21st week of 2021 patent applcation highlights part 45 |
Patent application number | Title | Published |
20210157829 | UNSUPERVISED ATTENTION BASED SCIENTIFIC DOCUMENT SUMMARIZATION - Embodiments may provide automated summarization of documents, such as scientific documents by using a prior distribution on logical sections learnt from a corpus of human authored summaries. For example, a method of document summarization may comprise receiving, at the computer system, a document and segmenting the document into a plurality of sentences, identifying, at the computer system, sections in the document and aligning each sentence in the document to a section logical role, and summarizing, at the computer system, the document using a probability distribution. | 2021-05-27 |
20210157830 | DOCUMENT STORAGE AND MANAGEMENT - Techniques are disclosed for content storage in a way that facilitates consistent and concurrent read/write processing of stored documents. An example methodology implementing the techniques includes segmenting the contents of a document into a plurality of content segments and storing the plurality of content segments within a data structure, the data structure including storage blocks having storage portions and buffer portions. The storage of the plurality of content segments includes storage of content segments within a storage portions of the storage blocks of the data structure. The method also includes receiving at least one change to the content and utilizing a buffer portion of at least one storage block to store the at least one change to the content. | 2021-05-27 |
20210157831 | METHOD AND ANALYTICAL ENGINE FOR A SEMANTIC ANALYSIS OF TEXTUAL DATA - Methods for analyzing text corpora for inferring potential threats and risks are becoming ever more established. While the present achievements are based on an analyst-driven analytical process, the embodiments provide for a semantic analysis of dynamic developments in changing text corpora, involving an acquisition of text corpora, application of a probabilistic concept model, and providing a similarity remapping. | 2021-05-27 |
20210157832 | DIFFERENTIAL PROCESSING MECHANISM FOR SPARK-BASED GRAPH COMPUTING BACKGROUND - A Resilient Distributed Dataset (RDD) processing method, system, and computer program product include sending a differential portion of a message from a receiver to a sender along with information of a global identifier of an RDD and differential values after matching incoming message. | 2021-05-27 |
20210157833 | VISUAL IMAGE SEARCH USING TEXT-BASED SEARCH ENGINES - The present technology analyzes the content of images to create complex representations of the images and then reduces the complexity of these representations into a size that is both suitable for comparison but also contains critical image descriptive aspects. These reduced complexity representations can then be used to efficiently search for similar images. Moreover, the reduced complexity representations are formatted such that they can take advantage of existing text search engines, which are well suited to efficiently searching through a large number of unique results. | 2021-05-27 |
20210157834 | DIAGNOSTICS CAPABILITIES FOR CUSTOMER CONTACT SERVICES - Systems and methods to support searching and diagnostics capabilities in a customer contact service. Contacts data may be encoded as text (e.g., chat logs), audio (e.g., audio recordings), and various other modalities. A computing resource service provider may implement a service to receive, from a client, a request to perform a search with a specified set of parameters on a plurality of outputs associated with a plurality of contacts data, wherein the plurality of outputs are generated based at least in part by: transcripts generated based on audio data of the plurality of contacts data, metadata determined based the transcripts using one or more natural language processing (NLP) techniques, categories that are matched based at least in part on the transcripts, and search the plurality of outputs to obtain a search result determined based at least in part on the transcripts, metadata, and categories, and provide the search result to the client. | 2021-05-27 |
20210157835 | METHODS AND APPARATUS TO GENERATE RECOMMENDATIONS BASED ON ATTRIBUTE VECTORS - Methods and apparatus are disclosed to generate a recommendation, including an attribute vector aggregator to form a resultant attribute vector based on an input set of attribute vectors, the set of attribute vectors containing at least one of a media attribute vector, an attendee attribute vector, an artist attribute vector, an event attribute vector, or a venue attribute vector, and a recommendation generator, the recommendation generator including: a vector comparator to perform a comparison between an input attribute vector and other attribute vectors and a recommendation compiler to create one or more recommendations of at least one of media, an artist, an event, or a venue based on the comparison. | 2021-05-27 |
20210157836 | System and Method of Managing User Engagement with a Musical Playlist - A system and method of managing user engagement with a musical playlist provides feedback for a host and allows attendees to directly engage with the host to adjust a playlist for an event or social gathering. The system includes at least one remote server, a corresponding user personal computing (PC) device, and a corresponding host PC device. The method begins by prompting the at least one host account to initiate an event session for a plurality of attendee accounts and then to designate a plurality of playlist songs with the corresponding host PC device. The event session is managed in between the host account and the plurality of attendee accounts through the remote server. A current song is played during the event session and feedback is relayed for the current song with the corresponding user PC device. The feedback is then outputted with the corresponding host PC device. | 2021-05-27 |
20210157837 | ADAPTIVE RECOMMENDATIONS OF USER-GENERATED MEDIASETS - This disclosure relates to adaptive recommendations for user-generated mediasets. A mediaset component provides for users to generate mediasets. A user-generated mediaset can include a user-generated playlist or a user-generated media channel. A monitoring component monitors consumption of media, e.g., by a consumer. A relatedness component determines a set of the user-generated mediasets that are related to the media consumed by the consumer. A recommendation component recommends a subset of the user-generated mediasets based on a set of criteria. A rights management component determines a set of authorizations of the consumer for respective media content associated with the set of user-generated mediasets, and takes at least one action based on the set of authorizations, e.g., updating one of the mediasets based on the set of authorizations. | 2021-05-27 |
20210157838 | METHODS AND APPARATUS TO FINGERPRINT AN AUDIO SIGNAL VIA EXPONENTIAL NORMALIZATION - Methods, apparatus, systems, and articles of manufacture are disclosed to fingerprint an audio signal via exponential normalization. An example apparatus includes an audio segmenter to divide an audio signal into a plurality of audio segments including a first audio segment and a second audio segment, the first audio segment including a first time-frequency bin, the second audio segment including a second time-frequency bin, a mean calculator to determine a first exponential mean value associated with the first time frequency bin based on a first magnitude of the audio signal associated with the first time frequency bin and a second exponential mean value associated with the second time frequency bin based on a second magnitude of the audio signal associated with the second time frequency bin and the first exponential mean value. The example apparatus further includes a bin normalizer to normalize the first time-frequency bin based on the second exponential mean value and a fingerprint generator to generate a fingerprint of the audio signal based on the normalized first time-frequency bins. | 2021-05-27 |
20210157839 | SYSTEMS, METHODS, AND APPARATUS TO IMPROVE MEDIA IDENTIFICATION - Methods, apparatus, systems, and articles of manufacture are disclosed to improve media identification. An example apparatus includes a hash handler to generate a first set of reference matches by performing hash functions on a subset of media data associated with media to generate hashed media data based on a first bucket size, a candidate determiner to identify a second set of reference matches that include ones of the first set, the second set including ones having first quantities of hits that did not satisfy a threshold, determine second quantities of hits for ones of the second set by matching ones to the hash tables based on a second bucket size, and identify one or more candidate matches based on at least one of (1) ones of the first set or (2) ones of the second set, and a report generator to generate a report including a media identification. | 2021-05-27 |
20210157840 | SCALABLE ARCHITECTURES FOR REFERENCE SIGNATURE MATCHING AND UPDATING - Methods, apparatus, systems and articles of manufacture are disclosed for scalable architectures for reference signature matching and updating. An example method for scalable architectures for reference signature matching and updating includes accessing site signatures to be compared to reference signatures from a first group of media sources. The example method also include determining if a first reference node is an owner of a first one of the site signatures, comparing a neighborhood of site signatures including the first site signature to reference signatures in a first subset of reference signatures when the first reference node is the owner of the first site signature, the first subset of references signatures stored in a first memory partition associated with the first reference node, and not comparing site signature to reference signatures when the first reference node is not the owner of the first one of the site signatures. | 2021-05-27 |
