24th week of 2020 patent applcation highlights part 57 |
Patent application number | Title | Published |
20200184070 | CONFIDENTIAL MACHINE LEARNING WITH PROGRAM COMPARTMENTALIZATION - A method for implementing confidential machine learning with program compartmentalization includes implementing a development stage to design an ML program, including annotating source code of the ML program to generate an ML program annotation, performing program analysis based on the development stage, including compiling the source code of the ML program based on the ML program annotation, inserting binary code based on the program analysis, including inserting run-time code into a confidential part of the ML program and a non-confidential part of the ML program, and generating an ML model by executing the ML program with the inserted binary code to protect the confidentiality of the ML model and the ML program from attack. | 2020-06-11 |
20200184071 | Detection of Suspicious Objects in Customer Premises Equipment (CPE) - A method is provided for validating an inventory of files in a file system of a customer premises equipment (CPE). The method includes developing a database containing a file system inventory of a validated CPE operating in different scenarios or under different operating conditions that may include different networks, different service provider configurations and different end user feature settings. The validated CPE will be allowed to operate in these different scenarios so that an inventory of files and their attributes may be obtained at different times, such as after a reboot, after a change in software feature configurations, and so on. A file system inventory of a CPE system under test is obtained and each entry in the inventory is compared to the entries in the validated file system database to identify unexpected discrepancies. | 2020-06-11 |
20200184072 | ANALYSIS DEVICE, LOG ANALYSIS METHOD, AND RECORDING MEDIUM - Provided is an analysis device including: feature extraction means configured to be able to, by use of a first feature value extracted from a first log entry being a log entry in which information indicating an action of a software program is recorded and a second feature value being different from the first feature value and being extracted from one or more second log entries being log entries, generate feature information related to the first log entry; and analysis model generation means configured to, by use of learning data including one or more sets of the feature information related to the first log entry and importance level information indicating an importance level assigned to the first log entry, generate an analysis model capable of determining an importance level related to another log entry. | 2020-06-11 |
20200184073 | AUTOMATIC THREAT DETECTION OF EXECUTABLE FILES BASED ON STATIC DATA ANALYSIS - Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful. | 2020-06-11 |
20200184074 | SECURITY DETECTION SYSTEM WITH PRIVILEGE MANAGEMENT - A system and method of de-elevating a process created in a computing device of a computer system are disclosed. In certain aspects, a method includes detecting a user login within a login session of a computing device in the computer system, the login session having a default security context. The method also includes creating a de-elevated security context for the login session, wherein the de-elevated security context has fewer privileges than the default security context. The method also includes detecting a process being created within the login session. The method further includes determining that the process is potentially malicious by comparing an intended state and a digital profile of the computing device. The method also includes launching the process using the de-elevated security context. | 2020-06-11 |
20200184075 | IMAGE FORMING APPARATUS, VIRUS CHECKING METHOD AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM ENCODED WITH VIRUS CHECKING PROGRAM - An image forming apparatus to which an external storage device is attachable and from which the external storage device is detachable, includes a hardware processor, wherein the hardware processor, in response to detection of attachment of the external storage device, checks presence of a computer virus in a plurality of data pieces stored in the external storage device, determines a target data piece to be processed from among the plurality of data pieces stored in the external storage device, and in response to determination of the target data piece while the plurality of data pieces stored in the external storage device are being checked, checks presence of a computer virus in such a manner that the target data piece is given a higher priority than other data pieces. | 2020-06-11 |
20200184076 | DETECTION OF HARDWARE SECURITY ATTACKS - In example implementations, an apparatus is provided. The apparatus includes an input sensor, a memory, a comparator, and a processor. The processor is communicatively coupled to the input sensor, the memory, and the comparator to control operation of the input sensor, the memory, and the comparator. The input sensor is to measure a bus signal of a computing device. The memory is to store the bus signal that is measured and a reference bus signal. The comparator is to compare the bus signal that is measured to the reference bus signal to detect a hardware security attack. | 2020-06-11 |
20200184077 | METHOD AND APPARATUS FOR SECURE BOOT OF EMBEDDED DEVICE - In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus is an embedded-system device. The embedded-system device loads a first boot loader from a read only section of a storage device in an initialization process of the embedded-system device. The embedded-system device also loads, by the first boot loader, a public key from the read only section. The embedded-system device further generates a first verification code for static code and data stored in a first section of the storage device. The embedded-system device then decrypts, by the first boot loader, an encrypted signature stored in the first section by using the public key to obtain a second verification code. The embedded-system device determines integrity of the static code and data based on the first verification code and the second verification code. | 2020-06-11 |
20200184078 | SECURE BOOT OF REMOTE SERVERS - Systems and methods for diskless booting a remote server. The remote server includes a secure cryptoprocessor having a root key that is unique to the cryptoprocessor. Keying information can be fetched from an image server, which includes a certificate associated with the remote server and a private key of a key pair associated with the remote server. The key pair can be generated by the secure cryptoprocessor based on the root key. The client certificate can be created from a public key of the key pair. A mutually authenticated secure channel between the servers can be established by authenticating the servers based at least in part on the loaded keying information. Images of components of the remote server can be fetched from the image server via the secure channel, and then the remote server can be further booted accordingly. | 2020-06-11 |
20200184079 | PROGRAM VERIFICATION SYSTEM, METHOD, AND PROGRAM - A program verification system of the invention includes program verification means | 2020-06-11 |
20200184080 | MASKING PRIVATE CONTENT ON A DEVICE DISPLAY BASED ON CONTEXTUAL DATA - A computer-implemented method includes: identifying, by a computing device, private portions and non-private portions of content displayed on a user device; generating, by the computing device, instructions to modify the display of the content on the user device to mask the private portions of the content, group the private portions of the content together, and group and the non-private portions of the content together; and outputting, by the computing device, the instructions to cause the user device to modify the display of the content on the user device such that the masked private portions of the content are grouped together and the non-private portions of the content are grouped together, wherein the non-private portions are exposed and visible. | 2020-06-11 |
20200184081 | GENERATION OF A MODEL PARAMETER - Implementations of the present specification provide method for determining a new model parameter for a data processing model. The method includes determining and receiving, from one or more other data parties, one or more other shares of a new model parameter. The one or more other shares of the new model parameter can be combined with a first share of the new model parameter determined by a first data party to produce a new model parameter. The new model parameter is used to train the data processing model. | 2020-06-11 |
20200184082 | SARGABLE QUERY-PREDICATE EVALUATION FOR ENCRYPTED DATABASES - A database-management system provides sargable evaluation for query predicates that compare an “LHS” encrypted database-column operand to an “RHS” expression operand. The system directly compares the two operands if all their attributes match. If the operands are encrypted string-type values differing only in length, the system truncates the RHS or pads it with encrypted blanks and, if a truncation loses meaningful data, evaluates the predicate as never satisfying an equality condition. In all other cases, if all attributes of a plaintext RHS don't match those of the plaintext data encoded into the LHS column, the system attempts to cast the RHS to match the plaintext LHS data. An error condition or data loss at this step allows the system to sargably evaluate the predicate without further analysis, but if the casting is successful and error-free, the system encrypts the resulting RHS and performs a sargable predicate evaluation. | 2020-06-11 |
20200184083 | VIDEO RECORDING APPARATUS AND VIDEO RECORDING VERIFICATION SYSTEM, AND VIDEO RECORDING METHOD AND VIDEO VERIFICATION METHOD - A video recording apparatus includes an illumination apparatus applying a modulated illumination light, a control apparatus controlling the illumination apparatus, an imaging apparatus imaging the illumination light and an object at the same time to generate video data; and a storage apparatus storing the video data generated by the imaging apparatus. The control apparatus generates encrypted data by using at least a portion of the video data imaged by the imaging apparatus and encryption information generated as information changing in accordance with a date and time and used for encryption and controls the illumination apparatus such that the illumination light is modulated by the generated encrypted data. | 2020-06-11 |
