/or other users and teams. | 2020-05-14 |
20200151347 | SYSTEM AND METHOD FOR REVERSE-TURING BOT DETECTION - A system for controlling access to hosted services using computer generated question answer sets is described. The question answer sets are generated and include relationships which are designed to distinguish between human and automated system interpretation through the inclusion of a dynamically established transformation of characteristics in relation to objects described in the question answer sets. The dynamically established transformation provides an additional defense against malicious neural networks used to overcome mechanisms for distinguishing between humans and automated systems. Corresponding methods and devices are contemplated. In an additional embodiment, a decoy set of answer sets are also established to maintain a blacklisted set of suspected automated systems. | 2020-05-14 |
20200151348 | SYSTEMS AND METHODS FOR A PRIVACY SCREEN FOR SECURE SAAS APPLICATIONS - Systems and methods for providing a privacy screen to a network application accessed via an embedded browser of a client application are described. The method includes establishing, by a client application on a client device, a session to a network application hosted on a third party server. The client application includes an embedded browser for accessing the network application. The method further includes identifying, by the client application, a policy for providing a privacy screen to one or more portions of the network application, detecting, by the embedded browser, that the one or more portions of the network application are to be rendered on a display of the client device, and displaying a privacy screen including one or more masks displayed over at least the one or more portions of the network application rendered on the display of the client device via the embedded browser. | 2020-05-14 |
20200151349 | Methods of Dynamically Securing Electronic Devices and Other Communications Through Environmental and Systems Measurements Leveraging Tailored Trustworthy Spaces and Conditions Authentication - This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current Tailored Trustworthy Space (TTS) definitions and rules which provided for various situationally dependent scenarios. Multiple TTS may be defined for a given deployment, each of which specifies one or more sensors and algorithms for combining sensor data from the device, other connected devices, and/or other data sources from which the current TTS is identified. The device further achieves security by loading digital credentials through a unidirectional multidimensional physical representation process which allows for the device to obtain said credentials without the risk of compromising the credential issuing system through the data transfer process. This secure system methodology may be used to create a Mobile Secure Compartmentalized Information Facility (M-SCIF), among other applications. | 2020-05-14 |
20200151350 | MEMBERSHIP ACCESS MANAGEMENT OF A DATABASE - An example operation may include one or more of identifying a new member (M | 2020-05-14 |
20200151351 | Verification of Privacy in a Shared Resource Environment - Embodiments relate to a system, program product, and method for use with a computer platform to support privacy preservation. The platform measures and verifies data privacy provided by a shared resource service provider. An assessment is utilized to support the privacy preservation with respect to a data steward, and associated shared data. It is understood that data associated with a data service has an expected level of privacy. A privacy score directly correlating to a leakage indicator of the service is formed, and an associated data container is populated with inferred entities deemed to at least meet a preferred privacy level. The privacy score effectively certifies the security of the populated data container. | 2020-05-14 |
20200151352 | DATA LOSS PREVENTION FOR AN ONLINE CONTENT MANAGEMENT PLATFORM - Disclosed are systems, methods, and non-transitory computer-readable storage media for providing content management features in a messaging service. A content management system is configured to receive an update to a rule in a data loss prevention (DLP) policy, to identify, based on a log of DLP violations, one or more content items for updating content management permissions, and to update the content management permissions for the one or more content items based on the update to the rule. | 2020-05-14 |
20200151353 | FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES - Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory. | 2020-05-14 |
20200151354 | MESSAGING SYSTEMS AND METHODS - A messaging system may include a notification module that generates a cryptic notification of one or more messages available to a first user account from one or more second user accounts. The system may receive user notification preference settings for the first user account via a user interface of an electronic user communication device that predefines the cryptic notification to be generated by the notification module for display by the user communication device when a message is available. The cryptic notification may be cloaked as an event or operation unrelated to notification of an available message. | 2020-05-14 |
20200151355 | DATASETS REPRESENTING ASPECTS OF 3D OBJECT - In an example, a method includes acquiring, at a processor, object generation source data representing a three-dimensional object to be generated in additive manufacturing. A dataset which is representative of an aspect of the three-dimensional object may be determined from the object generation source data. Digital security may be applied to the object generation source data and the dataset. The digital security applied to the object generation source data may be different from that which is applied to the dataset. | 2020-05-14 |
20200151356 | SYSTEM AND METHOD FOR FAST AND EFFICIENT SEARCHING OF ENCRYPTED CIPHERTEXTS - An encryption and cryptosystem for fast and efficient searching of ciphertexts. Unencrypted secret data may be transformed into encoded secret data using an injective encoding such that each distinct value of the unencrypted secret data is mapped to a unique index in the encoded secret data. The encoded secret data may be homomorphically encrypted using the homomorphic encryption key to generate secret data ciphertexts. The secret data ciphertexts may be transmitted to an external system for searching the secret data ciphertexts for encoded queries. The encoded queries are encoded by the same injective encoding as the secret data, to directly search only indices of the secret data ciphertexts corresponding to query indices having non-zero query values, to detect if values of the secret data ciphertexts match values of the encoded queries at the query indices, without searching the remaining indices of the secret data ciphertexts. | 2020-05-14 |