20210157841 | INFORMATION PROVIDING SYSTEM AND INFORMATION PROVIDING METHOD - A content model data base stores past target information, which includes past first video information acquired in advance, reference IDs, which are linked with the past target information, and which correspond to contents, and three or more levels of degrees of content association between the past target information and the reference IDs. A first acquiring unit acquires the target information from a user terminal, a first evaluation unit looks up the content model database and acquires ID information, which includes the degrees of content association between the target information and the reference IDs, and a judging unit judges the ID information. Contents that correspond to the ID information are output to the user terminal based on the result of judgment by the judging unit. | 2021-05-27 |
20210157842 | INFORMATION PROVIDING SYSTEM AND INFORMATION PROVIDING METHOD - A content model data base stores past target information, which includes past first video information acquired in advance, reference IDs, which are linked with the past target information, and which correspond to contents, and three or more levels of degrees of content association between the past target information and the reference IDs. A first acquiring unit acquires the target information from a user terminal, a first evaluation unit looks up the content model database and acquires ID information, which includes the degrees of content association between the target information and the reference IDs, and an output unit outputs the contents corresponding to the ID information. After the output from the output unit, the ID information, acquired by the first evaluation unit, is stored in an ID history unit. | 2021-05-27 |
20210157843 | AUTOMATED UPDATING OF VIDEO CONTENT - Methods, systems, and computer-readable storage media for receiving metadata indicating one or more data sources, automatically retrieving data from a data source indicated in the metadata based on analytical data, generating a visualization based on the data, the visualization including an updated version of a previous visualization, generating an image of the visualization, and providing a video including the image, the image replacing a previous image within the video. | 2021-05-27 |
20210157844 | MOTION-BASED MEDIA CREATION - A system for motion-based media creation includes an article of footwear or apparel having at least one accelerometer or inertial measurement unit operative to monitor spatial motion of at least a portion of the article of footwear or apparel and generate a data stream indicative of the monitored spatial motion. The system further includes a processor in networked wireless communication with the article of footwear or apparel. The processor is configured to receive the data stream from the article of footwear or apparel; identify at least one motion primitive from the received data stream; and trigger the playback of an audio sample or a visual effect in response to the identified at least one motion primitive. | 2021-05-27 |
20210157845 | SYSTEMS, APPARATUSES, AND METHODS FOR DOCUMENT QUERYING - Techniques for searching documents are described. An exemplary method includes receiving a document search query; querying at least one index based upon the document search query to identify matching data; fetching the identified matched data; determining one or more of a top ranked passage and top ranked documents from the set of documents based upon one or more invocations of one or more machine learning models based at least on the fetched identified matched data and the document search query; and returning one or more of the top ranked passage and the proper subset of documents. | 2021-05-27 |
20210157846 | Systems and Methods for Enriching Documents for Indexing - Provided are systems and methods for enriching documents for indexing. An example method can include receiving a plurality of documents and generating a plurality of enriched documents. The generation of the plurality of enriched documents can include determining, based on a document of the plurality of documents, reference data, determining, based on the reference data and an enrichment policy, additional data, and adding the additional data to the document. Prior to the generation of the plurality of enriched documents, the method may index the reference data of plurality of documents to obtain a source index and generate, based on the enrichment policy and the source index, an enrichment index. The determination of the additional data may include reading the additional data from the enrichment index. | 2021-05-27 |
20210157847 | ATTRIBUTE DIVERSITY FOR FREQUENT PATTERN ANALYSIS - A data processing server may receive a set of data objects for frequent pattern (FP) analysis. The set of data objects may be analyzed using an attribute diversity technique. For the set of data attributes of the set of data objects, the server may arrange the attributes in one or more dimensions. The server may initialize a set of centroids on data points and identify mean values of nearby data points. Based on an iteration of the mean value calculation, the server may identify a set of attributes corresponding to final mean values as being groups of similarly frequent attributes. These groups of similarly frequent attributes may be analyzed using an FP analysis procedure to identify frequent patterns of data attributes. | 2021-05-27 |
20210157848 | METHODS, APPARATUS AND SYSTEMS TO ENFORCE DATA BOUNDARIES THROUGH THE USE OF BOUNDARY LABELS - An apparatus of an edge gateway disclosed herein includes an access evaluator to determine whether a data access attempt, if permitted, will cause data specified in the data access attempt to cross a data boundary, the data boundary associated with at least one condition to be met before the data specified in the data access attempt will be permitted to cross the boundary. The apparatus further includes an operations determiner to determine an operation to be applied to the data for which access is being attempted, in response to determining the data access attempt will cause the data to cross the data boundary, and an operation applier to apply the operation to the data. The application of the operation to the data causes the condition to be met, so that the data access occurs in conformance with the condition. | 2021-05-27 |
20210157849 | DETERMINING AN AUDIT LEVEL FOR DATA - A computer-implemented method according to one embodiment includes analyzing data to determine a sensitivity level for the data; assigning an audit level to the data, based on the sensitivity level; and performing auditing for the data, based on the audit level. | 2021-05-27 |
20210157850 | AUGMENTING RELATIONAL DATABASE ENGINES WITH GRAPH QUERY CAPABILITY - Techniques for augmenting relational databases with graph database capabilities are described. A graph database query requesting data from a graph database is received. The graph database includes a plurality of vertices and a plurality of edges. The graph database query is translated into a relational database query using one or more computer processors. The relational database query references a vertex table and an edge table in a relational database. Result data corresponding with the graph database query is retrieved from the relational database by executing the relational database query against the relational database. | 2021-05-27 |
20210157851 | GRAPH UPDATING APPARATUS, GRAPH UPDATING METHOD AND PROGRAM - A graph updating device includes: a K neighbor vertex search unit that searches for a K neighbor vertex set of an added vertex in a neighbor graph on the basis of the neighbor graph and an object added to the neighbor graph as an added vertex and outputs the K neighbor vertex set; a vertex selection unit that selects a vertex candidate set on the basis of the neighbor graph, the added vertex, and the K neighbor vertex set of the added vertex and outputs the vertex candidate set, the vertex candidate set being a set of vertices that is present in the neighbor graph and possibly contains the added vertex in a K neighbor vertex set thereof; and a neighbor graph updating unit that reconstructs a K neighbor vertex set related to all vertices of the neighbor graph using K neighbor vertex sets of respective vertices of the vertex candidate set and adds the K neighbor vertex set of the added vertex to the reconstructed K neighbor vertex set to generate an updated neighbor graph. | 2021-05-27 |
20210157852 | DATA TREE WITH ORDER-BASED NODE TRAVERSAL - Aspects of the present disclosure provide for operations for a tree data structure that provides order-based node traversal. For some embodiments, the tree data structure stores one or more key-value pairs, implements at least one linked-list data structure, and enables traversal of nodes within the tree data structure based on a key order (e.g., forward or reverse key order). | 2021-05-27 |
20210157853 | SYSTEM AND METHOD FOR TRACKING PRODUCT STOCK IN A STORE SHELF - A system and method for tracking and annotating products in a store shelf is disclosed. The method includes receiving a signal feed from a group of sensors including at least one depth sensor and a sensor capable of measuring distance, determining an area of interest in the shelf, determining a polygonal representation of at least one product present in the area of interest, and assigning a unique polygonal profile to at least one product, and/or storing the unique profile in a database. Such The unique polygonal profile may include a unique ID obtained from a group of attributes. The unique profile may include at least a unique position and a unique centroid. The group of sensors may further include video cameras, thermal, and chemical sensors. | 2021-05-27 |
