30th week of 2022 patent applcation highlights part 46 |
Patent application number | Title | Published |
20220237255 | SYSTEM AND METHOD FOR THE CREATION AND UPDATE OF HIERARCHICAL WEBSITES BASED ON COLLECTED BUSINESS KNOWLEDGE - A system and method for generating questionnaires as part of building a website within a website building system (WBS). The method includes gathering data from data sources internal and/or external to the WBS, analyzing the gathered data to determine what information is required to further the website building process and what of the required information is to be collected either directly or indirectly from the user via the questionnaires, dynamically producing the questionnaires and running them to receive the collected information directly or indirectly from the user, and selecting whether to integrate the collected information into the website building process or to use the collected information for further gathering, analyzing and dynamically producing. | 2022-07-28 |
20220237256 | RENDERING METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM - A rendering method, rendering apparatus implementing said rendering method, an electronic device implementing said rendering method, and a storage medium implementing said rendering method includes: obtaining data of a page to be processed; extracting a plurality of page elements from the data of the page to be processed; obtaining content and a plurality of attributes of each page element of the plurality of page elements; generating a plurality of rendering object sets, each rendering object set corresponding to each page element based on the content and the plurality of attributes of the respective page element, each rendering object set including a plurality of rendering objects; generating a rendering tree based on a plurality of rendering object sets corresponding respectively to the plurality of page elements; and performing a rendering process based on the rendering tree. | 2022-07-28 |
20220237257 | SYSTEM AND METHOD FOR BROWSER-BASED TARGET DATA EXTRACTION - A method of browser-based target data extraction includes: storing a browser application and a browser extension, the browser extension containing a predefined network identifier of a server; at a controller of the client computing device interconnected with the memory, executing the browser application to retrieve a web page containing target data; at the controller, responsive to retrieving the web page, executing the browser extension simultaneously with the browser application for: capturing a portion of the web page containing the target data; responsive to capturing the portion, automatically generating an overlay interface including the target data; controlling a display of the client computing device to present the overlay with the web page; receiving an operator command at the overlay via an input assembly of the client computing device; and when the operator command is a confirmation command, transmitting the target data to the server using the predefined network identifier. | 2022-07-28 |
20220237258 | System and Method for Automatic Differentiation of Higher-Order Functions - A system and method for automatic differentiation are disclosed. The system and method provide automatic differentiation (AD) that accurately supports functions whose domains and/or ranges are functions. The system and method advantageously enable AD that is completely general and which can be applied in an unrestricted fashion to correctly compute the derivative of all programs that compute differentiable mathematical functions. This includes application to functions whose domain and/or ranges include the entire space of data types supported by programming languages, including not only aggregates but also functions. Moreover, the system and method advantageously remedy an insidious bug that would otherwise lead to incorrect results. | 2022-07-28 |
20220237259 | METHODS AND DEVICES FOR FAST FOURIER TRANSFORMS - A method of operating a microcontroller to perform a Fast Fourier Transform, the method including receiving, by the microcontroller, N samples from a signal; and performing, by the microcontroller, a first butterfly operation of the Fast Fourier Transform before all of the N samples have been received from the signal, based on the performing of the first butterfly operation, the microcontroller performs the Fast Fourier Transform at a higher performance to power efficiency than a Fast Fourier Transform operation that begins after all of the N samples are received. | 2022-07-28 |
20220237260 | SYSTEMS AND METHODS FOR MODELING ITEM SIMILARITY AND CORRELATING ITEM INFORMATION - Disclosed herein are systems and methods for correlating item data. A system for correlating item data may comprise a memory storing instructions and at least one processor configured to execute instructions to perform operations comprising: receiving reference text data associated with a reference item from a device; receiving reference image data associated with the reference item from the remote device; determining candidate text data and candidate image data associated with at least one candidate item; selecting a text correlation model; determining a first similarity score by applying the text correlation model to the reference text data and the candidate text data; selecting an image correlation model; determining a second similarity score by applying the image correlation model to the reference image data and the candidate image data; calculating a confidence score based on the first and second similarity scores; and performing a responsive action based on the calculated confidence score. | 2022-07-28 |