20200184084 | SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK - The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly. | 2020-06-11 |
20200184085 | COMPUTER METHOD AND GRAPHICAL USER INTERFACE FOR IDENTITY MANAGEMENT USING BLOCKCHAIN - According to embodiments, possession of a private key is replaced with possession of a registered personal electronic device, such as a smartphone, as proof of identity. Registration on a blockchain includes publishing a person's public key and registering the person's IMEI (Hardware ID) Hash, according to an embodiment. Registration on the blockchain gives others a way to verify that a transaction was signed by the person and sent from the person's personal electronic device by transmitting a challenge message to the person as a digital challenge, and verifying that the person possesses a corresponding private key by responding with an encrypted message that can be decrypted to display the original message. | 2020-06-11 |
20200184086 | DISTRIBUTED PARALLEL DATA PROTECTION SYSTEM AND METHOD - A method and system operate to secure and efficiently manage data. The method includes performing steps such as generating independent keys corresponding to multiple portions of segmented data and utilizing the independent keys to encrypt the multiple portions of segmented data. The method additionally includes generating a master key, encrypting the independent keys with the master key, and storing each portion of the segmented data adjacent to the corresponding independent key in a data and key storage device. The method additionally includes segmenting the master key, thereby creating multiple master key segments and storing the multiple master key segments in disparate locations separate from the data. | 2020-06-11 |
20200184087 | USING DOMAINS FOR FLEXIBLE DATA ACCESS IN HETEROGENEOUS SYSTEM LANDSCAPES - Metadata describing access control capabilities of a database technology resource is received from an access control system. Access restrictions for accessing data of the database resource by users of an application that have a role are received from an application developer. A role maintenance user interface is generated, using the metadata, for assigning the role to users of the application. Attribute values for creating an instance of the role for a user are received, using the role maintenance user interface. The instance of the role is created for the user based on the received attribute values and the access restrictions. A request from the application for the user to access the database resource is received by the access control system when the user is logged into the application. The access restrictions are applied by the access control system in the database resource when the database resource is accessed. | 2020-06-11 |
20200184088 | COMPUTER-IMPLEMENTED METHOD AND COMPUTER PROGRAM PRODUCT FOR THE ACCESS CONTROL OF A TERMINAL - The invention relates to a computer-implemented method and to a computer program product for the access control of a terminal, private data and other data being stored on the terminal and access to the private data being able to be limited or unlimited, comprising the following steps in the case of unlimited access: capturing an image signal by means of a camera of the terminal; performing a face detection process by means of the captured image signal; and continuously monitoring the number of faces in the captured image signal, which number of faces is determined in the face detection process, the access being limited if the number of faces is greater than one. | 2020-06-11 |
20200184089 | MANAGING A SECURITY POLICY FOR A DEVICE - A method for establishing and maintaining a security policy for a device can include establishing a secure channel between a secure execution environment (SEE) operating on the device and a security entity external to the device. The method can also include configuring, by a security manager executing on the SEE, access to sensitive operations of an environment interactor coupled to the device based on a security policy provided from the security entity. The method can further include resetting, by the security manager, a secure watchdog timer in response to a reset authorization token provided from the secure entity. If the secure watchdog timer expires a given predetermined number of times since a last reset authorization token is received, the security manager executes a given prescriptive operation dictated by the security policy. | 2020-06-11 |
20200184090 | Document-Level Attribute-Based Access Control - Methods and systems for a document-level attribute-based access control service are provided. The document-level attribute-based access control service may be positioned between a directory service and a search engine service. The directory service can manage information and permissions for users. The document-level attribute-based access control service can map security attributes to the user based on the information and permissions. Based on the mapping, it can be determined whether to permit the user making a query to the search engine service to access documents based on the query. Information and permissions attributes can be injected into queries dynamically via a template. Attributes may be combined with role query templates to create document-level attribute-based access control on top of role-based access control. The present technology can enable enforcement of security policies requiring all of a combination of attributes to be satisfied before permitting certain access. | 2020-06-11 |
20200184091 | METHOD FOR GRANTING FORM OPERATION AUTHORITY RESPECTIVELY ACCORDING TO FORM FIELD VALUES - The present invention discloses a method for respectively authorizing operation permissions of a form according to form-field values, which includes a step of authorizing operation permissions of form data and a step of selecting a grantee. The step of authorizing operation permissions of form data includes the following steps: S1: selecting a form to be authorized; S2: selecting a field in which the operation permission is to be authorized in the form; and S3: authorizing the operation permissions according to form data respectively corresponding to all field values of the selected field. The present invention can achieve authorizing to delete, modify and print a form respectively based on form-field values, and thus achieves a wider application range. In the present invention, the form data, the field values of the selected field of which are empty, is effectively and uniformly authorized, thereby achieving the convenience in authorization operation and reduced authorization workload. In the present invention, the operation permission is authorized to the entire form of all field values of the selected field, so that authorization operation is simple and efficient. The method is particularly suitable for the case that a company executive with all permissions is authorized. | 2020-06-11 |
20200184092 | ON-LINE TRANSMISSION AND CONTROL OF GEOGRAPHIC DECLARATION DATA - A method is presented to geographically control the distribution of protected data and ensure that it is not transmitted along any path which would encompass prohibited areas. A user wanting to so protect data can input geographic restrictions which are translated into geodeclaration metadata representing one or more geographic areas in which the data is either permitted or prohibited. The metadata may be in the form of an XML statement, and is sealed with the data using a digital certificate. When the data is received at a network router or at a destination device, the router/device can check its own current location (e.g., via GPS) and determine whether its location is within permissible boundaries. If not, the data is not transmitted or stored, and an error message is returned. If the router/device determines that it is within permissible boundaries, it proceeds to transmit or store the data. | 2020-06-11 |
20200184093 | TRANSACTION SCHEDULING METHOD AND APPARATUS - Implementations of this specification provide a method and apparatus for transaction scheduling in a blockchain. An example method performed by a node in the blockchain includes receiving a first privacy transaction, and determining a data volume of the first privacy transaction; determining a first summation value by adding the data volume of the first privacy transaction to a data volume of all privacy transactions in a buffer queue, and adding the first privacy transaction to the buffer queue; receiving a second privacy transaction, and determining a data volume of the second privacy transaction; determining a second summation value by adding the data volume of the second privacy transaction to a data volume of all privacy transactions in the buffer queue, and packaging all privacy transactions in the buffer queue and transferring the packaged privacy transactions into a trusted environment; and adding the second privacy transaction to the buffer queue. | 2020-06-11 |
20200184094 | EFFICIENT USER AUTHENTICATION AND CORRELATION OF USER-RELATED RECORDS IN AN INFORMATION TECHNOLOGY SYSTEM - A computing system includes persistent storage containing data structures storing a plurality of records of contacts and an interaction management application configured to perform operations. The operations include receiving, from a contact and before starting an interaction related to a technical problem, a plurality of data identifying the contact. An interaction entry that includes input fields to identify the contact and the technical problem and represents the interaction is generated. A record of the contact is retrieved from the data structures based on the plurality of data and an identity of the contact is authenticated based on the plurality of data matching the record. Based on authenticating the identity of the contact, the input fields of the interaction entry are populated with corresponding information from the retrieved record, an indication is provided on the interaction entry that the identity of the contact has been authenticated, and the interaction is started. | 2020-06-11 |