20210157854 | SYSTEMS, APPARATUSES, AND METHODS FOR PROVIDING EMPHASIS IN QUERY RESULTS - Techniques for displaying a search are described. An exemplary method includes receiving a search query, performing the search query on a plurality of documents, the documents including text passages, to generate a search query result, determining an aspect of the search query result that has a confidence value that exceeds a first confidence threshold with respect to its relevance to the search query; and, displaying the search result including an emphasis on the aspect of the result exceeds the first confidence threshold. | 2021-05-27 |
20210157855 | PASSAGE VERIFICATION USING A FACTOID QUESTION ANSWER SYSTEM - A method, system, and computer program product to verify components of a statement and suggest substitute components using a factoid question answer system. The method may include receiving an input statement, where the input statement comprises a plurality of natural language words. The method may also include determining one or more replacement candidates for the input statement. The method may also include generating one or more candidate answers for each replacement candidate of the one or more replacement candidates. The method may also include mapping, as a replacement candidate—candidate answer mapping, each candidate answer from the one or more candidate answers to its corresponding replacement candidate. The method may also include determining a replacement score for each replacement candidate—candidate answer mapping. The method may also include transmitting an output including one or more suggested replacements and the replacement score to a user interface. | 2021-05-27 |
20210157856 | POSITIVE/NEGATIVE FACET IDENTIFICATION IN SIMILAR DOCUMENTS TO SEARCH CONTEXT - Facet-based search processing is provided which includes receiving a query search context for querying documents of a document set, and retrieving, by similar document search processing, a document subset from the document set. The document subset includes documents of the set most similar to a search document of the query search context. Facet analysis processing is used to generate M candidate facets most-related to the query search context, and facets of the M candidate facets associated with documents of the subset are identified, and classified into a positive facet set and a negative facet set based, at least in part, on extent of facet commonality across the documents. A listing is of the documents in the document subset is provided, with the listing highlighting facets of the positive facet set. | 2021-05-27 |
20210157857 | SYSTEMS, APPARATUSES, AND METHODS TO GENERATE SYNTHETIC QUERIES FROM CUSTOMER DATA FOR TRAINING OF DOCUMENT QUERYING MACHINE LEARNING MODELS - Techniques for generation of synthetic queries from customer data for training of document querying machine learning (ML) models as a service are described. A service may receive one or more documents from a user, generate a set of question and answer pairs from the one or more documents from the user using a machine learning model trained to predict a question from an answer, and store the set of question and answer pairs generated from the one or more documents from the user. The question and answer pairs may be used to train another machine learning model, for example, a document ranking model, a passage ranking model, a question/answer model, or a frequently asked question (FAQ) model. | 2021-05-27 |
20210157858 | HIERARCHICAL, PARALLEL MODELS FOR EXTRACTING IN REAL TIME HIGH-VALUE INFORMATION FROM DATA STREAMS AND SYSTEM AND METHOD FOR CREATION OF SAME - A method includes receiving a first post from an electronic source including first content; determining a source identifier; determining an attribute for the source by broadcasting the first post to a first plurality of filter graph definitions configured to identify attributes of sources according to the respective filter graph definition; and storing in memory, as a source profile identified by the source identifier for the source, the attribute for the source; receiving a second post from the source including second content; determining a source identifier; using the source identifier, querying the memory to access the source profile; correlating the second post with attributes of the source stored in the source profile to produce a correlated second post; and broadcasting the correlated second post to a second plurality of filter graph definitions configured to identify posts with high value information according to the respective filter graph definition. | 2021-05-27 |
20210157859 | INTEGRATED INDEX BLOCKS AND SEARCHING IN BLOCKCHAIN SYSTEMS - Systems and methods for indexing blockchain data in a blockchain system. These systems and methods receive a set of transactions from one or more transaction blocks of a blockchain, wherein the transactions in the set have been validated by one or more peer systems of the blockchain. The systems and methods further generate an index to one or more fields of one or more transactions in the set of transactions of the transaction block generate an index representative of at least one field in the set of transactions of the transaction block and provide the generated index for validation by a peer system of the blockchain. After receiving verification from at least a threshold number of peer systems that the generated index has been validated by the peer system, the generated index is stored as an index block in the blockchain. | 2021-05-27 |
20210157860 | OBJECT RECOMMENDATION METHOD AND APPARATUS, STORAGE MEDIUM AND TERMINAL DEVICE - An object recommendation method and apparatus, a storage medium and a terminal device are provided. The method includes: obtaining historical behavior data and historical feedback data of a user; determining a questioning keyword based on the historical behavior data and the historical feedback data; performing a question-and-answer interaction based on the questioning keyword to obtain feedback data; determining a target recommendation object based on the feedback data; and outputting the target recommendation object, so as to implement recommendation. The provided technical solution diversifies the dimensions in prediction of the interest tendency of the user by using the question-and-answer interaction, improves the accuracy and flexibility in recognizing the objects of interest of the user, thereby improving the accuracy and flexibility of recommendation. | 2021-05-27 |
20210157861 | SYSTEMS, APPARATUSES, AND METHOD FOR DOCUMENT INGESTION - Techniques for intaking one or more documents are described. An exemplary method includes receiving an ingestion request to ingest a document; extracting text from the document; pre-processing the extracted text to generate pre-processed text that is predictable and analyzable; generating an index entry for the extracted text, the index entry to map the extracted text to a reserved field of a plurality of reserved fields; and storing the extracted text, index entry, and pre-processed text in at least one data storage location | 2021-05-27 |
20210157862 | AUTOMATIC DOCUMENT NEGOTIATION - Approaches provide for generating a document (e.g., a contract) that satisfies constraints of at least one party in a negotiation. Information can be obtained from parties seeking to negotiate document sections (e.g., clauses or provisions) of a document such as a contract. Ranking values for a plurality of candidate contracts can be determined based on information from the parties, including their preferences for different sections (e.g., provisions) of the contract. The values can be used to optimize an optimization function that measures the degree to which candidate contracts satisfy the information provided by the parties. For example, an optimization technique, machine learning-based technique, or other appropriate technique can be utilized to determine a document or document information that satisfies the constraints of the parties. Thereafter, a contract can be selected and presented to the parties. The parties can execute the contract, modify, store, or otherwise interact with and/or process the contract. | 2021-05-27 |
20210157863 | DOMAIN-SPECIFIC NEGATIVE MEDIA SEARCH TECHNIQUES - In some implementations, systems and methods that are capable of customizing negative media searches using domain-specific search indexes are described. Data indicating a search query associated with a negative media search for an entity and a corpus of documents to be searched are obtained. Content from a particular collection of documents from among the corpus of documents is obtained and processed. Multiple scores for the entity are computed based on processing the content obtained from the collection of documents. The multiple scores are aggregated to compute a priority indicator that represents a likelihood that the collection of documents includes content that is descriptive of derogatory information. | 2021-05-27 |
20210157864 | SYSTEMS AND METHODS FOR DISPLAYING SUPPLEMENTAL CONTENT FOR AN ELECTRONIC BOOK - Supplemental content related to an electronic book may be obtained by creating a search query using a keyword in selected text of the electronic book. The search query may also include details about the electronic book obtained from a manifest file for the electronic book, including the location of the selected text. | 2021-05-27 |