20200151357 | INFORMATION MANAGEMENT DEVICE AND INFORMATION MANAGEMENT METHOD - An information management device includes a memory and a processor configured to receive an access request to information related to individual, the access request including designation of a first data table including first information related to the individual and a second data table including second information related to the individual, perform, in accordance with whether the first data table and the second data table include a same key, determination of whether the individual is identified based on a combination of the first information and the second information to be included in a response to the access request, and perform a stop of output of the response when it is determined that the individual is identified based on the combination. | 2020-05-14 |
20200151358 | Contact Management - A system for data sharing between a first user and a second user includes a memory and a processor. The processor is configured to execute instructions stored in the memory to associate a unique identifier with a first profile of the first user, the first profile includes user data; obtain, from a second device of the second user, a sensed identifier; and, in response to the sensed identifier matching the unique identifier of the first user, execute instruction to send, to the first user, a first request to share first user data of the first user with the second user; and receive, from the first user, a response to the first request to share the first user data of the first user with the second user. The sensed identifier is captured by a sensor of the second device. | 2020-05-14 |
20200151359 | AUTOMATED PERSONALIZED OUT-OF-THE-BOX AND ONGOING IN-APPLICATION SETTINGS - Systems, methods, and computer-readable storage media are provided for automating personalized out-of-the-box and ongoing in-application settings. A triggering event is detected for an exchange of information between an information service and one or more application or service. A trust level and domain of information of the one or more application or service is determined. Based on the trust level and domain of information, information to be shared with the one or more application or service is identified and the identified information is shared. The information to be shared can be all of the requested information, some of the requested information, or none of the requested information. | 2020-05-14 |
20200151360 | EVENT-BASED COMMUNITY CREATION FOR DATA SHARING PLATFORM - Methods, computer-readable media, and processing systems are disclosed for establishing a data sharing community for an event of an event type. For example, a processing system including at least one processor may detect, via at least one data source device, a trigger condition for an event of an event type, and establish a data sharing community for the event, the data sharing community including a plurality of data sources, the plurality of data sources including the at least one data source device, and a plurality of data consumers, where the establishing includes setting respective permission levels for the data consumers. The processing system may further collect data from the plurality of data sources in accordance with the event type, and provide at least a first portion of the data to at least a first data consumer in accordance with a respective permission level of at least the first data consumer. | 2020-05-14 |
20200151361 | ELECTRONIC CONTROL DEVICE, PROGRAM FALSIFICATION DETECTION METHOD, AND COMPUTER READABLE NON-TRANSITORY TANGIBLE STORAGE MEDIUM - An electronic control device includes: a memory that stores a plurality of divided programs obtained by dividing a program and a verification authenticator, a cryptographic operator that generates a partial authenticator for each of the plurality of divided programs in a cryptographic operation; and a verification unit that generates a operation authenticator by performing a logic operation using the plurality of partial authenticators, and verifies a falsification of the program by determining whether the verification authenticator and the operation authenticator match. | 2020-05-14 |
20200151362 | INTEGRITY AND DATA ENCRYPTION (IDE) OVER COMPUTER BUSES - A system may include a root port and an endpoint upstream port. The root port may include transaction layer hardware circuitry to determine, by logic circuitry at a transaction layer of a protocol stack of a device, that a packet is to traverse to a link partner on a secure stream, authenticate a receiving port of the link partner, configure a transaction layer packet (TLP) prefix to identify the TLP as a secure TLP, associating the secure TLP with the secure stream, apply integrity protection and data encryption to the Secure TLP, transmit the secure TLP across the secure stream to the link partner. | 2020-05-14 |
20200151363 | SECURE DIGITAL DATA COLLECTION - Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution. | 2020-05-14 |
20200151364 | MIGRATION OF TRUSTED SECURITY ATTRIBUTES TO A SECURITY ENGINE CO-PROCESSOR - A system-on-chip (SoC) includes a host CPU on a CPU fabric, the host CPU including multiple processor cores, each associated with multiple security attributes. The SoC includes a secure asset on a network-on-chip and a security co-processor. The security co-processor includes circuitry to detect requests from the processor cores targeting the secure asset and security function processing requests, to determine, based on associated security attributes, whether the core or function is authorized to access the secure asset, to allow the request to be issued, if the core or function is so authorized, and to prevent its issuance, if not. The determination may be dependent on a signal from the CPU fabric indicating whether the host CPU can modify its security attributes or they are locked down. The security co-processor may have the highest security level and may be the only master on the SoC that can access the secure asset. | 2020-05-14 |
20200151365 | METHOD FOR MANAGING AN INSTANCE OF A CLASS - The invention is a method for managing an instance of a class in a secure element embedded in a hosting machine and including a Central Processing Unit, a storage area and a virtual machine. The method comprises a step of receiving by the secure element a load file containing a binary representation of a package of the class and a step of instantiating the instance from the package and storing the instance in the storage area. The load file includes a specific component which is a custom component within the meaning of Java Card™ specifications and which contains executable data. The instance requests the execution of a subset of the executable data by directly invoking the subset of executable data through an Application Programming Interface. | 2020-05-14 |
20200151366 | SYSTEM AND METHOD FOR ANTI-ROLLBACK - A method for providing an anti-rollback secure timer service includes determining, at a device which includes a processor providing a trusted execution environment (TEE), a trusted memory, and a real time clock (RTC) accessible through an operating system of the device, an initial reference time value, by a secure timer application running in the TEE, the initial reference time value determined based on an initial value of the RTC obtained during booting of the device and a time delta value. The method further includes determining an updated reference time value based on the initial reference time value, a second value of the RTC, and a previously stored old reference time value, determining an updated time delta value based on the second value of the RTC and the updated reference time value, and storing the updated time delta value and the updated reference time value in the trusted memory. | 2020-05-14 |