20200184095 | SYSTEMS AND METHODS FOR SECURING AND DISSEMINATING TIME SENSITIVE INFORMATION USING A BLOCKCHAIN - An information computer system is provided for securely releasing time-sensitive information to recipients via a blockchain. A submitter submits a document to the system and a blockchain transaction is generated and submitted to the blockchain based on the document (e.g., the document is included as part of the blockchain transaction). An editor may edit the document and an approver may approve the document for release to the recipients. Each modification and/or approval of the document is recorded as a separate transaction on the blockchain where each of the submitter, editor, approver, and recipients interact with the blockchain with corresponding unique digital identifiers—such as private keys. | 2020-06-11 |
20200184096 | SELECTIVE AND TOTAL QUERY REDACTION - Techniques are provided for selectively or completely redacting the text of database commands submitted to a database system. The database server receives the clear text version of the commands, parses the commands, and generates an execution plan, as normal. However, prior to providing the text of the commands to any location that is externally visible, the database server determines whether the command qualifies as “sensitive”. If the command qualifies as sensitive, then a redacted version of the command is generated. In the case of selective redaction, portions of the redacted version remain in clear text, while selected portions are replaced with encrypted text. In the case of total redaction, the entire command is replaced with encrypted text. | 2020-06-11 |
20200184097 | DATA SECURITY IN A PEER-TO-PEER NETWORK - A data protection implementation solution includes utilizing a peer-to-peer network and incorporating an auditing method to record and/or track transactions related to a customer's data. A private peer-to-peer network such as inter planetary file system (IPFS) is used to achieve secured and fast data accessibility while also managing data modifications. An auditing method such as blockchain is used to record activity related to data within the IPFS network. The IPFS network may include a plurality of nodes, among which data is distributed. Devices are registered with the network, and public keys, private keys, and node identifiers are used to authenticate users and secure the data. By incorporating blockchain with the IPFS network, file commit transactions are validated and a clear ledger regarding time of modification and count of file edits is provided. | 2020-06-11 |
20200184098 | Systems and Methods for Secure Obfuscation of Sensitive Information in Images - Provided herein are exemplary methods for image obfuscation with a computing device, including partitioning an image into pixel clusters, encrypting the pixel clusters, and using a blur technique to blend pixilation. Exemplary methods herein may also include the partitioning being based upon colors in the image, using a vector quantization function that groups pixels based on red, green, or blue color values according to a nearest mean, and/or generating output in a form of Voroni cells, with each Voroni cell representing a cluster of pixels with similar colors. Exemplary systems for image obfuscation may include a processor, and a memory for storing executable instructions, the processor executing the instructions to partition an image into pixel clusters, encrypt the pixel clusters and use a blur technique to blend pixilation. | 2020-06-11 |
20200184099 | ACCESS SYSTEM, ACCESS DEVICE AND ACCESS METHOD FOR ACCESSING HEALTH INFORMATION - An access system, an access device and an access method for accessing health information are disclosed. The access system includes a decentralized database for recording an authorization file corresponding to health information and a public key corresponding to the authorization file, a centralized database for using the public key corresponding to the authorization file to encrypt and store the health information corresponding to the authorization file into an access space, and an access device for issuing an access request of health information to the decentralized database based on user identification, for the decentralized database to identify and authorize the user identification based on the authorization file corresponding to the health information and ratify the access request and provide an instruction after identifying and authorizing the user identification, and for acquiring the encrypted health information from the access space based on the instruction. | 2020-06-11 |
20200184100 | Systems And Methods For Record Linkage - A record linking platform having a computer system with a processor, multiple databases each having records, such as private health information. Each of the multiple databases are not in direct communication with one another. A control center is in communication with the different entities, the control center configured to: generate a site configuration file, a key configuration file, and a broker configuration file. A keymaster configured to: receive the key configuration file, generate a hash key, and transmit the hash key to the databases. The databases configured to: receive the site configuration file and the hash key; process the records to generate evaluation records data that conform to a data model specified in the site configuration file; and encrypt the evaluation records using the hash key. An honest broker configured to: receive the broker configuration file and the encrypted evaluation records; and link the encrypted evaluation records without decrypting. | 2020-06-11 |
20200184101 | METHOD AND APPARATUS FOR PROTECTING CONFIDENTIAL INFORMATION IN ELECTRIC VEHICLE POWER TRANSFER SYSTEM - A method for protecting confidential information in an EV power transfer system includes determining whether there is an abnormality in a storage device in which confidential information for transferring electric power from a charging station to the EV is stored. The method further includes transmitting a message warning a risk of leakage of the confidential information when it is determined that there is the abnormality in the storage device. An apparatus for protecting confidential information in an EV power transfer system includes a processor and a memory storing instructions that cause the processor to perform the method. | 2020-06-11 |
20200184102 | DATA PROTECTION WITHIN AN UNSECURED STORAGE ENVIRONMENT - A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak. | 2020-06-11 |
20200184103 | METHODS AND APPARATUS FOR USING VIDEO ANALYTICS TO DETECT REGIONS FOR PRIVACY PROTECTION WITHIN IMAGES FROM MOVING CAMERAS - In some embodiments, an apparatus includes a memory and a processor. The processor is configured to receive a set of images associated with a video recorded by a moving or a non-moving camera. The processor is configured to detect a structure of a region of interest from a set of regions of interest in an image from the set of images. The processor is configured to classify the structure into a geometric class from a set of predefined geometric classes using machine learning techniques. The processor is configured to alter the region of interest to generate an altered image when the geometric class is associated with an identity of a person, such that privacy associated with the identity of the person is protected. The processor is configured to send the altered image to a user interface or store the altered image in a standardized format. | 2020-06-11 |
20200184104 | DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS - In particular embodiments, in response a data subject submitting a request to delete their personal data from an organization's systems, the system may: (1) automatically determine where the data subject's personal data is stored; and (2) in response to determining the location of the data (which may be on multiple computing systems), automatically facilitate the deletion of the data subject's personal data from the various systems (e.g., by automatically assigning a plurality of tasks to delete data across multiple business systems to effectively delete the data subject's personal data from the systems). | 2020-06-11 |
20200184105 | PRIVACY-AWARE CONTENT RECOMMENDATIONS - The present disclosure provides methods, computer-readable media, and devices for making content recommendations in a manner that protects private user data. In one example, a method includes collecting content consumption history data for a specific user of a telecommunications network, inserting random noise into the content consumption history data to produce anonymized data, sending the anonymized data over a network to a centralized device, receiving correlation data from the centralized device, wherein the correlation data indicates correlations among a plurality of items of content that is available for consumption via the telecommunications network, and predicting a likelihood that the specific user would be interested in a particular item of the plurality of items of content, wherein the predicting is based on the content consumption history data and on the correlation data. The steps may be carried out by a processor of a user endpoint device. | 2020-06-11 |
20200184106 | Differential Privacy Processing of IoT Streaming Data Using Generative Adversarial Networks - Streaming data is received that is derived from at least one sensor (e.g., IoT sensors, etc.). At least one differential privacy algorithm is subsequently used to anonymize the received streaming data. The modified streaming data can then be provided (e.g., made available, stored, transmitted over a network, etc.) to at least one consuming computing device. Related apparatus, systems, techniques and articles are also described. | 2020-06-11 |