20210157865 | APPARATUS, METHOD AND COMPUTER PROGRAM FOR CLOUD SCRAPING USING PRE-SCRAPED BIG DATA - A cloud scraping system using pre-scraped big data includes an information providing server which, when receiving a scraping request from a user terminal, provides the user terminal with response information to the received scraping request, and a big data storage which stores pre-scraped information, wherein when the scraping request is about static information, the information providing server acquires the response information using the pre-scraped information. According to the above cloud scraping system using pre-scraped big data, there is an advantage that it is possible to quickly respond to a scraping request from the user terminal afterwards by pre-scraping and storing static information in the big data storage. Additionally, it is possible to improve the scraping server operation efficiency by making a proper use of a single or multi-processing scraping server based on policy information of a scraping target external institution. | 2021-05-27 |
20210157866 | Systems And Methods of Generating or Updating a Design Based on a Universal Resource Locator (URL) - An apparatus includes a network interface and one or more processors. The network interface is configured to receive a request from a client device. The request includes a universal resource locator (URL). The one or more processors are configured, responsive to receiving the request, to identify a design template based on the URL, to generate a design based on the design template, and to generate design data by parsing the URL. The one or more processors are also configured to send, via the network interface, the design and the design data to the client device to cause display of an updated version of the design by applying the design data to the design. The one or more processors are further configured to receive the updated version of the design via the network interface from the client device. | 2021-05-27 |
20210157867 | USER-SPECIFIC SUMMARY GENERATION BASED ON COMMUNICATION CONTENT ANALYSIS - The method, computer program product and computer system may include computing device which may collect application data from one or more applications and archive the application data into a datastore. The computing device may generate a network graph based on the archived application data. The computing device may detect a user's focus on a piece of content contained within the one or more applications, retrieve data associated with the piece of content and determine the user's skill in relation to the piece of content. The computing device may determine the complexity of the piece of content in relation to the determined skill of the user and generate and present a summary of the piece of content. | 2021-05-27 |
20210157868 | SYSTEM AND METHOD OF GENERATING INDIVIDUAL CONTENT FOR A USER OF A SERVICE - Disclosed herein are systems and methods for generating individual content for a user of a service. In one aspect, an exemplary method comprises, gathering data on behavior of a user of a computing device, training a model of a user behavior based of the gathered data, wherein the trained data identifies the user to a predetermined degree of reliability, and generating an individual content for the user of the service based on a predetermined service environment in accordance with a trained model received from a model transmitter. | 2021-05-27 |
20210157869 | INFORMATION SENDING METHOD, APPARATUS AND SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM - The present disclosure relates to an information sending method, apparatus, system and a computer readable storage medium, and pertains to the technical field of computers. The method in the present disclosure includes: analyzing video data of an offline user to determine an attribute of the offline user; searching for historical access information of at least one online user matching the attribute of the offline user; and determining at least one object recommended to the offline user according to the historical access information of each of the at least one online user, and sending information of the at least one object to the offline user. | 2021-05-27 |
20210157870 | REFERRING EXPRESSION GENERATION - A method includes receiving data characterizing historical user interaction with a search engine associated with a plurality of items, the received data including a first search query and a first item name selected by a user in response to receiving a result of a search of the first search query; training, using the received data, a model that maps item names to referring expressions, the training including using the first item name selected by the user as an input to the model and the first search query as a supervisory signal to the model; and providing the model. Related apparatus, systems, techniques, and articles are also described. | 2021-05-27 |
20210157871 | ELECTRONIC DEVICE FOR PROVIDING RESPONSE TO USER QUERY AND OPERATING METHOD THEREOF - Various embodiments of the present disclosure relate generally to an electronic device for providing a response to a user query and an operating method therefor. The electronic device includes an input unit, an output unit, a memory, and at least one processor, wherein the at least one processor receives query-related information from a server over a network, stores the received query-related information in the memory; detects user query through the input unit, determines whether the user query is a query for requesting a response using the network. At least one of an autonomous vehicle (autonomous vehicle), a user terminal, and a server of the present disclosure may be associated with an artificial intelligence module, an unmanned aerial vehicle (UAV), a robot, an augmented reality (AR) device, a virtual reality (VR) device, a device related to 5G service, and the like. | 2021-05-27 |
20210157872 | METHOD AND SYSTEM TO FILTER OUT UNWANTED CONTENT FROM INCOMING SOCIAL MEDIA DATA - A method, system, and product for filtering out unwanted social media content in real-time. The system comprises multiple sets of machine learning classifiers to filter out the unwanted content on any media including but not limited to text, images, audio, and video. Classifiers are trained with labeled data. After being trained, the models screen the incoming real-time data either on a server or a mobile device. A user application is run that results in only approved content to be displayed on the main screen of the user application device. The unwanted data are still available if the user desires to access them. The classifiers are trained with labeled data; and with input parameters in addition to the labeled data. On the device, customized models are trained with the individual user data and Transfers Learning models. When unwanted content is detected, a report is sent to an entity that might help support the receiver. | 2021-05-27 |
20210157873 | PROVIDING NOTIFICATIONS BASED ON GEOFENCING SEARCH RESULTS - Systems and methods for providing notifications based on geofencing search results are provided. In particular, in response to a search query from a user, a plurality of search results can be determined. One or more physical search results having an associated geographic location can be determined from the plurality of search results. A geofencing search result can be generated for at least one of the physical search results. The geofencing search result can include data for establishing a geofence proximate to the geographic location by a user device associated with the user. Upon selection of the geofencing search result by the user, the geofence can be established by the user device. Upon detecting entry into the established geofence, the user device can provide one or more notifications associated with the geofence and/or the search query to the user. | 2021-05-27 |
20210157874 | REFERRAL INFORMATION DETERMINATION AND UTILIZATION - A method, product, and system comprising: obtaining a webpage request from an in-app browser of an application of a user device, wherein the webpage request is configured to request a webpage or a portion thereof from a server, wherein the webpage request comprises a user-agent field; identifying that the webpage request has no valid referral information; and based on the webpage request, determining artificial referral information of the webpage request, wherein the artificial referral information indicates a referral source of the webpage request. | 2021-05-27 |
20210157875 | BLOCKCHAIN-BASED CROSS-CHAIN DATA ACCESS METHOD AND APPARATUS - One or more implementations of the present specification relate to blockchain-based cross-chain data access methods and apparatuses, and electronic devices. An access request that is specific to target data and that is sent by a node device is obtained. The target data is stored in a target blockchain of a multi-chain system that comprises a plurality of blockchains. The access request comprises an access path of the target data. The target blockchain that the target data is located in is determined based on the access path of the target data. A corresponding data access driver configured for the target blockchain is determined based on the access path of the target data. The data access driver is invoked to parse the access request and to access the target data. | 2021-05-27 |
20210157876 | Hardware Implementation of Convolutional Layer of Deep Neural Network - Hardware implementations of, and methods for processing, a convolution layer of a DNN that comprise a plurality of convolution engines wherein the input data and weights are provided to the convolution engines in an order that allows input data and weights read from memory to be used in at least two filter-window calculations performed either by the same convolution engine in successive cycles or by different convolution engines in the same cycle. For example, in some hardware implementations of a convolution layer the convolution engines are configured to process the same weights but different input data each cycle, but the input data for each convolution engine remains the same for at least two cycles so that the convolution engines use the same input data in at least two consecutive cycles. | 2021-05-27 |
