26th week of 2020 patent applcation highlights part 55 |
Patent application number | Title | Published |
20200201927 | Rendering Visualizations Using Parallel Data Retrieval | 2020-06-25 |
20200201928 | Managing Data For Rendering Visualizations | 2020-06-25 |
20200201929 | Managing Multi-Dimensional Array Of Data Definitions | 2020-06-25 |
20200201930 | PRELOADED CONTENT SELECTION GRAPH VALIDATION | 2020-06-25 |
20200201931 | TILING ALGORITHM FOR A MATRIX MATH INSTRUCTION SET | 2020-06-25 |
20200201932 | APPARATUSES, METHODS, AND SYSTEMS FOR INSTRUCTIONS OF A MATRIX OPERATIONS ACCELERATOR | 2020-06-25 |
20200201933 | HEISENBERG SCALER | 2020-06-25 |
20200201934 | CONTENT DISCOVERY SYSTEMS AND METHODS | 2020-06-25 |
20200201935 | CENTRALIZED RENDERING SERVICE FOR A REMOTE NETWORK MANAGEMENT PLATFORM | 2020-06-25 |
20200201936 | SYSTEMS AND METHODS FOR DYNAMIC WEB USER INTERFACE GENERATION | 2020-06-25 |
20200201937 | SYSTEM AND METHOD FOR GENERATING UPDATABLE STRUCTURED CONTENT | 2020-06-25 |
20200201938 | SYSTEMS AND METHODS FOR DETERMINING DOCUMENT COMPATIBILITY | 2020-06-25 |
20200201939 | VISUALIZING SENTIMENT ON AN INPUT DEVICE | 2020-06-25 |
20200201940 | DEPENDENCY GRAPH BASED NATURAL LANGUAGE PROCESSING | 2020-06-25 |
20200201941 | CONTENT DISCOVERY SYSTEMS AND METHODS | 2020-06-25 |
20200201942 | Systems and Methods of Processing a Document in an Imaging Device | 2020-06-25 |
20200201943 | SENTENCE CONVERSION SYSTEM, SENTENCE CONVERSION METHOD, AND INFORMATION STORAGE MEDIUM | 2020-06-25 |
20200201944 | SYSTEMS AND METHODS FOR WRITE-ONCE-READ-MANY STORAGE | 2020-06-25 |
20200201945 | CAD Models by Creating Best-Fit Approximate 3D B-Rep Geometry | 2020-06-25 |
20200201946 | ACCURATE AND EFFICIENT MODELING METHOD FOR TERAHERTZ BRANCH WAVEGUIDE DIRECTIONAL COUPLER | 2020-06-25 |
20200201947 | Computer-Implemented Method Of Estimating A Mass Distribution Of A Physical Product | 2020-06-25 |
20200201948 | AUTOMATED SYSTEM FOR DESIGN AND FABRICATION OF ARTIFICIAL ROCKWORK STRUCTURES | 2020-06-25 |
20200201949 | INTEGRATED CIRCUIT SYNTHESIS TOOL THAT RESOLVES TIMING PROBLEMS BY AUTOMATICALLY MOVING COMPONENTS BETWEEN LOGIC BLOCKS | 2020-06-25 |
20200201950 | SCALABLE SYSTEM AND METHOD FOR FORECASTING WIND TURBINE FAILURE USING SCADA ALARM AND EVENT LOGS | 2020-06-25 |
20200201951 | Local Control of Design Patterns on Surfaces for Enhanced Physical Properties | 2020-06-25 |
20200201952 | METHOD OF PREDICTING SHAPE OF SEMICONDUCTOR DEVICE | 2020-06-25 |
20200201953 | Generalized Equivalent Circuit Model of MMC-HVDC for Power System Simulation | 2020-06-25 |
20200201954 | METHOD OF DESIGNING A LAYOUT FOR A SEMICONDUCTOR INTEGRATED CIRCUIT | 2020-06-25 |
20200201955 | DESIGN SYSTEM AND METHOD EMPLOYING THREE-DIMENSIONAL (3D) EMULATION OF IN-KERF OPTICAL MACROS | 2020-06-25 |
20200201956 | Managing Plan Problems Across Planning Cycles | 2020-06-25 |
20200201957 | METHOD FOR CONCEALING DATA AND DATA OBFUSCATION DEVICE USING THE SAME | 2020-06-25 |
20200201958 | METHOD FOR SETTING PERMISSION OF USER IN INFORMATION EXCHANGE UNIT IN SYSTEM | 2020-06-25 |
20200201959 | VEHICLE SECURITY SYSTEM AND VEHICLE SECURITY METHOD | 2020-06-25 |