20200184107 | MEMORY DATA SECURITY - Methods, systems, and apparatuses related to secure memory access are described. Content with in a memory device (e.g., a DRAM) may be secured in a customizable manner. Data can be secured and the memory device performance by be dynamically defined. In some examples, setting a data security level for a group of memory cells of a memory device may be based, at least in part, on a security mode bit pattern (e.g., a flag, flags, or indicator) in metadata read from or written to the memory device. Some examples include comparing a first signature (e.g., a digital signature) in metadata to a second value (e.g., an expected digital signature) to validate the first value in the metadata. The first value and the second value can be based, at least in part, on the data security level. Some examples include performing a data transfer operation in response to validation of the first and/or second values. | 2020-06-11 |
20200184108 | CONTAINER UPDATE SYSTEM - A computer implemented method comprising operating a software container, the software container including a blockchain subsystem and a blockchain ledger, generating a blockchain entry by executing a hashing function on a current state of the software container and a last entry in the blockchain ledger, updating the blockchain ledger with the generated blockchain entry, and transmitting the generated blockchain entry to one or more connected software containers. | 2020-06-11 |
20200184109 | CERTIFIED INFORMATION VERIFICATION SERVICES - Provided are embodiments for a method, system, and computer program product for operating a certified information verification service. Some embodiments include receiving an article including one or more claims, and extracting the one or more claims from the article. The one or more claims are analyzed by the one or more information verification services, and a report for the article is generated based on the analysis. | 2020-06-11 |
20200184110 | SYSTEM AND METHOD FOR MANAGING REQUESTS IN AN ASYNCHRONOUS PIPELINE - An asynchronous pipeline circuit includes: a first processing stage including a first data latch configured to generate a request signal; a second processing stage downstream the first processing stage and including a second data latch; and a programmable delay line coupled between the first data latch and the second processing stage. The programmable delay line is configured to receive the request signal from the first data latch and to generate a delayed request signal by randomly delaying the request signal on each data transfer from the first data latch to the second data latch. | 2020-06-11 |
20200184111 | CRYPTOGRAPHIC ASIC WITH ONBOARD PERMANENT CONTEXT STORAGE AND EXCHANGE - A cryptographic application-specific integrated circuit (ASIC) and method for autonomously storing context data into a one-time programmable memory in isolation are presented. The stored data describes product environmental history following manufacture, which may assist in assessing of a request for a refund or replacement of a defective product, such as an ASIC. The data may be cryptographically protected for retrieval and validation only by a manufacturer or authorized vendor. In another embodiment, communications between individual integrated circuits in a product may be secured by storing encryption keys as the context data, and exchanging the context data. The context data may be stored during manufacture, or thereafter. Such integrated circuits may be secured against replay attacks that capitalize on loss of context data that occurs when volatile memory is reset through power cycling, and enable inter-chip communications to be managed as are communications between unknown parties in an untrusted network. | 2020-06-11 |
20200184112 | Processors with Security Levels Adjustable per Applications - Methods, systems, and apparatuses related to adjustable security levels in processors are described. A processor may have functional units and a register configured to control security operations of the functional units. The register configures the functional units to operate in a first mode of security operations when the register contains a first setting; and the register configures the functional units to operate in a second mode of security operations when the register contains a second setting (e.g., to skip/bypassing a set of security operation circuit for enhanced execution speed). | 2020-06-11 |
20200184113 | SIDE CHANNEL ATTACK PROTECTION - A system for securing a secret word during a read of the secret word from a read-only memory (ROM) is disclosed. The system includes a memory controller coupled to the ROM and a random number generator coupled to the memory controller. The random number generator is configured to generate a random number. The system further includes a number shuffler coupled to the random number generator and the memory controller. The number shuffler is configured to generate a bit read order based on the random number and the memory controller is configured to read bits of the secret word from the ROM according to the bit read order. | 2020-06-11 |
20200184114 | ERASING A CRYPTOGRAPHIC ITEM IN A MEMORY OF A DEVICE IN RESPONSE TO A CHANGE OF AN OPERATING MODE OF THE DEVICE - An indication of a change to an operating mode of a device may be received. A cryptographic item stored at a memory of the device may be identified. In response to receiving the indication of the change to the operating mode of the device, the cryptographic item stored at the memory may be modified. The device may operate in the changed operating mode based on the modified cryptographic item. | 2020-06-11 |
20200184115 | Method and Apparatus for Operating a Computer - A computer system comprising a processor in communication with a memory structure; | 2020-06-11 |
20200184116 | COMPUTER LOCK SYSTEM - A computer lock system comprising a computer body and a wireless receiver connected thereto is provided. The wireless receiver includes: a wireless signal receiving unit that receives a wireless signal that may include noise or be in a no-signal state; and a received signal outputting unit that outputs the received wireless signal to the computer body. The computer body includes: a received signal acquisition unit that acquires the signal output from the received signal outputting unit; an ID determination unit that determines, in an intermittent manner, whether an unlock ID, which is an ID for enabling usual access to a display interface of the computer body, is contained in an acquired signal from the received signal acquisition unit; an accessible status information holding unit that holds accessible status information that indicates whether or not the usual access to the display interface of the computer body is enabled, the indication being determined based on the acquired signal; an access-enabling unit that changes, when the ID determination unit determines that a valid unlock ID is contained, the accessible status information held in the accessible status information holding unit to an accessible status for enabling the usual access to the display interface of the computer body; an access-disabling unit that changes, when the ID determination unit determines that a valid unlock ID is not contained, the accessible status information held in the accessible status information holding unit to an inaccessible status for causing the display interface of the computer body to disable the usual access to a display; and a control unit that controls the display interface based on the accessible status information held in the accessible status information holding unit. | 2020-06-11 |
20200184117 | PROTECTING CONTENT ON A DISPLAY DEVICE FROM A FIELD-OF-VIEW OF A PERSON OR DEVICE - A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content. | 2020-06-11 |
20200184118 | SYSTEMS AND METHODS FOR DETECTING AND MITIGATING PROGRAMMABLE LOGIC DEVICE TAMPERING - Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation. | 2020-06-11 |
20200184119 | SYSTEMS AND METHODS FOR ASSIGNING ATTRIBUTES TO COMPUTER-AIDED DESIGN MODELS - A system includes a processor and memory storing instructions that cause the processor to identify a deficient CAD model that is missing one or more expected attributes; analyze the deficient CAD model to determine one or more geometric characteristics of the deficient CAD model useful to identify a reference CAD model to use to determine proposed attributes to apply for the missing one or more expected attributes of the deficient CAD model; select, from one or more existing CAD models, the reference CAD model, based upon geometric characteristics of the reference CAD model exceeding a threshold level of similarity to the one or more geometric characteristics of the deficient CAD; and apply the proposed attributes from the reference CAD model to the deficient CAD model as the missing one or more expected attributes of the deficient CAD model. | 2020-06-11 |
20200184120 | SYSTEMS AND METHODS FOR TRANSFERRING PRODUCT MANUFACTURING INFORMATION (PMI) BETWEEN MODELS - A system is provided. The system includes a processor for implementing a computer-aided technology (CAx) system, the CAx system including a graphical-user-interface (GUI) configured to present a first computer-aided design (CAD) model, the first CAD model including a first part. The system includes memory storing instructions configured to cause the processor to present the GUI and to display, via the GUI, a first product manufacturing information (PMI), wherein the first PMI is linked to a first feature of the first part included in the first CAD model. The instructions further cause the processor to iterate through a second CAD model to identify a second feature related to the first feature and to copy the PMI to the second feature of the second CAD model. | 2020-06-11 |
20200184121 | SYSTEMS AND METHODS FOR INCREASING READABILITY OF PRODUCT AND MANUFACTURING INFORMATION (PMI) - The present application is directed to techniques for improving the readability of product and manufacturing information (PMI) associated with models, such as computer-aided design models. In one embodiment, a system includes a processor for implementing a computer-aided technology (CAx) system. The CAx system includes a graphical-user-interface (GUI) configured to present a first view of a computer-aided design (CAD) model that includes at least one part. Additionally, the system includes memory storing instructions configured to cause the processor to generate a product and manufacturing information (PMI) associated with the CAD model, present the CAD model with the PMI via the GUI, and determine a PMI readability metric. | 2020-06-11 |