20210157877 | ITERATIVE ENERGY-SCALED VARIATIONAL QUANTUM EIGENSOLVER - Techniques regarding an iterative energy-scaled variational quantum eigensolver process are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a read-out component that determines a ground state energy value of a quantum Hamiltonian by employing a variational quantum eigensolver (VQE) algorithm, wherein VQE algorithm utilizes a symmetry that emerges at an energy scale of the quantum Hamiltonian. | 2021-05-27 |
20210157878 | LINEAR PHOTONIC PROCESSORS AND RELATED METHODS - Photonic processors are described. The photonic processors described herein are configured to perform matrix-matrix (e.g., matrix-vector) multiplication. Some embodiments relate to photonic processors arranged according to a dual-rail architecture, in which numeric values are encoded in the difference between a pair optical signals (e.g., in the difference between the powers of the optical signals). Relative to other architectures, these photonic processors exhibit increased immunity to noise. Some embodiments relate to photonic processors including modulatable detector-based multipliers. Modulatable detectors are detectors designed so that the photocurrent can be modulated according to an electrical control signal. Photonic processors designed using modulatable detector-based multipliers are significantly more compact than other types of photonic processors. | 2021-05-27 |
20210157879 | DATA ANALYSIS DEVICE, METHOD, AND PROGRAM - An interval-valued matrix including elements represented by interval values can be resolved into factor matrices with high accuracy. A parameter estimation unit | 2021-05-27 |
20210157880 | GOAL-DRIVEN AUTHORING ASSISTANCE USING CAUSAL STYLISTIC PRESCRIPTIONS - A method for generating stylistic feature prescriptions to align a body of text with one or more target goals includes receiving, at a stylistic feature model, a body of text, where the body of text is selected by a user via a graphical user interface (GUI). The stylistic feature model identifies stylistic features from the body of text and populates a stylistic feature vector with the stylistic features. A trained de-confounded prediction model receives the stylistic feature vector. The trained de-confounded prediction model using the stylistic feature vector generates a prediction value for each of one or more target goals, compares the prediction value for each of the one or more target goals to a target value for each of the one or more target goals and outputs, for display on the GUI, one or more stylistic feature prescriptions to the body of text based on results of the comparing. | 2021-05-27 |
20210157881 | OBJECT ORIENTED SELF-DISCOVERED COGNITIVE CHATBOT - A computer-implemented system and method for searching comprises a processor to respond to a question received from a user during a messaging session. The question is analyzed into respective annotated portions associated with predetermined attributes of the question, including a question type and part of speech. A data model is identified using mapping information defined in the data model with only analyzed predetermined attributes of the question. Relationships are traversed among the data model identified, in a database, using the mapping information. Corresponding values associated with the relationships are retrieved from the database data, and a response to the question is generated using the corresponding values retrieved. | 2021-05-27 |
20210157882 | SIMULATIONS WITH MODIFIED AGENTS FOR TESTING AUTONOMOUS VEHICLE SOFTWARE - The disclosure relates to testing software for operating an autonomous vehicle. In one instance, a simulation may be run using log data collected by a vehicle operating in an autonomous driving mode. The simulation may be run using the software to control a simulated vehicle and by modifying a characteristic of an agent identified in the log data. During the running of the simulation, that a first type of interaction between the first simulated vehicle and the modified agent will occur may be determined. In response to determining that the particular type of interaction will occur, the modified agent may be replaced by a interactive agent that simulates a road user corresponding to the modified agent that is capable of responding to actions performed by simulated vehicles. That the particular type of interaction between the simulated vehicle and the interactive agent has occurred in the simulation may be determined. | 2021-05-27 |
20210157883 | UNIVERSAL DATA SCAFFOLD BASED DATA MANAGEMENT PLATFORM - The disclosure is related to a data management platform (“platform”) for providing a secure storage environment for digital contents associated with a user. The platform may be accessible via an app installed on a user device, which allows the user to upload, modify, and view digital contents. Because a digital content is mapped to a universal scaffold in a structured format, the platform can organize and display the digital contents in meaningful ways. The digital contents can be hosted on a remote server. The platform provides zero-knowledge encryption so that the digital contents stored at the server are secure, as in one cannot know the contents of the encrypted information stored at the server. The platform also facilitates zero-knowledge offers in which offers are sent to multiple users but the server does not know to which users the offers are presented until an offer is accepted by the user. | 2021-05-27 |
20210157884 | Systems And Methods For Expedited Entitlement Checks - Systems and methods for managing access data are disclosed. One method can comprise receiving prediction information relating to one or more content options and requesting access information associated with the prediction information. At least a portion of the received access information can be processed to provide a preliminary access decision. A request for access relating to the one or more data options can be received and an access decision based at least in part on the preliminary access decision can be provided. | 2021-05-27 |
20210157885 | ANONYMIZED BIOMETRIC DATA INTEGRATION - Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream. | 2021-05-27 |
20210157886 | Mobility User Authentication Apparatus and Method Using Brain Wave - A mobility user authentication apparatus using a brain wave signal includes a receiver configured to receive a predetermined user input from a passenger of a mobility, a display configured to display a preset image list to the passenger on a predetermined area in the mobility based on the received user input, as a response to the displayed image list, a sensor configured to collect a brain wave signal for the passenger for a predetermined time, and a controller configured to perform authentication for the passenger by analyzing the collected brain wave signal. | 2021-05-27 |
20210157887 | METHOD AND SYSTEM FOR FOR HANDWRITTEN SIGNATURE VERIFICATION - This disclosure relates generally to a method and system for online handwritten signature verification providing a simpler low cost system. The method comprises extracting signature data for the subject from a sensor array for the predefined time window at regular predefined time instants. Further, differentiating the matrix row wise and column wise to generate a row difference matrix and a column difference matrix. Further, determining an idle signature time fraction for the extracted signature data of the subject being monitored from the column difference matrix. Further, determining a plurality of signature parameters based on the row difference matrix and the column difference matrix. Further, analyzing the idle signature time fraction and the plurality of signature parameters of the subject being monitored based on a Support Vector Machine (SVM) classifier, wherein the SVM classifier performs online classification of the extracted signature data into one of a matching signature class and a non-matching signature class. | 2021-05-27 |
20210157888 | SECURE ACCESS WITH DENDRITIC IDENTIFIERS - Allowing secure access to a computer system includes receiving an online access request from a user, selecting a dendritic identifier, associating selected information received in the online access request with the dendritic identifier, and providing the dendritic identifier to the user. Providing the dendritic identifier to the user can include sending (e.g., physically sending) the dendritic identifier to the user. Allowing secure access to the computer system can further include receiving information related to the dendritic identifier from the user, assessing the authenticity of the dendritic identifier based on the information received from the user, and if the authenticity of the dendritic identifier is verified, allowing the user access to the computer system. | 2021-05-27 |
20210157889 | IDENTIFICATION SYSTEM ENROLLMENT AND VALIDATION AND/OR AUTHENTICATION - A system performs identification system enrollment and validation and/or authentication. In some examples, the system receives a digital representation of a biometric for a person from a device, biographic information for the person, and monitoring of capture of the biometric and determines whether the biometric is genuine. In others, the system obtains data from a network search using the biometric and the information, generates a comparison of the biometric and the information to the data from the network search, and uses the comparison to determine whether the person is who the person asserts. In still others, the system performs a number of identity checks using the information and the biometric, weights certainty and risk of each of the number of identity checks, and determines whether to approve the person for identification system enrollment using an aggregation of the identity checks. | 2021-05-27 |