20200151367 | CHANGE-TOLERANT METHOD OF GENERATING AN IDENTIFIER FOR A COLLECTION OF ASSETS IN A COMPUTING ENVIRONMENT - A change-tolerant method of generating a fingerprint of a computing environment based on asset parameters associated components of the computing environment. Asset parameters are grouped into multiple subsets based on characteristics of the components. A share is generated for each asset parameter of the category to produce a plurality of shares. A secret sharing algorithm is applied to the subsets to generate a plurality of candidate identifiers corresponding to the plurality of subsets of shares. A candidate identifier is selected from the plurality of candidate identifiers as a final identifier for each category based at least in part on a frequency of occurrence of that candidate identifier. The final identifiers are combined into a fingerprint corresponding to the computing environment, wherein the fingerprint is provides verification of the plurality of components without requiring individual verification of any shares in the plurality of shares. | 2020-05-14 |
20200151368 | DEFENSIVE ROUTING AND RELATED TECHNIQUES - Techniques are disclosed for defensive routing of guard wires for security-critical wires in an integrated circuit (IC). Defensive routing provides a routing-centric and preventive layout-level defense against IC fabrication time attacks against security-critical wires within an IC. An example methodology implementing the techniques includes identifying at least one security-critical wire in an IC design, identifying at least one unblocked surface of the identified at least one security-critical wire, and guarding the identified at least one surface of the identified at least one security-critical wire with a guard wire. In one example, the guard wire may be a natural guard wire. In another example, the guard wire may be a synthetic guard wire. | 2020-05-14 |
20200151369 | METHOD AND APPARATUS FOR LOCATION-BASED RECOVERY OF STOLEN MOBILE DEVICES - A method, apparatus, and system for locating mobile devices. The system includes a location-aware mobile device. The location-aware mobile device includes a location-aware mechanism embedded in a platform firmware layer of the location-aware mobile device. The system also includes a central database to receive location information from the location-aware mobile device over a network. If the location-aware mobile device has been stolen, lost, or misplaced, the central database reports the stolen, lost, or misplaced location-aware mobile device and its location to appropriate persons to enable the location-aware mobile device to be recovered. | 2020-05-14 |
20200151370 | GENERATING AN IMAGE FOR A BUILDING MANAGEMENT SYSTEM - Methods, devices, and systems for generating an image for a building management system are described herein. One device includes using a computing device to import floor plan objects from computer-aided design (CAD) drawings of a building and applying a design language associated with a building management system to the floor plan objects imported from the CAD drawings. Once the design language has been applied to the floor plan objects, an image of the building is generated for use in the building management system. | 2020-05-14 |
20200151371 | METHOD FOR STRUCTURING AN EXISTING GRID FOR DISTRIBUTING ELECTRIC ENERGY - In a method for structuring an existing grid ( | 2020-05-14 |
20200151372 | FLY-HEIGHT INTERACTION SIMULATION - In an approach for providing simulation results of an interaction between a transducer head and a magnetic medium, a computer identifies a first raster scan of a sample via a scanning probe microscope. The computer generates a topography image based on the first raster scan of the sample. The computer identifies one or more reference features within the created topography image. The computer calculates an average height based on the one or more reference features. The computer determines a lift distance associated with a probe of the scanning probe microscope. The computer defines a uniform plane based on the calculated average height and the determined lift distance. The computer performs a second raster scan of the sample based on the defined uniform plane. The computer generates a fly-height image based on the second raster scan. The computer provides simulation results based at least in part on the second raster scan. | 2020-05-14 |
20200151373 | COMPREHENSIVE, MULTI-SPECIES ENVIRONMENTAL MODELING SYSTEM - The present invention is a computer modeling system for creating a comprehensive environmental impact model. The system performs a series of novel functions to reflect the impact of multiple emissions on all species of interest within an environment at designated concentration levels. The system can be further utilized as a repository to update environmental data received from scientific researchers and to update existing models accordingly. The system integrates new data and updates calculations to create increasingly complex, comprehensive and reliable predictive models for users, which include US and foreign entities charged with developing emissions standards. | 2020-05-14 |
20200151374 | PREDICTING TARGET CHARACTERISTIC DATA - Target characteristic data may be predicted using an apparatus including a processor and one or more computer readable mediums collectively including instructions. When executed by the processor, the instructions cause the processor to obtain a plurality of physical structure data and a plurality of characteristic data, estimate at least one structural similarity between at least two physical structures that correspond with physical structure data among the plurality of physical structure data, and generate an estimation model for estimating a target characteristic data from a target physical structure data by using at least one characteristic data and corresponding at least one structural similarity between the target physical structure data and each of the plurality of the physical structure data. | 2020-05-14 |
20200151375 | SYSTEM AND METHOD FOR CONDUCTING COMPUTING EXPERIMENTS - A method of conducting computing experiments includes executing a set of jobs based on user-selected parameters, learning a user strategy by checking the user-selected parameters during the executing of the set of jobs, and refining the user strategy by refining the set of jobs. | 2020-05-14 |
20200151376 | GENERATING DIGITAL MODELS OF NUTRIENTS AVAILABLE TO A CROP OVER THE COURSE OF THE CROP'S DEVELOPMENT BASED ON WEATHER AND SOIL DATA - A system for generating digital models of nitrogen availability based on field data, weather forecast data, and models of water flow, temperature, and crop uptake of nitrogen and water is provided. In an embodiment, field data and forecast data are received by an agricultural intelligence computing system. Based on the received data, the agricultural intelligence computing system models changes in temperature of different soil layers, moisture content of different soil layers, and loss of nitrogen and water to the soil through crop uptake, leaching, denitrification, volatilization, and evapotranspiration. The agricultural intelligence computing system creates a digital model of nitrogen availability based on the temperature, moisture content, and loss models. The agricultural intelligence computing system may then send nitrogen availability data to a field manager computing device and/or use the nitrogen availability data to create notifications, recommendations, agronomic models, and/or control parameters for an application controller. | 2020-05-14 |