20220237261 | METHOD FOR ANALYZING DATA DETERMINED BY TWO VARIABLES - Provided is a method for determining a first N×K matrix S and second K×M matrix P, using factor number K, so that their product SP approximates to an N×M data matrix X obtained by analyzing a sample containing an unknown number of components. Multiple candidates of regularization parameter λr and one sparsity-inducing regularization function R(S,P) are prepared. For each regularization-parameter candidate λr, a candidate Sr of matrix S and candidate Pr of matrix P which minimize a loss function L(S,P)=D(X|SP)+λrR(S,P) are determined, where D(X|SP) is a distance function expressing the degree of difference between X and SP. For each combination of matrix element X | 2022-07-28 |
20220237262 | POWER EFFICIENT MULTIPLY-ACCUMULATE CIRCUITRY - Disclosed herein includes a system, a method, and a device for multiply-accumulate operation. In one aspect, an input operand is received by control circuitry. In one aspect, the control circuitry determines a sparsity of the input operand, where the sparsity may indicate whether a value of the input operand has a predetermined value or not. In one aspect, the control circuitry determines a stationarity of the input operand, where the stationarity may indicate whether the value of the input operand changes over one or more clock cycles. In one aspect, the input operand is provided to multiply-accumulate circuitry as an input, according to the determined sparsity and stationarity of the input operand. | 2022-07-28 |
20220237263 | METHOD FOR OUTPUTTING, COMPUTER-READABLE RECORDING MEDIUM STORING OUTPUT PROGRAM, AND OUTPUT DEVICE - A method includes: correcting a vector of a first modal by using a correlation between the vector of the first modal and a vector of a second modal different from the first modal; correcting the vector of the second modal by using the correlation between the vector of the first modal and the vector of the second modal; generating a first vector by using a correlation of two different types of vectors obtained from the corrected vector of the first modal; generating a second vector by using the correlation of the two different types of vectors obtained from the corrected vector of the second modal; generating a third vector in which the first and second vectors are aggregated by using the correlation of the two different types of vectors obtained from a combined vector including a predetermined vector, the generated first and second vectors; and outputting the generated third vector. | 2022-07-28 |
20220237264 | COMPUTER-IMPLEMENTED METHOD, COMPUTER PROGRAM PRODUCT AND SYSTEM FOR DATA ANALYSIS - A computer-implemented method for analyzing data obtained for a chemical and/or biological process comprises: obtaining a result of statistical data analysis on the data obtained with respect to the chemical and/or biological process; calculating, for values of process parameters obtained at groups of time points during batch processes of the chemical and/or biological process, a ratio of a correlation value to a confidence value of the correlation value, the correlation value indicating a correlation between the values of the process parameter and at a process output value; calculating, for process parameters, an average of absolute values of the ratios calculated for the values of the process parameter obtained at different groups of time points during the batch processes; excluding the values of one of the process parameters having a smallest average; and iterating, until at least one specified condition is met. | 2022-07-28 |
20220237265 | METHOD AND SYSTEM FOR PROVIDING LIMITED DISTRIBUTION OF A DIGITAL MEDIA FILE - A computer-implemented method of providing limited distribution of a digital media file, the method being executable at a server connected to a network, the server comprising memory. The method includes receiving the digital media file to be distributed; encrypting the digital media file to create an encrypted digital media file; creating a plurality of copies of the encrypted digital media file; creating a plurality of rights tokens, a quantity of the rights tokens being equal to a quantity of copies of the encrypted digital media file, each rights token containing: a key for decrypting a corresponding one of the plurality of copies of the encrypted digital media file, and identifying information related to access rights for the digital media file; and recording the rights tokens to a rights blockchain representative of actions related to distribution of the plurality of copies of the encrypted the digital media file. | 2022-07-28 |
20220237266 | METHOD, SYSTEM AND PRODUCT FOR VERIFYING DIGITAL MEDIA - Method, system and computer program product, the method comprising: during a streaming session of a media by a capturing device to the processing platform, transmitting to the capturing device an instruction to implement an operation mode when capturing a second portion of the media; receiving from the capturing device the media, wherein the media comprises at least a first portion and the second portion; and verifying authenticity of the media, wherein said verifying is based on a determination that the second portion of the media complies with the operation mode. | 2022-07-28 |