20210157890 | METHODS, APPARATUS AND COMPUTER-READABLE MEDIUMS RELATED TO BIOMETRIC AUTHENTICATION - Embodiments of the disclosure provide a mechanism for performing a biometric algorithm on ear biometric data acquired from a user. The mechanism may be used for biometric authentication, or in-ear detect, for example. In one embodiment, a method is provided in which a quality metric of an input signal to a transducer and/or a signal on a return path from the transducer is monitored. One or more steps of a biometric process, comprising monitoring of a parameter related to an admittance of the transducer, comparison of the parameter to a stored profile for an authorised user, generation of a score based on the comparison, comparison of the score to one or more threshold values, and initiation of one or more actions, may be performed responsive to the quality metric meeting one or more criteria. | 2021-05-27 |
20210157891 | CERTIFICATE VERIFICATION - A computer-implemented certificate verification method includes: obtaining, by a certificate verification module, at least two images of a certificate, in which the at least two images are acquired under different acquisition conditions; obtaining, from the at least two images, at least two target images that correspond to respective images of the at least two images and that each include an image of a light-reflective coating of the certificate; and determining, based on the at least two target images, a probability that the certificate is an original. | 2021-05-27 |
20210157892 | SYSTEMS AND METHODS FOR CROSS COUPLING RISK ANALYTICS AND ONE-TIME-PASSCODES - Example embodiments provide systems and methods for validating an action using a physical token, such as a near-field-communications (NFC)-capable chip. A server may receive a request to perform the action, and may require validation from the holder of the physical token. The holder of the physical token may log into an application using their log-in credentials, providing a first tier of authentication. The holder may then scan the physical token with a reader on their mobile device, which provides a second tier of authentication. The scan may reveal a value for a counter on the physical token, which may be compared to a counter at the server in order to validate that the physical token has been used as expected. If the server deems it appropriate, a third (or further) tier may be required, such as scanning a photographic identification of the holder. | 2021-05-27 |
20210157893 | Secure Element as a Digital Pocket - The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are mapped to available resources based on a model architecture for the secure element in order to provide hardware abstraction, the available physical resources varying based on the model architecture and an associated host device, the virtual resources allowing consistent interaction with the virtual resources regardless of variation in the physical resources available and their location. The hardware abstraction increases the versatility of the secure element and may contribute to the secure element's functionality. The secure element providing functionality to replace most items carried in an individual's pockets, e.g., logical and physical keys, a thumb drive, identification, credit and debit cards, etc. | 2021-05-27 |
20210157894 | USER AUTHENTICATION APPARATUS AND RECORDING MEDIA - A user authentication apparatus includes a photographing unit which photographs a two-dimensional code displayed on a user authentication support terminal, wherein the two-dimensional code is formed by encoding at least first identification information that uniquely identifies the user, and second identification information that uniquely identifies all user authentication performed using the user authentication support terminal collectively, into the two-dimensional code, an authentication factor acquisition unit which acquires an authentication factor, a decoding unit which acquires the first identification information and the second identification information by decoding the two-dimensional code, a first identification information inquiry unit which inquires as to an existence of the first identification information by referring to a storage unit, a second identification information collation unit which, when the inquiry issued by the first identification information inquiry unit is successful, reads from the storage unit the second identification information and collates the second identification information acquired by the decoding unit with the second identification information read from the storage unit, an authentication factor collation unit which, when the inquiry issued by the first identification information inquiry unit is successful, reads from the storage unit the authentication factor and collates the authentication factor acquired by the authentication factor acquisition unit with the authentication factor read from the storage unit, and a determination unit which determines that authentication of the user has been performed successfully when the collation performed by both the second identification information collation unit and the authentication factor collation unit are successful. | 2021-05-27 |
20210157895 | INFORMATION PROCESSING METHOD, INFORMATION DISPLAY METHOD, NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM, TERMINAL AND SERVER - An information processing method to be carried out by a terminal including controlling a code reader to read code information displayed on a display device, the code reader corresponding to the code information and installed in the terminal, the code information being for a user authentication enabling an obtaining information provided by a first server, controlling transmission of information related to the code reader to the first server, controlling reception of information related to a service that manages user information from the first server based on the information related to the code reader, controlling communication with a second server of the service based on the information related to the service, and controlling execution a process related to an authentication of a user of the terminal based on a communication result with the second server. | 2021-05-27 |
20210157896 | METHOD AND SYSTEM FOR FACILITATING AN IDENTIFICATION OF AN APPLICATION - Systems and methods for facilitating an identification of an application that runs on a platform are provided. The method includes receiving a request to deploy an instance of the application on the platform and an authentication credential relating to an owner of the application; authenticating the request; deploying the instance of the application on the platform; recording an association between the owner and the instance of the application; initiating an execution of the instance of the application without the authentication credential; issuing a platform-local identity token to the instance of the application; authenticating a request for a token describing the application owner using the platform-local identity token; receiving the requested token; providing a platform identity to an enterprise service; receiving a token describing an enterprise identity; receiving an authentication credential relating to the application owner; and using the authentication credential with respect to at least one other application. | 2021-05-27 |
20210157897 | SECURE AUTHENTICATION DEVICE USING LIGHT AND RADIO SIGNALS - The invention relates to an authentication device intended to be used with an electronic device comprising a screen and a radio transceiver, the authentication device being characterised in that it comprises a light receiver, disposed on a face of the authentication device intended to be placed facing the screen, a radio transceiver and a memory comprising an encryption key, the authentication device being adapted to receive, via the light receiver, and decode an identification light signal emitted by the screen, the identification light signal encoding a message comprising identification information, broadcasting the identification information via its radio transceiver, receiving, via its radio transceiver, a request to establish a connection from the electronic device and establishing the connection, receiving, via the connection established, a message comprising information to be encrypted, encrypting said information using the encryption key and sending a message to the electronic device, the message comprising the encrypted information. | 2021-05-27 |
20210157898 | METHOD AND ELECTRONIC DEVICE FOR PROVIDING AUTHENTICATION USING AN IMAGE SENSOR - Accordingly, the embodiments herein provide a method for providing authentication using at least one image sensor of an electronic device. The method includes receiving, by the electronic device, a plurality of frames from the at least one image sensor of the electronic device, where each frame includes a plurality of Optical Black (OB) pixels. Further, the method includes determining, by the electronic device, at least one set of optimal OB pixels from the plurality of frames. Further, the method includes generating, by the electronic device, at least one unique key based on the at least one set of optimal OB pixels for the authentication. | 2021-05-27 |
20210157899 | Method and System for User Induced Password Scrambling - A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider. | 2021-05-27 |