20200184122 | Methods and Systems for an Automated Design, Fulfillment, Deployment and Operation Platform for Lighting Installations - A platform for design of a lighting installation generally includes an automated search engine for retrieving and storing a plurality of lighting objects in a lighting object library and a lighting design environment providing a visual representation of a lighting space containing lighting space objects and lighting objects. The visual representation is based on properties of the lighting space objects and lighting objects obtained from the lighting object library. A plurality of aesthetic filters is configured to permit a designer in a design environment to adjust parameters of the plurality of lighting objects handled in the design environment to provide a desired collective lighting effect using the plurality of lighting objects. | 2020-06-11 |
20200184123 | Methods and Systems for an Automated Design, Fulfillment, Deployment and Operation Platform for Lighting Installations - A platform for design of a lighting installation generally includes an automated search engine for retrieving and storing a plurality of lighting objects in a lighting object library and a lighting design environment providing a visual representation of a lighting space containing lighting space objects and lighting objects. The visual representation is based on properties of the lighting space objects and lighting objects obtained from the lighting object library. A plurality of aesthetic filters is configured to permit a designer in a design environment to adjust parameters of the plurality of lighting objects handled in the design environment to provide a desired collective lighting effect using the plurality of lighting objects. | 2020-06-11 |
20200184124 | SYSTEMS AND METHODS FOR THROAT INSPECTION - A method includes generating inspection requirements for a radial section of a turbine nozzle by generating a resultant curve along the radial section and along a vane of the turbine nozzle, generating a middle inspection point along the resultant curve at a nominal throat location, generating first and second arrays of inspection points on sides of the middle inspection point along the resultant curve, generating a middle inspection vector normal to the middle inspection point, and generating first and second arrays of inspection vectors parallel to the middle inspection vector that intersect the resultant curve at the first and second arrays of inspection points, respectively. The inspection requirements include the middle inspection point, the middle inspection vector, the first and second arrays of inspection points, and the first and second arrays of inspection vectors. The method also includes generating a coordinate measuring machine (CMM) output file including the inspection requirements. | 2020-06-11 |
20200184125 | SYSTEMS AND METHODS FOR ASSIGNING PRODUCT AND MANUFACTURING INFORMATION TO COMPUTER-AIDED DESIGN MODELS - A system that renders computer-aided design (CAD) models of a part, an assembly, or both includes identifying a deficient CAD model missing expected Product and Manufacturing Information (PMI) objects, based upon features not being associated with the missing expected PMI objects. The system also includes querying a database of existing CAD models to identify existing PMI objects, including a PMI reference indicating a particular type of PMI data and PMI annotation to use for the missing expected PMI objects, of a reference CAD model. The system also includes attributing a subset of the existing PMI objects to features of the deficient CAD model, by identifying features that the subset of the existing PMI objects are associated to and identifying corresponding features in features of the deficient CAD model, and assigning the subset of the existing PMI objects to the corresponding features in the of the deficient CAD model. | 2020-06-11 |
20200184126 | DESIGN SUPPORT METHOD, DESIGN SUPPORT APPARATUS, AND A NON-TRANSITORY RECORDING MEDIUM STORING A DESIGN SUPPORT PROGRAM - A design support method includes: acquiring reference diagrams which are control logic diagrams created in the past, and an editing object diagram; and applying each of analysis rules to each control logic diagram, and analyzing the control logic part included in each control logic diagram. The analysis rules satisfy a relation in which a control logic part corresponding to an analysis rule at a higher hierarchy level contains a control logic part corresponding to an analysis rule at a lower hierarchy level. The design support method further includes: specifying, as a similar diagram, a reference diagram including a control logic part common with the control logic part included in the editing object diagram, among the reference diagrams, based on an analysis result; and presenting a control logic part having a hierarchical relation with the common control logic part, among control logic parts included in the similar diagram. | 2020-06-11 |
20200184127 | Laser Finishing Design Tool with 3-D Garment Preview - A tool allows a user to create new designs for apparel and preview these designs in three dimensions before manufacture. Software and lasers are used in finishing apparel to produce a desired wear pattern or other design. Based on a laser input file with a pattern, a laser will burn the pattern onto apparel. With the tool, the user will be able to create, make changes, and view images of a design, in real time, before burning by a laser. Input to the tool includes fabric template images, laser input files, and damage input. The tool allows adding of tinting and adjusting of intensity and bright point. The user can also move, rotate, scale, and warp the image input. | 2020-06-11 |
20200184128 | LOCATION SELECTION FOR TREATMENT SAMPLING - In an embodiment, a computer-implemented method of selecting locations in a field for treatment sampling is disclosed. The method comprises receiving, by a processor, input data including a number T of treatments applied to a field, a number L of treatment locations for each treatment, a list of treatment polygons within the field, and a map for the field indicating one or more values of a set of design parameters corresponding to environment factors for each of a plurality of locations in the field. The method also comprises computing, by the processor, an environment class index for each of a group of locations in the list of treatment polygons based on the map; distributing the list of treatment polygons to the T treatments based on the computed indices; and selecting, for each of the T of treatments, L treatment locations from the group of locations in the treatment polygons distributed to the treatment. In addition, the method comprises causing display of information regarding the selected treatment locations. | 2020-06-11 |
20200184129 | CONFIGURABLE REPRESENTATION OF DOMAIN MODELS - A configurable application includes a domain model having one or more model entities. Representation entities provide representations of model entities and can include input definitions, output definitions, and structure definitions. Input definitions can define a grid having cells that can be bound, based on states, to various model entity attributes. | 2020-06-11 |
20200184130 | Systems, Methods, and Apparatus for Simulation of Complex Subsurface Fracture Geometries Using Unstructured Grids - Systems and methods for simulating subterranean regions having multi-scale fracture geometries. Non-intrusive embedded discrete fracture modeling formulations are applied to two-dimensional and three-dimensional unstructured grids, with mixed elements, using an element-based finite-volume method in conjunction with commercial simulators to model subsurface characteristics in regions having complex hydraulic fractures, complex natural fractures, or a combination of both. | 2020-06-11 |
20200184131 | A METHOD FOR PREDICTION OF KEY PERFORMANCE PARAMETER OF AN AERO-ENGINE TRANSITION STATE ACCELERATION PROCESS BASED ON SPACE RECONSTRUCTION - A method for prediction of key performance parameters of an aero-engine transition state acceleration process based on space reconstruction. Aero-engine transition state acceleration process test data provided by a research institute is used for establishing a training dataset and a testing dataset; dimension increase is conducted on the datasets based on the data space reconstruction of an auto-encoder; model parameters optimization is conducted by population optimization algorithms which is represented by particle swarm algorithm; and random forest regression algorithm performing well on high-dimensional data is used for carrying out regression on transition state performance parameters, which realizes effective real-time prediction from the perspective of engineering application. | 2020-06-11 |
20200184132 | APPARATUS AND METHOD FOR PREDICTING DEFORMATION TEMPERATURE OF COAL USING PREDICTIVE MODEL - An apparatus and method predict an initial deformation temperature of coal without an additional test by using a predictive model. The apparatus includes a parameter extractor configured to analyze characteristics of test coal and to extract parameters of the test coal based on the test coal characteristic analysis; a temperature analyzer configured to analyze an initial deformation temperature (IDT) of the test coal; a modeler configured to derive an IDT predictive model for predicting the test coal IDT using the extracted parameters of the test coal and the test coal IDT; and a predictor configured to predict an initial deformation temperature (IDT) of target coal to be supplied to the coal-fired power plant by substituting parameters of the target coal into the IDT predictive model. The test coal characteristics are analyzed by ash component analysis, elementary analysis, industrial analysis, or calorific value analysis. | 2020-06-11 |