20220237267 | BLOCKCHAIN-BASED LICENSE MANAGEMENT FRAMEWORK - Systems and methods are described for license management. A system for license management includes a smart contract that records a licensing agreement between a first party and a second party on usage of a network function. The smart contract is persisted in a trade blockchain. The system also includes an e-licensing manager agent. The e-licensing manager agent retrieves the licensing agreement from the smart contract. The e-licensing manager agent monitors a usage of the network function by the second party in real-time based on the licensing agreement, record actions of the usage of the network function, and create a transaction record based on the recorded actions in an operation blockchain. | 2022-07-28 |
20220237268 | INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND PROGRAM - There is provided an information processing method, an information processing device, and a program that facilitates a security measure for a machine learning model or an API for using the machine learning model, the information processing system including one or more information processing devices controls a user interface for performing a setting related to security of a machine learning model, and generates the machine learning model corresponding to content set via the user interface. The present technology can be applied to, for example, a system that generates and discloses, for example, a machine learning model or an API for using the machine learning model. | 2022-07-28 |
20220237269 | Method and System for Authenticating Users With a Combination of Biometrics, Heartbeat Pattern, and Heart Rate - A system, method, and computer-readable medium are disclosed for authentication users to information handling systems. A user's user biometric, heartbeat pattern, and heart rate information are acquired and registered to an information handling system. To access the information handling system, a user's biometric, heartbeat pattern, and heart rate information are acquired and compared to the registered information. Reacquiring and recalibrating is performed for the user biometric, heartbeat pattern, and heart rate information during a session on the information handling system. | 2022-07-28 |
20220237270 | SECURE ELECTRONIC DEVICES AND METHODS - Secure electronic devices and methods are disclosed. A method may include: using a transceiver, a computer program capturing a current connectivity fingerprint comprising at least one current wireless network or device in a current environment for an electronic device; the computer program retrieving a home connectivity fingerprint for a home environment comprising at least one home wireless network or device that fingerprint was captured when the electronic device was in a home environment; the computer program comparing the current connectivity fingerprint to the home connectivity fingerprint; and the computer program storing the current connectivity fingerprint in response to a threshold number of the current wireless networks or devices in the current connectivity fingerprint are not present of the home connectivity fingerprint. | 2022-07-28 |
20220237271 | AUTHENTICATION BASED ON PHYSICAL INTERACTION AND CHARACTERISTIC NOISE PATTERNS - Disclosed are systems, methods, and non-transitory computer-readable media for authentication based on physical interaction and characteristic noise patterns. Execution of a requested transaction may be conditioned upon satisfaction of an authentication requirement. For example, the requesting user may be prompted to perform a physical interaction such as a swipe across a screen of a client device. The sensor data includes a characteristic noise pattern caused by manufacturing deviations of the set of sensors that captured the sensor data. The sensor data describing the physical interaction and the characteristic noise pattern are used to determine whether the authentication requirement has been satisfied. For example, the sensor data and characteristic noise pattern are used to determine whether the user that performed the physical interaction is an authorized user. The authentication requirement is satisfied upon determining that the user that performed the physical interaction is an authorized user. | 2022-07-28 |
20220237272 | METHOD AND SYSTEM FOR PASSENGER AUTHENTICATION - A kiosk at a departure location may collect information from a passenger. The information collected may include a passport, a boarding pass, a departure photo, and a departure voice recording. The information may be stored in an encrypted database. A kiosk at an arrival location may also collect information from the passenger. The information collected may include a passport, a boarding pass, an arrival photo, and an arrival voice recording. The kiosk may retrieve the departure photo and the departure voice recording from the encrypted database based on the passport and the boarding pass. The kiosk may then compare the arrival photo and departure photos, and similarly the arrival voice recording and departure voice recording, to authenticate an identity of the passenger. | 2022-07-28 |