20200151377 | TEST PATTERN, TEST METHOD FOR SEMICONDUCTOR DEVICE, AND COMPUTER-IMPLEMENTED METHOD FOR DESIGNING INTEGRATED CIRCUIT LAYOUT - A test pattern includes first line patterns disposed at a first level, having discontinuous regions spaced apart by a first space, having a first width, and extending in a first direction. The test pattern includes a connection line pattern disposed at a second level and extending in the first direction, second line patterns disposed at the second level, branching from the connection line pattern, having a second width, and extending in a second direction perpendicular to the first direction. The test pattern includes via patterns disposed at a third level, having a third width, and formed around an intersection region having the first width of the first line pattern and the second width of the second line pattern. First pads are connected with the first line patterns. A second pad is connected with the connection line pattern. | 2020-05-14 |
20200151378 | TRIGGER-ACTION-CIRCUITS: LEVERAGING GENERATIVE DESIGN TO ENABLE NOVICES TO DESIGN AND BUILD CIRCUITRY - A method, system, and apparatus provide the ability to design a circuit. A behavior of the circuit is authored by dragging nodes from side panels and connecting them in an authoring canvas. Multiple circuit designs that satisfy the behavior are generated. A data grid table is generated and displays the circuit designs with each row representing a design, and the table is sortable based on columns that represent computed metrics. Upon selection of a design in the table, a computer generated circuit diagram is rendered. Interactive assembly instructions are generated and displayed. The interactive assembly instructions provide a text-based step-by-step guide to wire the circuit. Further, upon selection of an assembly instruction step, a corresponding element in the computer generated circuit diagram is highlighted. | 2020-05-14 |
20200151379 | METHOD FOR DETERMINING AN ELECTRICAL MODEL OF A STRING OF PHOTOVOLTAIC MODULES, DIAGNOSTIC METHOD AND DEVICE ASSOCIATED THEREWITH - A method for determining an electrical model of a string of photovoltaic modules from a characteristic I(V) of the string includes detecting a first linear zone and a second linear zone of the characteristic I(V); initialising the parameters of a non-by-pass electrical model corresponding to a first operating condition, called a non-by-pass condition; optimising the parameters of the non-by-pass electrical model from a reference characteristic I(V | 2020-05-14 |
20200151380 | SYSTEM FOR PLACEMENT OPTIMIZATION OF CHIP DESIGN FOR TRANSIENT NOISE CONTROL AND RELATED METHODS THEREOF - Transient voltage noise, including resistive and reactive noise, causes timing errors at runtime. A heuristic framework, Walking Pads, is introduced to minimize transient voltage violations by optimizing power supply pad placement. It is shown that the steady-state optimal design point differs from the transient optimum, and further noise reduction can be achieved with transient optimization. The methodology significantly reduces voltage violations by balancing the average transient voltage noise of the four branches at each pad site. When pad placement is optimized using a representative stressmark, voltage violations are reduced 46-80% across 11 Parsec benchmarks with respect to the results from IR-drop-optimized pad placement. It is shown that the allocation of on-chip decoupling capacitance significantly influences the optimal locations of pads. | 2020-05-14 |
20200151381 | STACKED CHIP LAYOUT - A stacked chip layout includes a central processing chip, a first active circuit block over the central processing chip, and a second active circuit block overlapping the first active circuit. The first and second active circuit blocks are within a perimeter of the central processing chip in a plan view. The stacked chip layout includes a first routing region on a same plane as the first active circuit block, and a second routing region on a same plane as the second active circuit block. The first routing region is between the second active circuit block and the central processing chip. The stacked chip layout includes a heat dissipation element over the second active circuit block and the second routing region. The second routing region is configured to convey heat from the first active circuit block to the heat dissipation element. | 2020-05-14 |
20200151382 | METHOD FOR MAKING A SEMICONDUCTOR DEVICE - A method of making a semiconductor device includes determining a temperature profile for a first die of a three-dimensional integrated circuit (3DIC), wherein the first die comprises a plurality of sub-regions of the first die based on the determined temperature profile. The method further includes simulating operation of a circuit in a second die of the 3DIC based on the determined temperature profile and a corresponding sub-region of the plurality of sub-regions. | 2020-05-14 |
20200151383 | SYSTEMS AND METHODS OF PROVIDING ENHANCED PRODUCT VISUALIZATION ON A GRAPHICAL DISPLAY - Systems and methods of providing enhanced product visualization on a graphical display include generating a visual frame having a first set of frame dimensions and comprising an inner border and an outer border; receiving a selection of a graphical object to be displayed at least within the outer border of the visual frame on the graphical display; identifying a set of object dimensions of the graphical object; determining an appropriate proportion between the set of frame dimensions and the set of object dimensions such that the graphical object is displayable at least within the outer border of the visual frame on the graphical display; manipulating the set of frame dimensions and/or the set of object dimensions such that the graphical object is displayable within the outer border of the visual frame; and displaying the graphical object at least within the outer border of the visual frame. | 2020-05-14 |
20200151384 | SYSTEM AND METHOD FOR PROVISIONING A MOBILE SOFTWARE APPLICATION TO A MOBILE DEVICE - A provisioning system of a first party provisions a mobile software application to one or more remotely-located mobile computing devices, each mobile computing device running a same device-native mobile operating system. The mobile software application may include executable program code and a structured document such that the executable program code and structured document together instantiate at least a portion of the functionality provided by the mobile application. Moreover, in some embodiments, when the requested and sent mobile application is executed by a requesting mobile device, the structured document is transformed into a tree structure which when updated, updates at least in part the running state of the mobile application. | 2020-05-14 |
20200151385 | COMMUNICATOR - A system and method for improving an effectiveness of appropriate framed communications. List management of USE, DO NOT USE, and SUBSTITUTE lists for each communications producer, the communications elements conforming to the particular lists enrolled, selected and enabled by each producer of a set of communications producers helps to ensure conformance to effective communications elements for improving effectiveness of communications using those elements. | 2020-05-14 |