20200184133 | SYSTEMS AND METHODS FOR VALIDATING PRODUCT AND MANUFACTURING INFORMATION (PMI) FOR MODELS - A system includes a processor for implementing a computer-aided technology (CAx) system. The CAx system includes a graphical-user-interface (GUI) configured to present a computer-aided design (CAD) model that includes at least one part. The system also includes memory storing instructions configured to cause the processor to receive the CAD model and product and manufacturing information (PMI) associated with the CAD model, validate the PMI, and present the CAD model with validated PMI via the GUI. | 2020-06-11 |
20200184134 | METHOD FOR GENERATING PREDICTIVE CHANCE MAPS OF PETROLEUM SYSTEM ELEMENTS - A non-transitory computer readable medium includes a set of instructions that in operation cause a processor to determine at least one modelled parameter of a feature of interest in petroleum exploration. The instructions also cause a processor to assign a likelihood value to each modelled parameter of the at least one modelled parameter and to generate an initial chance map for each modelled parameter of the at least one modelled parameter. Further, the instructions cause a processor to assign a weighting factor for each modelled parameter of the at least one modelled parameter, and to combine the initial chance maps using the weighting factor for each modelled parameter of the at least one modelled parameter to generate a first simulation chance map. | 2020-06-11 |
20200184135 | DOUBLE GLITCH CAPTURE MODE POWER INTEGRITY ANALYSIS - Data is received that characterizes an integrated circuit and which includes a plurality of Standard Test Interface Language (STIL) codes and at least one file defining physical and/or logical parameters of the integrated circuit. Thereafter, using the received data, a power integrity analysis of the integrated circuit is performed to estimate power induced noise in a double glitch capture mode. Data is then provided that characterizes the performed double glitch capture mode power integrity analysis of the integrated circuit. Related apparatus, systems, techniques and articles are also described. | 2020-06-11 |
20200184136 | PLACEMENT AND ROUTING OF CELLS USING CELL-LEVEL LAYOUT-DEPENDENT STRESS EFFECTS - Disclosed is technology for placing cells in a circuit design layout to thereby improve the operation of place-and route equipment used for fabrication of an integrated circuit. The target cells are chosen from a cell library which includes descriptions for a plurality of cells, and information about dependency of each cell on hypothetical boundary conditions that can be imposed on the cell by any stress source originating in the vicinity of said cell in the layout. In order to select a cell for a target location in the layout, boundary conditions imposed on the target position by each of the cells neighboring the target position are determined. The system then selects an appropriate target cell in dependence upon the determined boundary conditions and the performance of the cell based on the boundary conditions imposed on the cell by the neighboring cells from the cell library. | 2020-06-11 |
20200184137 | LAYOUT DESIGN SYSTEM AND LAYOUT DESIGN METHOD - To perform layout design for a small area satisfying a design rule, within a short period of time. A layout design system which includes a processing portion and in which a circuit diagram and layout design information are input to the processing portion, the processing portion has a function of generating layout data from the circuit diagram and the layout design information by performing Q learning, the processing portion has a function of outputting the layout data, the processing portion includes a first neural network, and the first neural network estimates an action value function in the Q learning. | 2020-06-11 |
20200184138 | SYSTEM FOR GENERATING STANDARD CELL LAYOUT HAVING ENGINEERING CHANGE ORDER (ECO) CELLS - A system (including a processor and memory with computer program code) configured to execute a method which includes generating a layout diagram including: generating first and second active area patterns on opposite sides of (and having long axes parallel to) a first symmetry axis; generating non-overlapping first, second and third conductive patterns (having long axes perpendicular to the first symmetry axis) which overlap the first and second active area patterns; centering the first conductive pattern between the second and third conductive patterns; generating a first cut-pattern for, and which overlaps, central regions of the second and third conductive patterns; centering the first cut-pattern relative to the first symmetry axis; generating a fourth conductive pattern over an area bounded by the first cut-pattern; and expanding the fourth conductive pattern to substantially overlap a portion of the first conductive pattern and a portion of the second or third conductive patterns. | 2020-06-11 |
20200184139 | SYSTEM FOR AND METHOD OF MANUFACTURING AN INTEGRATED CIRCUIT - A method of manufacturing an integrated circuit includes generating a first layout design based on design criteria, performing a color mapping between the first layout design and a standard cell layout design thereby generating a via color layout design, and manufacturing the integrated circuit based on the via color layout design. The first layout design has a first set of vias divided into sub-sets of vias based on a corresponding color indicating that vias of the sub-set of vias with a same color, and vias of the sub-set of vias with a different color. The standard cell layout design has a second set of vias arranged in standard cells. The via color layout design has a third set of vias including a portion of the second set of vias and corresponding locations, and color of the corresponding sub-set of vias. | 2020-06-11 |
20200184140 | SYSTEM AND METHOD FOR PROVISIONING A MOBILE SOFTWARE APPLICATION TO A MOBILE DEVICE - A provisioning system of a first party provisions a mobile software application to one or more remotely-located mobile computing devices, each mobile computing device running a same device-native mobile operating system (OS). The mobile software application comprises an application bundle comprising computer program code and computer code libraries that together comprise at least one component used to: adapt an abstraction layer to the same device-native mobile OS, receive data from said device-native OS, generate modification data objects, process modification data objects, generate a change list of modification data objects, translate modification data objects into a list of instructions for execution, and send a list of instructions to said same device-native operating system for execution. | 2020-06-11 |
20200184141 | SYSTEM AND METHOD FOR PROVISIONING A MOBILE SOFTWARE APPLICATION TO A MOBILE DEVICE - A computer program product comprising a non-transitory computer-readable storage medium having computer-readable instructions stored thereon comprising a mobile software application provisioned to one or more remotely-located mobile computing devices, each mobile computing device running a same device-native mobile operating system (OS). The computer program product comprises an application bundle comprising computer program code and computer code libraries that together comprise at least one component used to: adapt an abstraction layer to the same device-native mobile OS, receive data from said device-native OS, generate modification data objects, process modification data objects, generate a change list of modification data objects, translate modification data objects into a list of instructions for execution, and send a list of instructions to said same device-native operating system for execution. | 2020-06-11 |
20200184142 | METHOD AND SYSTEM FOR IDENTIFYING AND DELIVERING ENRICHED CONTENT - Method, system, and programs for identifying and delivering content. In one example, a request for content is first received from a user, via the communication platform. One or more parameters are obtained which are associated with the platform on which the requested content is to be presented. When the requested page is retrieved, it is determined whether the page was created with respect to a second platform that is more restrictive than the first platform. If so, additional content is generated, the selection of which is based on the parameters associated with the platform on which the requested content is to be presented as well as the content of the requested content page. The additional content is integrated with the requested content page and then transmitted to the user as a response to the request. | 2020-06-11 |
20200184143 | RULES/MODEL-BASED DATA PROCESSING SYSTEM FOR INTELLIGENT EVENT PREDICTION IN AN ELECTRONIC DATA INTERCHANGE SYSTEM - An electronic data interchange (EDI) management system may comprise a memory for storing EDI document data and a machine learning prediction model representing element information of EDI documents of a first type and a corresponding status. A processor can be configured to extract elements from an EDI document, create a document record for the EDI document, the document record comprising elements extracted from the EDI document; determine a first delivery status for the EDI document of the first type by processing the extracted elements using a machine learning delivery model, the machine learning delivery model trained on a training set of elements to classify documents according to a plurality of delivery statuses, and add the first status to the document record for the EDI document of the first type, the first status accessible to a client computer via a presentation layer. | 2020-06-11 |
20200184144 | INTEGRATED ADMISSION DATA MANAGEMENT SYSTEM USING BIG DATA ANALYSIS - Provided is an integrated admission data management system using big data analysis, which constructs not only quantitative factors, expressible and measurable in numerical values, but also qualitative factors, not expressible or measurable in numerical values, as big data. Respective applicants are provided with customized information regarding a college or university to which the applicant is applying, on the basis of both quantitative factors and qualitative factors. A student of a college or university, to which an applicant is applying, is matched with the applicant, so that a personal statement written by the applicant is edited in a customized manner. | 2020-06-11 |