20220237273 | AUTHENTICATION OF AUDIO-BASED INPUT SIGNALS - The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network. The present solution can also improve computational efficiency by disabling remote computer processes possibly affected by or caused by the malicious audio signal transmissions. By disabling the transmission of malicious audio signals, the system can reduce bandwidth utilization by not transmitting the data packets carrying the malicious audio signal across the networks. | 2022-07-28 |
20220237274 | IMPLEMENTATION OF BIOMETRIC AUTHENTICATION - The present disclosure generally relates to methods and user interfaces for authentication, including providing and controlling authentication at a computer system using an external device in accordance with some embodiments. | 2022-07-28 |
20220237275 | AUTHENTICATION SYSTEM FOR ELECTRONIC DEVICE - An authentication system for an electronic device with a high security level is provided. The authentication system includes a data retention means that accumulates first data related to a state of the electronic device being used by a first user registered in advance and generates a first data group, a first authentication means that authenticates a second user operating the electronic device as the first user and releases a locked state, a data acquisition means that acquires second data related to a state of the electronic device being used by the second user in a state where the locked state is released, and a second authentication means that authenticates the second user as the first user on the basis of the first data group and the second data and sets the electronic device to the locked state when the second user is not authenticated. The data retention means has a function of deleting the oldest first data of the plurality of pieces of the first data included in the first data group. | 2022-07-28 |
20220237276 | POINTING DEVICE WITH BIOMETRIC SKIN-CONTACT SENSOR, AND CORRESPONDING METHOD - Disclosed herein is a pointing device for controlling the position of a pointer in a graphical user interface, GUI, of a computer. The device comprises: an operation interface for sensing operation by an operator of the device for controlling the pointer in the GUI, and a biometric skin-contact sensor configured to obtain biometric identifier data, for identifying the operator, by sensing contact of surface contours of the operator's skin. The biometric skin-contact sensor is a contact surface of the operation interface configured to obtain the biometric identifier data during the operation to control the pointer. | 2022-07-28 |
20220237277 | VISUAL LOGIN - Systems and methods are provided for intelligent driving monitoring systems, advanced driver assistance systems and autonomous driving systems, and providing one-click driver image labeling to facilitate the assignment of drive time to a driver. Various aspects of the driver and/or passengers may be determined, which may include a driver identifier previously associated with the driver, whether the driver is wearing a facial covering, whether an image of the driver is partially occluded, whether the driver is facing in the direction of the camera, and whether an image of the driver is expected to be easily recognizable to a person tasked with assigning representative driver images to driver identifiers. These determinations may be used to improve the efficacy and ease-of-use of a visual login system. | 2022-07-28 |
20220237278 | BIOMETRIC TICKETING - In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric. Ticketing information may be ascertained based on the identification. The ticketing information may be provided, actions may be performed using the ticketing information, and so on. In some implementations, a checkpoint device receives biometric data from a person. A digital representation of the biometric data is used to obtain an identifier from an identification system. The digital representation of the biometric data may not be included in the identifier. The identifier is used by to obtain ticketing information from a ticketing system. The person may be allowed or denied entry into a ticketed area based on the ticketing information. | 2022-07-28 |
20220237279 | BIOMETRIC TICKETING - In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric. Ticketing information may be ascertained based on the identification. The ticketing information may be provided, actions may be performed using the ticketing information, and so on. In some implementations, a checkpoint device receives biometric data from a person. A digital representation of the biometric data is used to obtain an identifier from an identification system. The digital representation of the biometric data may not be included in the identifier. The identifier is used by to obtain ticketing information from a ticketing system. The person may be allowed or denied entry into a ticketed area based on the ticketing information. | 2022-07-28 |
20220237280 | METHOD FOR UNLOCKING AN ELECTRONIC DEVICE - A method of unlocking software including providing an electronic device having a processing unit and a gesture input device connected therewith. Detecting an input gesture operable to initiate password entry, wherein the electronic device is in a software locked state, and randomly assigning a predefined set of input gestures to a predefined set of password symbols. The method of unlocking software additionally includes detecting one of the assigned input gestures via the gesture input device and comparing the entered password symbols, corresponding to the detected input gestures, to a stored unlock password via the processing unit. Further, where the entered password symbols match the stored unlock password, the method enables operation of the electronic device in a software unlocked state. | 2022-07-28 |