20200151386 | SYSTEM AND INTERFACE FOR ELECTRONIC COMMUNICATION GENERATION AND TRACKING - Various systems and methods are disclosed for enabling a consumer's creation of a communication (e.g., letter, e-mail) addressed to a provider of goods and/or services. Manually and/or automatically by providing access to one or more existing data repositories, the user completes a software-presented questionnaire, and responses are used by the system to customize and populate a templated form. The form identifies, elaborates and, in some cases, quantifies problems with the provider's performance. The system focuses on form letters by consumers to businesses, thereby increasing its depth while avoiding unnecessary complexity. Some embodiments also (at the user's instruction) submit portions of the communication to third parties (e.g., regulatory agencies), track delivery of the communication, and provide background information relating consumer communications with businesses. Some embodiments are tailored to requirements of providers for selected correspondence (e.g., a “notice of dispute” telecommunications providers purport to require before allowing contractual right to arbitration). | 2020-05-14 |
20200151387 | MAKING REAL-TIME CONTENT SELECTION DECISIONS BASED ON MULTIVARIATE TESTING - Server side web based ad stitching and user specific optimization are disclosed. In various embodiments, a request for a page is received via a communication interface. A processor is used to provide an optimized version of the page at least in part by determining dynamically an optimized content element for the page based at least in part on a user attribute associated with the request and content performance data generated based at least in part on testing of alternative versions of the page with respect to other users having the user attribute. | 2020-05-14 |
20200151388 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR FORMATTING MESSAGES IN A MESSAGING USER INTERFACE WITHIN A GROUP-BASED COMMUNICATION SYSTEM - An apparatus is provided configured for parsing and formatting a message in a group-based communication interface. The apparatus includes a memory and a processor(s) configured to receive an input string generated through user engagement of the group-based communication interface. The processor is also configured to parse the input string to identify a structured format string. The processor is further configured to, in a circumstance where the structured format trigger is identified in the input string, apply a structured format to the input string to generate a structured message object for rendering to the group-based communication interface. Corresponding methods and computer program products are also provided. | 2020-05-14 |
20200151389 | COMMUNITY-BASED REPORTING AND ANALYSIS SYSTEM AND METHOD - A computer-implemented method for training a neural network system to classify data items as true mentions of relevant data objects includes, based on a domain of interest, a processor controlling an input component and a data store to receive and store a document related to the domain of interest, control a natural language processor to extract data items related to the domain of interest from the document, create a first training data set of selected ones of the data items, using the first training data set, train the neural network to identify true mentions of data objects relevant to the domain of interest, apply tweaks to one or more of the data items to create a list of tweaked data items, creating a second training data set including the tweaked data items, and using the first and second training data sets, further train the neural network to identify true mentions of relevant data objects. | 2020-05-14 |
20200151390 | SYSTEM AND METHOD FOR PROVIDING INFORMATION FOR AN ON-DEMAND SERVICE - The present disclosure relates to a system, method and non-transitory computer readable medium. The system includes at least one computer-readable storage medium including a set of instructions and at least one processor in communication with the at least one computer-readable storage medium. When executing the set of instructions, the at least one processor is directed to: receive a first electrical signal including an address text; operate logical circuits in the at least one processor to: determine a first category of the address text based on a categorization model; determine a first segmentation model based on the first category of the address text; and determine one or more segments of the address text based on the first segmentation model. | 2020-05-14 |
20200151391 | GENERATING CONVERSATION CONTENT FOR COMMUNICATION WITH A USER - There is provided a system for generating conversation content for communication with a user. The system includes a context determination module for determining a context of a conversation to be held with the user; a goal determination module for determining at least one goal to be set for the user; a content selection module for selecting a set of conversation content elements for communication to the user in the conversation, based on the determined context and the at least one determined goal; and a sequencing module for determining a first order in which the conversation content elements are to be presented to the user, based at least on the determined goal. A method, apparatus and computing device are also disclosed. | 2020-05-14 |
20200151392 | SYSTEM AND METHOD AUTOMATED ANALYSIS OF LEGAL DOCUMENTS WITHIN AND ACROSS SPECIFIC FIELDS - A system for automated analysis of legal documents within and across different fields is constructed using a computer system comprising at least one memory, at least one processor, and at least a first plurality of programming instructions stored in the at least one memory and operating on the at least one processor configured to allow the operation on the computer system of additional programming instructions, an extraction processor to identify, extract knowledge from data contained in the legal document and transform it into a common data form. The analysis processor develop a local and global knowledge graphs containing the key entities, relationships and concepts encoded in the text. | 2020-05-14 |
20200151393 | SYSTEMS AND METHODS FOR USING MACHINE LEARNING AND RULES-BASED ALGORITHMS TO CREATE A PATENT SPECIFICATION BASED ON HUMAN-PROVIDED PATENT CLAIMS SUCH THAT THE PATENT SPECIFICATION IS CREATED WITHOUT HUMAN INTERVENTION - Systems and methods for using machine learning and rules-based algorithms to create a patent specification based on human-provided patent claims such that the patent specification is created without human intervention are disclosed. Exemplary implementations may: obtain a claim set; obtain a first data structure representing the claim set; obtain a second data structure; obtain a third data structure; and determine one or more sections of the patent specification based on the first data structure, the second data structure, and the third data structure. | 2020-05-14 |