20210157900 | SECURING PASSWORDS BY USING DUMMY CHARACTERS - Various systems and methods are provided for using dummy characters to provide enhanced security of a user's login credentials. The functionality disclosed herein provides specific steps for the creation, evaluation, storage, and use of such dummy characters in conjunction with a user's login credentials. Dummy characters can be thought of as characters that are not part of a user's actual password, but which are mixed in and around the actual characters when the password is being entered, in order to protect a user's true password from prying eyes and nefarious actors. Dummy characters can be associated with a specific user and/or a specific device or devices associated with a specific user. The functionality provided herein prevents a nefarious actor from simply repeating an entire password string (including the dummy characters) on a device that is not associated with the user whose credentials the nefarious actor is attempting to misappropriate. | 2021-05-27 |
20210157901 | Identification of Database Intrusion by Changes in Data Tables - Aspects described herein may allow for the application of an artificial neural network architecture to identify intrusion in a database. Changes to components of a data table of the database may be tracked as a snapshot of the changes over a period of time. Any change in the data table may be associated with a user. Utilizing multiple snapshots, a background substitution technique may be utilized to generate a matrix of the changes to the data table over a period of time. A model having an artificial neural network architecture may utilize the matrix as an input set to identify the user as an unauthorized user accessing the database. | 2021-05-27 |
20210157902 | VEHICLE INFORMATION COMMUNICATION SYSTEM - A vehicle information communication system including a center device and an in-vehicle device is provided. When pieces of configuration information regarding configurations of respective devices are received from electronic control units, the in-vehicle device transmits a configuration information list including the pieces of configuration information to the center device. The center device includes a configuration information storage unit storing the configuration information list approved with respect a vehicle type, compares the configuration information list received from the in-vehicle device with the configuration information list stored in the configuration information storage unit. When the center device determines that the configuration information list received from the in-vehicle device is disapproved, the center device transmits a presence of abnormality to the in-vehicle device. | 2021-05-27 |
20210157903 | USING A TRUSTED EXECUTION ENVIRONMENT FOR A PROOF-OF-WORK KEY WRAPPING SCHEME THAT RESTRICTS EXECUTION BASED ON DEVICE CAPABILITIES - The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key from an encrypted memory region, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the deriving consumes computing resources for a duration of time; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time. | 2021-05-27 |
20210157904 | USING A TRUSTED EXECUTION ENVIRONMENT FOR A PROOF-OF-WORK KEY WRAPPING SCHEME THAT VERIFIES REMOTE DEVICE CAPABILITIES - The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: accessing instructions, a wrapped key, and a cryptographic attribute for the wrapped key from an encrypted memory region, wherein the wrapped key encodes a cryptographic key; executing, by a processing device, the instructions to derive the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the executing consumes computing resources for a duration of time; using the cryptographic key to access program data; executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time; and transmitting a message comprising an indication of the evaluated condition. | 2021-05-27 |
20210157905 | SYSTEMS AND METHODS FOR MANAGING AND SECURING COMPUTER SYSTEMS - Systems and method for managing and securing computer systems are disclosed, wherein a method comprises: making a function call to a target function of a software component; calling, by the target function, a gateway function; querying, by the gateway function, an activation setting; and terminating, by the gateway function, the function call to the target function if the activation setting indicates an inactive status. | 2021-05-27 |
20210157906 | SYSTEMS AND METHODS FOR PROACTIVE AND REACTIVE DATA SECURITY - Disclosed herein are systems, methods, and storage media for distributed system security. In an example embodiment, a computer-executable method includes receiving a first item of executable code, calculating a hash of the first item of executable code, and comparing the calculated hash to a database of hashes. Responsive to a determination that the calculated hash does not match any hash in the database of hashes, a first security policy is applied to the first item of executable code. Triggering of the first policy indicates that the first item of executable code should be blocked from execution. If the first item of executable code does not trigger the first security policy, the method includes executing the first item of executable code and intercepting a request initiated by the first item of executable code during execution. In the request matches a second security policy, the request is blocked and/or filtered or sanitized, based on attribute-based access control policies. | 2021-05-27 |
20210157907 | DORMANT ACCOUNT IDENTIFIER - A dormant account identifier is disclosed. An inactive account can be determined based on whether a user activity of the account is outside a threshold amount. A determination can be made as to whether the inactive account is a dormant account based on account activity of a peer account to the inactive account. | 2021-05-27 |
20210157908 | Method for Paging, Access Network Device, and Terminal Device - Implementations of the present application disclose a method for paging, an access network device and a terminal device. The method includes: an access network device receives movement information of a terminal device sent by the terminal device; the access network device determines, according to the movement information, a target paging area where the access network device initiates paging to the terminal device; and the access network device sends the target paging area to the terminal device. The method, the access network device and the terminal device according to the implementations of the present application are beneficial for the access network device to configure a reasonable paging area, thereby reducing signaling overhead. | 2021-05-27 |
20210157909 | SAMPLE DATA GENERATION APPARATUS, SAMPLE DATA GENERATION METHOD, AND COMPUTER READABLE MEDIUM - An acquisition unit ( | 2021-05-27 |
20210157910 | ACCESS CARD PENETRATION TESTING - A method can include obtaining access card data from an access card. The access card can include accessibility data. The access card can be configured to electronically permit access to one or more systems by transmitting the accessibility data. The access card data can include at least a portion of the accessibility data. The method can further include storing the access card data. The method can further include transmitting the access card data to a penetration test system that is configured to test the one or more systems for at least one system vulnerability based, at least in part, on the access card data. | 2021-05-27 |
20210157911 | SYSTEM AND METHOD FOR COUNTERACTING ADVERSARIAL ATTACKS - Aspects of the present disclosure involve systems, methods, devices, and the like for generating an adversarially resistant model. In one embodiment, a novel architecture is presented that enables the identification of an image that has been adversarially attacked. The system and method used in the identification introduce the use of a denoising module used to reconstruct the original image from the modified image received. Then, further to the reconstruction, an adversarially trained model is used to make a prediction using at least a determination of a loss that may exist between the original image and the denoised image. | 2021-05-27 |
20210157912 | DEFENDING MACHINE LEARNING SYSTEMS FROM ADVERSARIAL ATTACKS - Techniques are disclosed for detecting adversarial attacks. A machine learning (ML) system processes the input into and output of a ML model using an adversarial detection module that does not include a direct external interface. The adversarial detection module includes a detection model that generates a score indicative of whether the input is adversarial using, e.g., a neural fingerprinting technique or a comparison of features extracted by a surrogate ML model to an expected feature distribution for the output of the ML model. In turn, the adversarial score is compared to a predefined threshold for raising an adversarial flag. Appropriate remedial measures, such as notifying a user, may be taken when the adversarial score satisfies the threshold and raises the adversarial flag. | 2021-05-27 |
20210157913 | MODEL DEVELOPMENT AND APPLICATION TO IDENTIFY AND HALT MALWARE - A method for halting malware includes: monitoring plural file system events with a system driver to detect an occurrence of a file system event having a predetermined file type and log event type; triggering a listening engine for file system event stream data of a file associated with the detection of the file system event, the file system event stream data indicating data manipulation associated with the file due to execution of a process; obtaining one or more feature values for each of plural different feature combinations of plural features of the file based on the file system event stream data; inputting one or more feature values into a data analytics model to predict a target label value based on the one or more feature values of the plural different feature combinations and agnostic to the process; and performing a predetermined operation based on the target label value. | 2021-05-27 |