20220237281 | ANTI-COUNTERFEITING APPLICATIONS FOR ADVANCED MEMORIES - A block of data is provided from a verifier module to an authenticator module, the size of the block being correlated with one or more desired characteristics of the authenticator module. The verifier module receives a response from the authenticator module, the response comprising data result derived from a calculation involving the challenge value and the block of data. The verifier module verifies whether the response is indicative of the one or more desired characteristics of the authenticator module. | 2022-07-28 |
20220237282 | DECENTRALIZED PASSWORD VAULT - A computer-based system and method for securing passwords, including: obtaining, by an authentication service, a plurality of public keys, each associated with one of a plurality of devices associated with a user; generating, by the authentication service, a password for the user; sending, by the authentication service, the password to a password management entity; encrypting, by the authentication service, the password with each of the public keys, thus generating a plurality of encrypted passwords, each encrypted with one of the public keys and associated with a device of the plurality of devices; and deleting the password by the authentication service. | 2022-07-28 |
20220237283 | TECHNIQUES FOR INSTRUCTION PERTURBATION FOR IMPROVED DEVICE SECURITY - Methods, systems, and devices for techniques for instruction perturbation for improved device security are described. A device may assign a set of executable instructions to an instruction packet based on a parameter associated with the instruction packet, and each executable instruction of the set of executable instructions may be independent from other executable instructions of the set of executable instructions. The device may select an order of the set of executable instructions based on a slot instruction rule associated with the device, and each executable instruction of the set of executable instructions may correspond to a respective slot associated with memory of the device. The device may modify the order of the set of executable instructions in a memory hierarchy post pre-decode based on the slot instruction rule and process the set of executable instructions of the instruction packet based on the modified order. | 2022-07-28 |
20220237284 | INFORMATION SECURITY - According to an example aspect of the present invention, there is provided a method comprising compiling a behavioural baseline database comprising system call behaviours of a computer program, using a first testing process based at least partly on emulated nodes, running a second test of the computer program using live nodes and logging system call behaviour of the computer program during the second test, and determining whether the system call behaviour logged during the second test comprises behaviour deviates from the behavioural baseline database. | 2022-07-28 |
20220237285 | CYBER IMMUNITY SYSTEM AS A BIOLOGICAL SELF-RECOGNITION MODEL ON OPERATING SYSTEMS - One example method includes data protection operations including cyber security operations, threat detection operations, and other security operations. Normal device behavior is learned based on data collected by an anomaly detection engine operating in a kernel. The normal data is used to train a machine learning model. Threats are detected when the machine learning model indicates that new data points deviate from normal device behavior. Associated processes are stopped. This allows threats to be detected based on normal behavior rather than on unknown threat behavior. | 2022-07-28 |
20220237286 | KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES - An anti-exploitation application identifies and prevents a malicious action from occurring on a client. To do so, a monitoring system instantiated on the kernel of the operating system of the client. The monitoring system stores information describing actions taken by the processor. When the monitoring system detects a triggering action, it sends the triggering action to the anti-exploitation application to determine whether the triggering action is an exploitation action. The anti-exploitation application accesses an evidence set for the triggering action and its related actions. The anti-exploitation application generates an execution hierarchy defining the hierarchical relationships between the triggering action and its related actions and tests the hierarchy against a ruleset of grammatically structured rules. If a grammatically structured rule in the ruleset indicates that the triggering action is an exploitation action, the anti-exploitation application takes a prevention action. | 2022-07-28 |
20220237287 | Method for Securing Against Fault Attacks a Verification Algorithm of a Digital Signature of a Message - Provided is a method for securing against fault attacks during verification a digital signature of a message on a client device. It performs (S | 2022-07-28 |