20200151394 | Text-to-Speech Adapted by Machine Learning - Machine learned models take in vectors representing desired behaviors and generate voice vectors that provide the parameters for text-to-speech (TTS) synthesis. Models may be trained on behavior vectors that include user profile attributes, situational attributes, or semantic attributes. Situational attributes may include age of people present, music that is playing, location, noise, and mood. Semantic attributes may include presence of proper nouns, number of modifiers, emotional charge, and domain of discourse. TTS voice parameters may apply per utterance and per word as to enable contrastive emphasis. | 2020-05-14 |
20200151395 | CLUSTER-BASED WORD VECTOR PROCESSING METHOD, DEVICE, AND APPARATUS - Embodiments of the present application disclose a cluster-based word vector processing method, apparatus, and device. Solutions are include: in a cluster having a server cluster and a worker computer cluster, in which each worker computer in the worker computer cluster separately reads some corpuses in parallel, extracts a word and context words of the word from the read corpuses, obtains corresponding word vectors from a server in the server cluster, and trains the corresponding word vectors, and the server cluster updates word vectors of same words that are stored before the training according to training results of one or more respective worker computers with respect to the word vectors of the same words. | 2020-05-14 |
20200151396 | NATURAL LANGUAGE GENERATION USING PINNED TEXT AND MULTIPLE DISCRIMINATORS - A personality model is created for a population and used as an input to a text generation system. Alternative texts are created based upon the emotional effect of the generated text. Certain words or phrases are “pinned” in the output, reducing the variability of the generated text so as to preserve required information content, and a number of tests provide input to a discriminator network so that proposed outputs both match an outside objective regarding the information content, emotional affect, and grammatical acceptability. A feedback loop provides new “ground truth” data points for refining the personality model and associated generated text. | 2020-05-14 |
20200151397 | Enzyme Compositions and Uses Thereof - The present invention relates to enzyme compositions and processes of producing and using the compositions for the saccharification of lignocellulosic material. | 2020-05-14 |
20200151398 | SEQUENCE TRANSDUCTION NEURAL NETWORKS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating a target sequence from an input sequence. In one aspect, a method comprises maintaining a set of current hypotheses, wherein each current hypothesis comprises an input prefix and an output prefix. For each possible combination of input and output prefix length, the method extends any current hypothesis that could reach the possible combination to generate respective extended hypotheses for each such current hypothesis; determines a respective direct score for each extended hypothesis using a direct model; determines a first number of highest-scoring hypotheses according to the direct scores; rescores the first number of highest-scoring hypotheses using a noisy channel model to generate a reduced number of hypotheses; and adds the reduced number of hypotheses to the set of current hypotheses. | 2020-05-14 |
20200151399 | TRANSLATING TRANSACTION DESCRIPTIONS USING MACHINE LEARNING - A method may include generating a source transaction description, encoding, by an encoder model of a machine translation model executing on a computer processor, the source transaction description to create a context vector, decoding, by a decoder model of the machine translation model, the context vector to predict a target entity description, generating a transaction including the target entity description, detecting an acceptance, by a user, of an action performed on the transaction, in response to detecting the acceptance, updating a translation accuracy metric for the target entity description, determining that the updated translation accuracy metric satisfies a translation accuracy criterion, and in response to determining that the updated translation accuracy metric satisfies the translation accuracy criterion, adding the target entity description to golden entity descriptions. | 2020-05-14 |
20200151400 | SYMBOL VERIFICATION FOR AN INTELLIGENT LABEL DEVICE - Briefly, a method for verifying the visual perceptibility of a display is provided. An intended message is written to a bistable display. Pixels that comprise portions of the message are measured and evaluated to determine if the message actually displayed on the bistable display was perceptible by a human or a machine. In some cases, information regarding the message actually perceivable from the display may be stored for later use. Responsive to determining that a message is perceivable or not perceivable, alarms may be set, one or more third parties notified, or additional display features may be set. | 2020-05-14 |
20200151401 | FORK CHAIN PRODUCT LABEL AND METHOD OF USE - A blockchain-based “fork chain” system and method for tracking RFID labels and other products. The method ensures authenticity at each step, and that the digital identity of a physical item can be accurately verified. The method may include: (a) receiving and verifying RFID chips manufactured by a trusted supplier; (b) creating a blockchain related to the chips; (c) assembling the chips into a roll inlay, the inlays into a carton and the cartons into a pallet; (d) updating the blockchain with roll, carton, and pallet codes; (e) taking receipt from a specific trusted individual and adding verification to the blockchain; and (f) activating a digital identity. GPS information may be associated with each step in the process to ensure that the product is properly present at the appropriate manufacturing and encoding locations. Once a digital identity is produced for the product, it may be added to by subsequent users. | 2020-05-14 |
20200151402 | METHOD, SYSTEM AND APPARATUS FOR NFC SECURITY - A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected. | 2020-05-14 |
20200151403 | INTERACTING RFID TAGS - An active radio frequency identification (“RFID”) tag receives an RFID interrogation signal via a first antenna. An integrated frequency reference in the RFID chip recovers the clock from the RFID interrogation and generates a reference clock for transmitting data responsive to the RFID interrogation. The integrated frequency reference generates the reference clock at the same frequency as the RFID interrogation for transmitting the response via the first antenna. The integrated frequency reference generates the reference clock at a different frequency for transmitting the response using a Bluetooth beacon message or a WiFi message via a second antenna. A mobile computing device can interrogate the RFID tag via an NFC interface and receive a response via a Bluetooth beacon messages or WiFi message received via a Bluetooth or wireless interface of the mobile computing device. | 2020-05-14 |
20200151404 | REUSABLE SHIPPING BOX MANAGEMENT SYSTEM - A reusable shipping box management system severs to manage reusable shipping boxes by attaching labels to the boxes. Readers on the distribution stations, senders, and receivers serve to read the data on the labels of the reusable shipping boxes and the data are transferred to the network system. Therefore, the status and message of the reusable shipping box are acquired in the processing of storages and sending. The managers may know the status of all the reusable shipping boxes through the network system so that all the reusable shipping boxes may be effectively tracked and managed. Furthermore the reusable shipping box can be reused many times under a precise control. | 2020-05-14 |