20200184145 | INDICATING SENTIMENT OF TEXT WITHIN A GRAPHICAL USER INTERFACE - A method of enabling distributed collaboration with sentiment indicators is disclosed. The method comprises obtaining a set of computer-executable instructions, which when executed cause a client device of one or more client devices to operate a graphical user interface (GUI). The GUI is configured for: receiving text via a first area of a screen of the GUI; estimating a sentiment of the text; determining that the estimated sentiment exceeds a certain level of negativity; and after the determining, requesting a confirmation of releasing the text or an update of the text. The method further comprises receiving a response to the request and sending the text to a server; and transmitting the set of computer-executable instructions to a first client device of the one or more client devices. | 2020-06-11 |
20200184146 | TECHNIQUES FOR COMBINING HUMAN AND MACHINE LEARNING IN NATURAL LANGUAGE PROCESSING - Methods, apparatuses and computer readable medium are presented for generating a natural language model. A method for generating a natural language model comprises: receiving more than one annotation of a document; calculating a level of agreement among the received annotations; determining that a criterion among a first criterion, a second criterion, and a third criterion is satisfied based at least in part on the level of agreement; determining an aggregated annotation representing an aggregation of information in the received annotations and training a natural language model using the aggregated annotation, when the first criterion is satisfied; generating at least one human readable prompt configured to receive additional annotations of the document, when the second criterion is satisfied; and discarding the received annotations from use in training the natural language model, when the third criterion is satisfied. | 2020-06-11 |
20200184147 | METHOD AND APPARATUS FOR DISPLAYING FUNCTION PARAMETER IN SPREADSHEET, AND ELECTRONIC DEVICE - Embodiments of a method and an apparatus for providing a prompt of a function parameter in a spreadsheet and of an electronic device are provided. The method includes: obtaining a first function parameter of a function in the spreadsheet; determining whether the first function parameter is associated with a dynamic constraint rule, wherein the dynamic constraint rule is that there is a dynamic constraint that associates the first function parameter with another function parameters in a function to which the first function parameter belongs; if the first function parameter is associated with a dynamic constraint rule, calculating a value range of the first function parameter based on the dynamic constraint rule; and presenting a prompt for the first function parameter based on the value range. By applying the embodiments provided in the present application, a user can input correct content for a parameter quickly and accurately. An inappropriate input for a parameter and thus erroneous calculation of the related formula are avoided. | 2020-06-11 |
20200184148 | METHOD AND APPARATUS FOR DETECTING ANOMALIES IN MISSION CRITICAL ENVIRONMENTS - A system and method for detecting anomalies in mission-critical environments. The method includes: parsing at least one received data set into a text structure; isolating a protocol language of the at least one received data set, wherein the protocol language is a standardized pattern for communication over at least one protocol; generating at least one document from the contents of the received at least one data set, wherein the at least one document includes at least one parsed text structure referencing a unique identifier, and wherein the at least one parsed text structure is organized within the at least one document according to a natural language scheme; detecting insights in the generated documents; extracting rules from the detected insights; and detecting anomalies by applying the extracted rules. | 2020-06-11 |
20200184149 | SYSTEMS AND METHODS FOR A VISUAL INTERFACE FOR GRID-BASED PROGRAMS - The current disclosure provides techniques for visualizing text expressions in spreadsheet cells in a more intuitive and user friendly manner by mapping syntactic elements of the text expressions to two-dimensional (2D) configurations of 2D elements, and displaying the 2D configurations in a graphical user interface, wherein the syntactic relationships between syntactic elements in the text expressions are rendered as spatial relationships between the 2D elements in the 2D configuration. In one embodiment, a method for converting a text expression into a 2D configuration comprises selecting a spreadsheet cell based on input received from a user input device, wherein the spreadsheet cell comprises a text expression, parsing the text expression, using a logic subsystem, into at least a first syntactic element, mapping the first syntactic element, using the logic subsystem, to a first two-dimensional (2D) element, and displaying the first 2D element in a graphical user interface via a display subsystem. | 2020-06-11 |
20200184150 | MACHINE LEARNING FROM TONE ANALYSIS IN ONLINE CUSTOMER SERVICE - One embodiment provides a method that includes receiving adjusted labeled data based on emotional tone factors. Words are analyzed using a tone latent Dirichlet allocation (T-LDA) model that models tone intensity using the emotional tone factors and integrating the adjusted labeled data. Representative words are provided for each emotional tone factor based on using the T-LDA model. The representative words are obtained using the T-LDA model based on determining posterior probabilities and adjusting the posterior probabilities based on an auxiliary topic. | 2020-06-11 |
20200184151 | SYSTEMS AND METHODS FOR IDENTIFYING AN EVENT IN DATA - The present disclosure includes systems, apparatuses, and methods for event identification. In some aspects, a method includes receiving data including text and performing natural language processing on the received data to generate processed data that indicates one or more sentences. The method also includes generating, based on a first keyword set, a second keyword set having more keywords than the first keyword set. The method further includes, for each of the first and second keyword sets: detecting one or more keywords and one or more entities included in the processed data, determining one or more matched pairs based on the detected keywords and entities, and extracting a sentence, such as a single sentence or multiple sentences, from a document based on the one or more sentences indicated by the processed data. The method may also include outputting at least one extracted sentence. | 2020-06-11 |
20200184152 | Automatic Semantic Rating and Abstraction of Literature - Deep semantic analysis is performed on an electronic literary work in order to detect plot elements and optional other storyline elements such as characters within the work. Multiple levels of abstract are generated into a model representing the literary work, wherein each element in each abstraction level may be independently rated for preference by a user. Through comparison of multiple abstraction models and one or more user rating preferences, one or more alternative literary works may be automatically recommended to the user. | 2020-06-11 |
20200184153 | Controlled Agricultural Systems and Methods of Managing Agricultural Systems - The present disclosure relates to different techniques of controlling an agricultural system, as for example a controlled agricultural system, an agricultural light fixture and a method for agricultural management. | 2020-06-11 |
20200184154 | COGNITIVE COPY AND PASTE - A system, method and computer program product for cognitive copy and paste. The method includes: receiving, at a hardware processor of a computer system, an input representing a selection of a content captured from a source application program, and receiving an input representing an identified target application program that will receive the selected content to be copied and rendered in the target application program. The selected content is analyzed to determine a context for the selected content; and a rendering of the selected content at a location within the destination application based on the determined context, the rendering achieving a best representation of the selected content on the destination application. The analyzing includes invoking a natural language processor to determine an intent, meaning, or an intended use of the selected content based on the determined context, and employs a support vector machine for determining a best format change when rendering. | 2020-06-11 |
20200184155 | GENERATING DESIRED DISCOURSE STRUCTURE FROM AN ARBITRARY TEXT - Systems, devices, and methods of the present disclosure use discourse analysis and other techniques to form questions and answers from text. The questions and answers can be used for different applications, including providing a virtual dialogue or generating training data for machine-learning models. For example, a dialogue application generates a discourse tree that represents text and identifies a question from a satellite elementary discourse unit of the discourse tree. The dialogue application annotates the text by inserting the generated question and labeling the satellite elementary discourse unit as an answer. | 2020-06-11 |
20200184156 | PROVIDING ACCESS TO USER-CONTROLLED RESOURCES BY AUTOMATED ASSISTANTS - Methods, apparatus, and computer readable media are described herein for allowing a first user to interface with an automated assistant to assign tasks to additional user(s), and/or for causing notification(s) of the assigned task to be rendered to the additional user(s) via corresponding automated assistant interface(s). In various implementations, one or more criteria can be utilized in selecting a group of client device(s), linked to the additional user, via which to provide the notification(s) for the task assigned to the additional user. Also, in various implementations condition(s) for providing the notification(s) for the task can be determined, and the notification(s) provided based on determining satisfaction of the condition(s). | 2020-06-11 |