20200201960 | AUTHENTICATION METHOD AND SYSTEM | 2020-06-25 |
20200201961 | METHOD AND DEVICE FOR IDENTITY AUTHENTICATION | 2020-06-25 |
20200201962 | PRIVACY MANAGEMENT SYSTEMS AND METHODS | 2020-06-25 |
20200201963 | PRIVACY MANAGEMENT SYSTEMS AND METHODS | 2020-06-25 |
20200201964 | FILE VERIFICATION DATABASE SYSTEM | 2020-06-25 |
20200201965 | BIOMETRIC BASED SELF-SOVEREIGN INFORMATION MANAGEMENT | 2020-06-25 |
20200201966 | BIOMETRIC BASED SELF-SOVEREIGN INFORMATION MANAGEMENT | 2020-06-25 |
20200201967 | BIOMETRIC BASED SELF-SOVEREIGN INFORMATION MANAGEMENT | 2020-06-25 |
20200201968 | USER AUTHENTICATION CONTROL USING ULTRASOUND | 2020-06-25 |
20200201969 | METHOD AND SYSTEM FOR MANAGING IMAGE BASED ON INTERWORKING FACE IMAGE AND MESSENGER ACCOUNT | 2020-06-25 |
20200201970 | BIOMETRIC USER RECOGNITION | 2020-06-25 |
20200201971 | SYSTEM AND METHOD FOR IDENTIFYING USER | 2020-06-25 |
20200201972 | STORAGE DEVICE HAVING FINGERPRINT RECOGNITION SENSOR AND OPERATING METHOD THEREOF | 2020-06-25 |
20200201973 | Method and Device for Fingerprint Recognition, Terminal, and Storage Medium | 2020-06-25 |
20200201974 | LOGIN METHOD AND APPARATUS AND ELECTRONIC DEVICE | 2020-06-25 |
20200201975 | WIRELESS INJECTION OF PASSWORDS | 2020-06-25 |
20200201976 | QUICK ACCOUNT LOGIN METHOD, MOBILE TERMINAL, AND APPARATUS WITH STORAGE FUNCTION | 2020-06-25 |
20200201977 | METHOD FOR AUTHENTICATING A FIRST USER AND CORRESPONDING FIRST DEVICE AND SYSTEM | 2020-06-25 |
20200201978 | METHOD FOR ELECTRONIC SIGNING OF A DOCUMENT BY A PLURALITY OF SIGNATORIES | 2020-06-25 |
20200201979 | Fluid Machine, Fluid Machine Managing Method and Fluid Machine Managing System | 2020-06-25 |
20200201980 | ENABLING WEBGUI ACCESS TO TARGET SYSTEMS | 2020-06-25 |
20200201981 | DETECTION OF EMULATED COMPUTER SYSTEMS USING VARIABLE DIFFICULTY CHALLENGES | 2020-06-25 |
20200201982 | INFORMATION PROCESSING DEVICE, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, AND COMPUTER-READABLE MEDIUM | 2020-06-25 |
20200201983 | ENFORCING POLICIES FOR UNMANAGED APPLICATIONS | 2020-06-25 |
20200201984 | COMMUNICATING TRACE INFORMATION BETWEEN SECURITY ZONES | 2020-06-25 |
20200201985 | POINT OF SALE (POS) SYSTEMS AND METHODS WITH DYNAMIC KERNEL SELECTION | 2020-06-25 |
20200201986 | PREVENTING ACCESS TO SINGLE SIGN ON CREDENTIALS ASSOCIATED WITH EXECUTING APPLICATIONS | 2020-06-25 |
20200201987 | DETERMINING APPARATUS, DETERMINING METHOD, AND DETERMINING PROGRAM | 2020-06-25 |
20200201988 | IoT DEVICE MANAGED BASED ON BLOCK CHAIN, SYSTEM AND METHOD THEREOF | 2020-06-25 |
20200201989 | Multi-point causality tracking in cyber incident reasoning | 2020-06-25 |
20200201990 | DATA CONTROL SYSTEM, DATA CONTROL METHOD, AND DATA CONTROL PROGRAM | 2020-06-25 |
20200201991 | DETERMINING INFORMATION LEAKAGE OF COMPUTER-READABLE PROGRAMS | 2020-06-25 |
20200201992 | CYBER RANGE INTEGRATING TECHNICAL AND NON-TECHNICAL PARTICIPANTS, PARTICIPANT SUBSTITUTION WITH AI BOTS, AND AI BOT TRAINING | 2020-06-25 |
20200201993 | Systems and Methods for Increasing Robustness of Machine-Learned Models and Other Software Systems against Adversarial Attacks | 2020-06-25 |