20200151405 | DETERMINING COMPATIBILITY OF COMPONENTS FOR ASSEMBLING APPROVED PERSONAL PROTECTION CONFIGURATIONS - This disclosure relates generally to methods and systems for determining whether at least a first component and a second component of a personal protection (PP) configuration are compatible so as to be assembled into an approved PP configuration, responsive to being compared against at least one predetermined criterion. Included is a smart tag for each of the first and second components. The first and second smart tags include respective first and second data. A data acquiring system is provided for acquiring the first and second data and a data processing system processes the acquired first and second data for determining if the first and second components are compatible to be assembled as an approved PP configuration. | 2020-05-14 |
20200151406 | System and Method of RFID Portals - An RFID portal is provided for placing at an access point associated with a temporary event. The access point is controlled by a security control. The portal has a portal body erectable on at least one side of a user pathway at the access point; and an RFID reader in the portal body for reading an RFID tag issued to, and worn by, an individual user for the event that has an encoded unique UserID readable by the RFID reader. The RFID reader is located in the portal body, so as to be physically proximate to a location of the user's body where the RFID tag is worn. The RFID reader is in communication with a server which has stored a list of valid UserIDs for the event. The RFID portal also has an indicator system for receiving notification from the server that the read UserID is a valid UserID for the event and generating an indication to the security control, such that the security control permits the user to proceed along the pathway. | 2020-05-14 |
20200151407 | SYSTEMS AND METHODS FOR SEPARATING OBJECTS USING A VACUUM ROLLER WITH ONE OR MORE OBJECT PROCESSING SYSTEMS - In an induction system for use with an object processing system, a distribution system is disclosed for providing dissimilar objects into one of a plurality of receiving units. The distribution system includes a conveyor section that travels over a vacuum roller, and the plurality of receiving units arranged generally below the vacuum roller such that an object with a mass will fall toward one of the plurality of receiving units based on both the object's mass and a vacuum force applied to the object through the conveyor section. | 2020-05-14 |
20200151408 | SYSTEMS AND METHODS FOR SEPARATING OBJECTS USING CONVEYOR TRANSFER WITH ONE OR MORE OBJECT PROCESSING SYSTEMS - A distribution system is disclosed for use in an induction system with an object processing system. The distribution system provides distribution of dissimilar objects into one of a plurality of receiving units. The distribution system includes an urging system for urging an object on a conveyor from the conveyor to one of a plurality of adjacent receiving stations via a receiving chute, wherein each receiving station is lower than the conveyor. | 2020-05-14 |
20200151409 | SYSTEMS AND METHODS FOR SEPARATING OBJECTS USING DROP CONVEYORS WITH ONE OR MORE OBJECT PROCESSING SYSTEMS - A distribution system is disclosed for use with an induction system with an object processing system. The distribution system provides distribution of dissimilar objects into one of a plurality of receiving units. The distribution system includes an urging system for urging an object on a conveyor from the conveyor to a chute that includes at least one actuatable door for selectively dropping the object through the at least one actuable door, said chute leading to a first receiving station with a second receiving station being positioned below the at least one actuable door. | 2020-05-14 |
20200151410 | SYSTEMS AND METHODS FOR DISTRIBUTING INDUCTION OF OBJECTS TO A PLURALITY OF OBJECTS PROCESSING SYSTEMS - An induction system is disclosed for filtering the induction of objects to a plurality of object processing systems. The induction system includes an evaluation means for evaluating at least one characteristic of an object, and routing means for routing the object in one of a plurality of directions responsive to the evaluated characteristic, at least one of the plurality of directions leading to a selected one of the plurality of object processing systems. | 2020-05-14 |
20200151411 | IMAGING WITH JOB TICKET - A device includes an imager and a control portion. The imager is to selectively image media as an imaging job in association with a job ticket. The control portion is to at least receive a unique ID associated with the media and, based on the unique ID, to at least partially determine the job ticket and to at least partially determine a scope of content of the imaging job. | 2020-05-14 |
20200151412 | BARCODE READING DEVICE THAT CONTROLS ILLUMINATION WITHOUT SIGNALING FROM AN IMAGE SENSOR - A barcode reading device includes an image sensor comprising a photosensor array and control circuitry configured to control an exposure period for the photosensor array. The barcode reading device also includes one or more illumination sources configured to generate illumination for illuminating a target area. The barcode reading device also includes circuitry that is configured to read out image data from the photosensor array in response to a trigger signal. The circuitry is also configured to, independent of controlling the exposure period for the photosensor array, illuminate a target area by activating the one or more illumination sources in response to the trigger signal. | 2020-05-14 |
20200151413 | METHOD FOR DETERMINING THE GENUINENESS OR SPURIOUSNESS OF PHARMACEUTICAL COMPOSITION FOR ORAL ADMINISTRATION, PHARMACEUTICAL COMPOSITION FOR ORAL ADMINISTRATION, AND SYSTEM FOR DETERMINING THE GENUINENESS OR SPURIOUSNESS OF PHARMACEUTICAL COMPOSITION FOR ORAL ADMINISTRATION - Provided is a method for determining the genuineness or spuriousness of a pharmaceutical composition for oral administration, comprising irradiating a pharmaceutical composition for oral administration with infrared light, the pharmaceutical composition for oral administration being marked with a mark including an edible substance which is visually recognizable under white light irradiation as well as under infrared irradiation and a mark including an edible substance which is visually recognizable under white light irradiation and is not visually recognizable under infrared irradiation, and determining whether a visually recognizable mark visually recognized on the pharmaceutical composition for oral administration irradiated with the infrared light and a prepared reference mark match. | 2020-05-14 |