20200184157 | Bidirectional Translation System - A bidirectional translation system includes a translation relay. The translation relay includes: a first communication part configured to communicate with at least one hearing aid; a second communication part configured to communicate with a communication terminal; a microphone configured to acquire speech; a speaker configured to emit sound; and a data processor configured to create first speech data containing speech acquired by the hearing aid and second speech data containing speech acquired by the microphone, send the first and second speech data to a communication terminal via the second communication part, receive, from the communication terminal, first translated speech data corresponding to the first speech data and second translated speech data corresponding to the second speech data, and emit a first translated speech contained in the first translated speech data through a speaker and apply the second translated speech data to the heating aid via the first communication part. | 2020-06-11 |
20200184158 | FACILITATING COMMUNICATIONS WITH AUTOMATED ASSISTANTS IN MULTIPLE LANGUAGES - Techniques described herein relate to facilitating end-to-end multilingual communications with automated assistants. In various implementations, speech recognition output may be generated based on voice input in a first language. A first language intent may be identified based on the speech recognition output and fulfilled in order to generate a first natural language output candidate in the first language. At least part of the speech recognition output may be translated to a second language to generate an at least partial translation, which may then be used to identify a second language intent that is fulfilled to generate a second natural language output candidate in the second language. Scores may be determined for the first and second natural language output candidates, and based on the scores, a natural language output may be selected for presentation. | 2020-06-11 |
20200184159 | SCAN CUBE CHARACTERISTICS - A barcode reader is provided. The barcode reader comprises an imaging assembly having a field of view (FOV) extending along one or more horizontal planes and a housing of the imaging assembly, the housing being a cuboid shape having six sides. The FOV of the imaging assembly passes through an opening in a first side of the housing with a width that is 1.5 inches or greater. The first side of the housing has a width that is greater than or equal to 2.5 inches and less than or equal to 3.5 inches, and has a height that is greater than or equal to 2.0 inches and less than or equal to 3.5 inches. The housing is substantially stable when at least a portion of a second side of the housing, substantially parallel to at least one of the one or more horizontal planes, is placed on a flat surface. | 2020-06-11 |
20200184160 | USING UNIQUE IDENTIFIERS TO RETRIEVE CONFIGURATION DATA FOR TAG DEVICES - Methods and systems for using unique identifiers to retrieve configuration data for tag devices are described herein. An example method may involve obtaining a unique identifier associated with a tag device. The tag device may include an antenna and a sensor configured to obtain sensor readings that can be wirelessly transmitted to a reader device via the antenna. The method may also involve determining configuration parameters associated with the tag device based on the unique identifier. The method may further involve storing, in at least one memory, at least a portion of the configuration parameters in association with the unique identifier. | 2020-06-11 |
20200184161 | HIGH BIT DENSITY MILLIMETER WAVE RFID SYSTEMS, DEVICES, AND METHODS OF USE THEREOF - A method includes transmitting, by a radiofrequency identification (RFID) reader device, a first electromagnetic radiation at a first polarization to a scan area and second electromagnetic radiation at a second polarization to the scan area. Re-radiated first electromagnetic radiation is received from an RFID tag located in the scan area at the first polarization. Re-radiated second electromagnetic radiation is received from the RFID tag at the second polarization. A radar image is generated based on the first and second re-radiated electromagnetic radiation. One or more items of information encoded in one or more microstructure elements located on the RFID tag are decoded based on the generated radar image. An RFID reader device and an RFID system are also disclosed. | 2020-06-11 |
20200184162 | TRACKING AND AUTHENTICATION OF PRODUCTS VIA DISTRIBUTED LEDGERS AND NFC TAGS - Copies of a distributed ledger with multiple blocks are stored on multiple computing devices. A first computing device coming into proximity with a particular object triggers generation of a new block to the distributed ledger, the new block identifying a characteristic of the object and including a hash of a previous block of the distributed ledger. The new block is optionally verified before it is appended onto the distributed ledger and transmitted out to each of the multiple computing devices so that each copy of the distributed ledger includes the new block. | 2020-06-11 |
20200184163 | ELECTRONIC LABEL SYSTEM - An electronic label system is provided. The electronic label system includes a line replaceable unit. The electronic label system also includes an electronic label communicatively coupled to the line replaceable unit via a hardware link. The electronic label stores information respective to the line replaceable unit. The electronic label includes a chip or a radio frequency identification tag that provides the information to a reader. | 2020-06-11 |
20200184164 | STAND THAT ENABLES A MOBILE DEVICE TO READ BARCODES IN PRESENTATION MODE - A presentation stand for enabling a mobile device to read barcodes in presentation mode includes a cradle portion that is connected to the base portion. The cradle portion is configured to hold the mobile device in a position for reading a barcode. A shield portion is attached to the cradle portion and configured to modify a field of view of a camera of the mobile device. The shield portion is also configured to modify a field of illumination of an illumination source of the mobile device. The shield portion includes a camera optic system that is at least partially aligned with the camera of the mobile device when the mobile device is held in the cradle portion. The shield portion also includes an illumination optic system that is at least partially aligned with the illumination source of the mobile device when the mobile device is held in the cradle portion. | 2020-06-11 |
20200184165 | BARCODE-READING ACCESSORY FOR INTERACTING WITH A TOUCH INTERFACE ON A MOBILE DEVICE - The present disclosure relates to a barcode-reading system that includes a mobile device accessory attached to a mobile device. The mobile device accessory includes a button assembly having an outer button and dielectric material. When an input object (e.g., a finger) comes into contact with the button assembly, the dielectric material comes into contact with a touch interface (e.g., a button or touchscreen) and causes the mobile device to detect a touch input. In particular, the dielectric material of the button assembly may activate a capacitive property of a button or touchscreen to enable the mobile device to detect the touch input. | 2020-06-11 |
20200184166 | LOCATION-BASED EMBEDDED PATTERS FOR VEHICLE DETECTION AND DATA PROCESSING - There are provided systems and methods for location-based embedded patterns for vehicle detection and data processing. A user's device, which may be connected to or associated with a vehicle may include a directional camera capable of capturing images in a direction for a directional perspective of the vehicle, such as a front, side, or back. The image captured may have an embedded pattern or code that is associated with data that may decoded or retrievable using the embedded pattern. The vehicle's device may utilize the code to determine the data and may activate a process for an application based on the data. In some embodiments, the data may also be loaded to the process or may cause the process to load or retrieve other data. The vehicle's device may utilize the process based on a location of the vehicle, as well as services provided at the location. | 2020-06-11 |
20200184167 | WORKFLOW OPTIMIZED SLIDE SCANNING - The present invention relates to imaging microscope slides. In order to further improve a workflow for slide scanning, a system ( | 2020-06-11 |
20200184168 | DYNAMIC DATA CAPTURE DEVICE CONFIGURATION - A method of dynamically configuring a data capture device includes: at a data capture controller, responsive to enabling a configuration mode, controlling a data capture assembly of the data capture device to initiate a data capture operation to capture a barcode; at the data capture controller, determining a symbology of the captured barcode based on a master set of symbology definitions; at the data capture controller, updating an active subset of the master set of symbology definitions to include the determined symbology; at the data capture controller, responsive to disabling the configuration mode, decoding subsequently captured barcodes based only on the active subset of symbology definitions. | 2020-06-11 |
20200184169 | Full Spectrum Color Holographic Quick Response Code - Information is recorded in quick response codes. A hologram is made from quick response codes and provides three dimensions of information in a two-dimensional hologram. The holograms are used for recording large amounts of information in two dimensions. Multiple quick response codes containing copious information are created using different light wave frequencies in different quick response encoders. The multiple quick response codes are combined in a two-dimensional hologram that is used on labeling. The hologram is read by a hologram reader. Each quick response frequency layer is separated from the hologram. The quick response code is extracted from each layer. A quick response reader provides the information that has been recorded. | 2020-06-11 |