20200201994 | PRIORITY SCANNING OF FILES WRITTEN BY MALICIOUS USERS IN A DATA STORAGE SYSTEM | 2020-06-25 |
20200201995 | IDENTIFICATION AND CONTROL OF MALICIOUS USERS ON A DATA STORAGE SYSTEM | 2020-06-25 |
20200201996 | TERMINAL DEVICE, METHOD FOR CONTROL OF REPORT OF OPERATION INFORMATION PERFORMED BY TERMINAL DEVICE, AND RECORDING MEDIUM STORING THEREIN PROGRAM FOR CONTROL OF REPORT OF OPERATION INFORMATION PERFORMED BY TERMINAL DEVICE | 2020-06-25 |
20200201997 | GUARDER: AN EFFICIENT HEAP ALLOCATOR WITH STRONGEST AND TUNABLE SECURITY | 2020-06-25 |
20200201998 | DETECTING MALWARE VIA SCANNING FOR DYNAMICALLY GENERATED FUNCTION POINTERS IN MEMORY | 2020-06-25 |
20200201999 | DETECTING UNWANTED COMPONENTS IN A COMPUTER SYSTEM BASED ON EMI FINGERPRINTS OBTAINED THROUGH AN INSERTABLE DEVICE | 2020-06-25 |
20200202000 | USING EMI FINGERPRINTS TO DETECT MALICIOUS CRYPTOMINING SOFTWARE | 2020-06-25 |
20200202001 | METHOD AND SYSTEM FOR STAKE-BASED EVENT MANAGEMENT WITH LEDGERS | 2020-06-25 |
20200202002 | FIRMWARE SECURITY | 2020-06-25 |
20200202003 | VERIFYING BASIC INPUT/OUTPUT SYSTEM (BIOS) BOOT BLOCK CODE | 2020-06-25 |
20200202004 | SECURE INITIALIZATION USING EMBEDDED CONTROLLER (EC) ROOT OF TRUST | 2020-06-25 |
20200202005 | Automated Software Vulnerability Determination | 2020-06-25 |
20200202006 | VULNERABILITY ANALYZER FOR APPLICATION DEPENDENCIES IN DEVELOPMENT PIPELINES | 2020-06-25 |
20200202007 | OPEN SOURCE VULNERABILITY REMEDIATION TOOL | 2020-06-25 |
20200202008 | COLLECTION OF PLC INDICATORS OF COMPROMISE AND FORENSIC DATA | 2020-06-25 |
20200202009 | IDENTIFYING COMPUTER PROGRAM SECURITY ACCESS CONTROL VIOLATIONS USING STATIC ANALYSIS | 2020-06-25 |
20200202010 | PRECISION-TUNED RUNTIME MONITORING | 2020-06-25 |
20200202011 | DATA PRIVACY AWARENESS IN WORKLOAD PROVISIONING | 2020-06-25 |
20200202012 | WRITE-BACK INVALIDATE BY KEY IDENTIFIER | 2020-06-25 |
20200202013 | SECURE ENCRYPTION KEY MANAGEMENT IN TRUST DOMAINS | 2020-06-25 |
20200202014 | BLOCKCHAIN-BASED CONTENT MANAGEMENT SYSTEM, METHOD, APPARATUS, AND ELECTRONIC DEVICE | 2020-06-25 |
20200202015 | OBFUSCATION OF INPUT DATA PROVIDED TO A TRANSACTION DEVICE | 2020-06-25 |
20200202016 | BLOCKCHAIN AUTHORIZATION | 2020-06-25 |
20200202017 | SECURE COMMUNICATION FOR LOG REPORTING IN MEMORY SUB-SYSTEMS | 2020-06-25 |
20200202018 | SMART PRIVACY AND CONTROLLED EXPOSURE ON BLOCKCHAINS | 2020-06-25 |
20200202019 | Input to Locked Computing Device | 2020-06-25 |
20200202020 | Methods and Systems for Access Controlled Spaces for Data Analytics and Visualization | 2020-06-25 |
20200202021 | DYNAMIC ENTITLEMENT FOR BLOCKCHAIN DATA | 2020-06-25 |
20200202022 | BIOMETRIC SENSOR AND PROCESSOR PAIRING | 2020-06-25 |
20200202023 | AUTHORIZATION METHOD FOR DISPLAYING CURRENT PERMISSIONS STATUS OF ALL SYSTEM USERS | 2020-06-25 |
20200202024 | METHOD FOR SETTING OPERATING RECORD VIEWING RIGHT BASED ON TIME PERIOD | 2020-06-25 |
20200202025 | METHOD TO TRACK THE DISSEMINATION OF A DATA SET | 2020-06-25 |
20200202026 | METHODS FOR BIG DATA USAGE MONITORING, ENTITLEMENTS AND EXCEPTION ANALYSIS | 2020-06-25 |