20210157914 | DETECTION OF MALWARE IN DOCUMENTS - A method may include extracting, from a document, first content of a first content type and second content of a second content type, deriving first features from the first content and second features from the second content, and generating a first prediction by applying a first supervised model to the first features and a second prediction by applying a second supervised model to the second features. The first supervised model may correspond to the first content type, and the second supervised model may correspond to the second content type. The method may further include combining the first prediction and the second prediction to predict that the document comprises malicious code. | 2021-05-27 |
20210157915 | SYSTEMS AND METHODS FOR GENERATING AN INVENTORY OF SOFTWARE APPLICATIONS FOR OPTIMIZED ANALYSIS - A device may receive data identifying applications, wherein each application includes files and each file includes functions and lines of code. The device may generate file hashes for the files, line hashes for the lines of code, and function hashes for the functions. The device may store, in a data structure, data identifying one or more of the applications, the files, the lines of code, the functions, the file hashes, the line hashes, and the function hashes. When scanning a new application, the device may generate a hash associated with one of the files of the new application, and may determine that the hash associated with the file of the new application matches one of the file hashes. The device may refrain from performing a scan of the file of the new application based on determining that the hash of the file matches one of the file hashes. | 2021-05-27 |
20210157916 | Probabilistic Set Membership Using Bloom Filters - A method for determining whether data is included in a database is described. In one embodiment, the method may include receiving, from a remote computing device, a search request that includes a portion of a signature, comparing the portion of the signature with a plurality of signatures stored at the database, determining whether at least one match exists between the portion of the signature and the plurality of signatures, upon determining at least one match exists, identifying each match and identifying a bloom filter that includes each match, and transmitting the bloom filter to the remote computing device. | 2021-05-27 |
20210157917 | COLLABORATIVE APPLICATION SECURITY - Systems, methods, and computer media for collaboratively securing software applications are provided herein. Through a collaborative approach, the described examples allow detection and management of unauthorized users across applications and application suites. By communicating details regarding cyber-attacks among applications, threats to applications can be managed pre-emptively. For example, applications can use attacks on other applications to implement new honeytokens, threat detection points, and blacklisted usernames or other identifiers to limit data access in future attacks. | 2021-05-27 |
20210157918 | INTRUSION RESILIENT APPLICATIONS - In an example there is provided a method for receiving notification of an intrusion event in relation to an application from an intrusion detection system, accessing state data in relation to a state of the application prior to the intrusion event, the state data having been stored on the basis of a change of state of the application, accessing a policy to be applied to the state data in response to the intrusion event, modifying the state data on the basis of the policy, and restoring the application on the basis of the modified state data. | 2021-05-27 |
20210157919 | CYBER SECURITY USING ONE OR MORE MODELS TRAINED ON A NORMAL BEHAVIOR - Disclosed herein is a method for detection of a cyber-threat to a computer system. The method is arranged to be performed by a processing apparatus. The method comprises receiving input data associated with a first entity associated with the computer system, deriving metrics from the input data, the metrics representative of characteristics of the received input data, analysing the metrics using one or more models, and determining, in accordance with the analysed metrics and a model of normal behavior of the first entity, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. A computer readable medium, a computer program and a threat detection system are also disclosed. | 2021-05-27 |
20210157920 | DYNAMIC ANALYSIS TECHNIQUES FOR APPLICATIONS - A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment. In some cases, analyzing the sample includes extracting the sample's user interface layout into a tree hierarchy of user interface elements. The set of selected events is performed. In some cases, at least one emulator detection resistance action is performed. A maliciousness verdict is determined for the sample based at least in part on one or more responses taken by the sample in response to the set of selected events being performed by the dynamic analyzer. | 2021-05-27 |
20210157921 | SYSTEM AND METHOD FOR RUNTIME FIRMWARE VERIFICATION, RECOVERY, AND REPAIR IN AN INFORMATION HANDLING SYSTEM - A management system for an information handling system includes a memory device and a management controller. The memory device includes a primary firmware image and a backup firmware image. The management controller boots the management system. The boot of the management system includes a read of a first block at an offset within the primary firmware image. The management controller further determines that the read of the first block had a first read error, and reboots the management system in response to determining that the read of the first block had the first read error. The reboot of the management system includes a read of a second block at the offset within the backup firmware image. | 2021-05-27 |
20210157922 | APPLICATION MANAGEMENT METHOD FOR TERMINAL, APPLICATION SERVER, AND TERMINAL - Embodiments of the present invention disclose an application management method for terminals, including: after receiving the application download request sent by the terminal, the application server sends the corresponding application installation package to the terminal. Then, the first verification message sent by the terminal is received, and the first verification message is generated by the terminal according to the content of the received application installation package. After determining that the first verification message is consistent with a stored second verification message, the application server sends an permit-to-install message to the terminal, so that the terminal installs the application according to the received application installation package. Because the application server determines the legitimacy of the application package, it does not need the terminal to verify by using the certificate, thereby reducing the certificate work management for the terminal and improving the efficiency of application installation. | 2021-05-27 |
20210157923 | CLUSTER SECURITY BASED ON VIRTUAL MACHINE CONTENT - A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed. | 2021-05-27 |
20210157924 | COVERAGE OF WEB APPLICTION ANALYSIS - A method for detecting a defect may include extracting, from application code and using a framework support specification corresponding to a framework, a framework interaction between the application code and the framework. The framework interaction specifies an object used by the application code and managed by the framework. The method may further include performing, using the framework interaction, a dynamic analysis of the application code to obtain a heap snapshot, performing, using the heap snapshot and the framework interaction, a static analysis of the application code, and detecting, by the static analysis, the defect. | 2021-05-27 |
20210157925 | SELECTIVE RUNTIME ACTIVATION OF ANTI-ROP DEFENSE - A method, an apparatus and a computer program product for detecting and protecting against just-in-time Return-Oriented Programming (ROP) attacks on computer code by selective runtime activation of anti-ROP defenses. The method comprises executing a dynamic agent while the computer code is being executed that monitors for exploitation of memory exposure vulnerabilities and flow hijack vulnerabilities within the computer code. The dynamic agent identifies, during execution of the computer code, an exposed portion of the computer code that was exposed by the exploitation of the one or more memory exposure vulnerabilities. In o response to the identification of the exposed portion of the computer code, the dynamic agent performs an anti-ROP defense on the exposed portion. | 2021-05-27 |
20210157926 | Systems and Methods For Triaging Software Vulnerabilities - Systems and methods are provided for the classification of identified security vulnerabilities in software applications, and their automated triage based on machine learning. The disclosed system may generate a report listing detected potential vulnerability issues, and extract features from the report for each potential vulnerability issue. The system may receive policy data and business rules, and compare the extracted features relative to such data and rules. The system may determine a token based on the source code of a potential vulnerability issue, and a vector based on the extracted features of a potential vulnerability issue and based on the token. The system may select a machine learning modelling method and/or an automated triaging method based on the vector, and determine a vulnerability accuracy score based on the vector using the selected method. | 2021-05-27 |
20210157927 | NETWORKED APPLICATION ORCHESTRATION - Network-based applications and virtualized components are deployed according to a security analysis of the infrastructure to be used and applications to be run on it. A specification of requirements ( | 2021-05-27 |
20210157928 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus ( | 2021-05-27 |