20200151414 | SUBSTRATE WORK SYSTEM - A substrate work system including an information management device to manage traceability information of configuration items that configure a circuit board product; an imaging device to image an identification code attached to the configuration item; and an imaging control device to read the identification code imaged by the imaging device, and transmit a serial number recorded in the identification code to the information management device. The imaging control device includes a compatibility conditions setting section to set compatibility conditions that the identification code attached to the configuration item should satisfy, or compatibility conditions that the serial number recorded in the identification code should satisfy, a compatibility conditions determining section configured to determine whether the imaged identification code or the serial number recorded on the imaged identification code satisfies the compatibility conditions, and a transmitting section transmit the serial number to the information management device. | 2020-05-14 |
20200151415 | METHOD FOR FINGERPRINT RECOGNITION AND RELATED DEVICES - A method for fingerprint recognition is provided. An electronic device includes a touch screen. The touch screen has a fingerprint recognition area. The fingerprint recognition area is capable of being pressed by at least two fingers. The method includes the following. Touched areas in the fingerprint recognition area are selected as target touch areas upon detecting a touch operation on the touch screen. One target touch area corresponds to one finger which applies pressure to the touch screen. A fingerprint image in each target touch area is acquired to obtain at least one fingerprint image. Determine whether each of the at least one fingerprint image is matched with a corresponding fingerprint image template of a preset fingerprint image template set. A preset operation corresponding to the touch operation is triggered, upon determining that each of the at least one fingerprint image is matched with a corresponding fingerprint image template. | 2020-05-14 |
20200151416 | PRINT RECOGNITION MODULE, METHOD FOR DRIVING THE SAME, AND DISPLAY DEVICE - A print recognition module, a method for driving the same, and a display device are disclosed, where a synchronous scan component is added above a sensing surface of a photo sensor array, and the synchronous scan component can be divided into a first light shielding area and a first light transmitting area, both of which are varying dynamically; where the first light transmitting area is formed at least above a photo sensor being scanned to recognize a print, and the first light shielding area can shield the other photo sensors than the photo sensor being scanned to recognize the print, so that these photo sensors will not be illuminated by any light; and as the photo sensors are being scanned, the first light shielding area and the first light transmitting area, in the synchronous scan component are varying in synchronization therewith. | 2020-05-14 |
20200151417 | Fingerprint Capturing Method, Electronic Device, and Storage Medium - A fingerprint capturing method, an electronic device, and a storage medium are disclosed. The fingerprint capturing method may be applied to an electronic device including a touch screen. The fingerprint capturing method includes: when a luminance of a fingerprint capturing area of the touch screen is a first luminance value, adjusting the luminance of the fingerprint capturing area to a second luminance value in response to detecting a touch operation on the fingerprint capturing area; and capturing a fingerprint image corresponding to the touch operation under the second luminance value via a fingerprint sensor, wherein the fingerprint sensor is disposed below the fingerprint capturing area. | 2020-05-14 |
20200151418 | PEDESTRIAN DETECTION METHOD AND RELATED MONITORING CAMERA - A pedestrian detection method is applied to a monitoring camera. The pedestrian detection method includes forming a first detecting window on at least one monitoring frame via an object analysis function, utilizing a human form detection function to modulate the first detecting window for forming a second detecting window, analyzing the second detecting window via a human local detection function to mark an upper detecting window about a pedestrian on the monitoring frame, and determining whether to calibrate the second detecting window via analysis of the upper detecting window. | 2020-05-14 |
20200151419 | TEMPLATE MATCHING OF A BIOMETRIC OBJECT - The method comprises capturing a plurality of images of a single biometric object during a single activation of a biometric sensor and ranking the images based on a ranking metric value of each of the images to determine a highest ranked image and at least one non-highest ranked image. The method comprises comparing, in a first matching attempt for the biometric object, the highest ranked image to templates of a plurality of pre-stored biometric object templates, wherein a matching metric is determined for each compared template, and generating a match indicating signal when it is determined that at least one of the matching metrics exceeds a matching threshold value. When it is determined that none of the matching metrics exceed the matching threshold value, one of the non-highest ranked images is compared, in a further matching attempt, to templates of the plurality of templates based on the matching metrics. | 2020-05-14 |
20200151420 | Information processing apparatus, information processing method, method, and information processing program - An image processing apparatus comprising a processor and a memory device storing instructions. When executed by the processor, the instructions cause the processor to generate a trail image according to a display time of at least one part of a pathological image in a display region. | 2020-05-14 |
20200151421 | MONITORING SHELVES WITH PRESSURE AND LIGHT SENSORS - A system for monitoring planogram compliance on a store shelf is disclosed. The system may include a plurality of detection sensors and a processor. The processor may be configured to receive first signals from a first subset of detection sensors after a plurality of products are placed on the store shelf, and use the first signals to identify at least one pattern associated with a product type of the products. The processor may further be configured to receive from a second subset of detection sensors second signals indicative of no products being placed on at least one area of the store shelf, and use the second signals to determine at least one empty space on the store shelf. The processor may also be configured to determine, based on the at least one pattern and the at least one empty space, at least one aspect of planogram compliance. | 2020-05-14 |
20200151422 | Apparatus and Method for Determination of Medication Location - A method, apparatus and computer program stored on a non-volatile computer readable storage medium for confirming a pill in the mouth of a user. The computer program causing a general purpose computer to perform the steps of capturing one or more images of a user by an image capture device, confirming the position of the face of the user within the captured image by measuring a size of the face, and setting a predetermined portion of the face of the user to be a region of interest. An open mouth of the user is confirmed within the region of interest, and the open mouth of the user is classified as one of a mouth with a pill therein and a mouth without a pill therein. | 2020-05-14 |