20220237288 | SYSTEM AND METHOD OF INSPECTING ARCHIVE SLICES FOR MALWARE - Disclosed herein are systems and method for inspecting archived slices for malware. In one exemplary aspect, the method comprises identifying a first slice in a plurality of slices in a backup archive, wherein the first slice is an image of user data at a first time. The method comprises scanning the first slice of the plurality of slices in the backup archive and detecting at least one infected file in the first slice. The method comprises identifying a block of the first slice that corresponds to the at least one infected file. The method comprises mounting, to a disk, a second slice of the plurality of slices. The method comprises tracking the block and determining that the at least one infected file exists on the second slice and removing the infected file from the second slice by generating a respective cured slice of the second slice. | 2022-07-28 |
20220237289 | AUTOMATED MALWARE CLASSIFICATION WITH HUMAN-READABLE EXPLANATIONS - A malware classification is generated for an input data set with a human-readable explanation of the classification. An input data set having a hierarchical structure is received in a neural network that has an architecture based on a schema determined from a plurality of second input data sets and that is trained to classify received input data sets into one or more of a plurality of classes. An explanation is provided with the output of the neural network, the explanation comprising a subset of at least one input data set that caused the at least one input data set to be classified into a certain class using the schema of the generated neural network. The explanation may further be derived from the statistical contribution of one or more features of the input data set that caused the at least one input data set to be classified into a certain class. | 2022-07-28 |
20220237290 | SYSTEMS AND METHODS FOR MALWARE DETECTION - In some examples, an analyzer manager configured to select one of a program code analyzer, a static data analyzer, and an unused memory location analyzer for malware detection within memory of a system. The program code analyzer can be executed to evaluate instruction data for executing a computer program at a first set of memory locations within the memory for malware in response to being selected by the analyzer manager. The static data analyzer can be executed to evaluate static data for use by the computer program at a second set of memory locations within the memory for the malware in response to being selected by the analyzer manager. The unused memory location analyzer can be executed to evaluate null data indicative of unused memory locations at a third set of memory locations within the memory for the malware in response to being selected by the analyzer manager. | 2022-07-28 |
20220237291 | LOOKAHEAD SIGNATURE-BASED MALWARE DETECTION - A computing device determines, for a first time period, a usage-based file list identifying one or more executable files. The computing device determines, for each of the one or more executable files identified by the usage-based file list, whether to perform a malware scan upon the executable file based on a cached record for the executable file. The computing device schedules, for execution during a preceding time period before the first time period, a malware scan for at least one of the one or more executable files based on the corresponding determination of whether to perform a malware scan. Each scheduled malware scan is initiated as a low priority thread for execution. The computing device performs each scheduled malware scan during the preceding time period. | 2022-07-28 |
20220237292 | Classifying Ransom Notes in Received Files for Ransomware Process Detection and Prevention - The present invention analyzes the text of a received file to determine if the file likely is a forensic artifact of a ransomware attack on a computer system. If the computer system concludes that the file is likely an artifact of a ransomware attack, the system suspends or terminates all related processes, thereby minimizing the harm caused to the computer system. | 2022-07-28 |
20220237293 | AUTOMATIC THREAT DETECTION OF EXECUTABLE FILES BASED ON STATIC DATA ANALYSIS - Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful. | 2022-07-28 |
20220237294 | METHOD FOR VALIDATING TRUSTWORTHY DATA IN A COMPUTER SYSTEM - A method is provided for validating trustworthy data in a computer system which comprises a distributed repository network, a client system coupled to the repository network and a server system coupled to the repository network. The trustworthy data comprise data sets which are stored in a memory device of the first server system. A validation query message is generated on the client system, which validation query message is stored in the repository network and transferred to the server system. The server system transfers the validation query message for response to a trustworthy software component, which is executed in a trustworthy and secured environment of the server system. The trustworthy software component generates a validation reply message, which is stored in the repository network and transferred to the client system. | 2022-07-28 |
20220237295 | Remote Attestation Method and Device for Composite Device - A remote attestation method includes a first unit of a composite device obtains first measurement information of a second unit of the composite device. The first unit performs, based on the first measurement information, trustworthiness attestation on the second unit to obtain a first attestation result, and the first unit sends the first attestation result to a remote attestation device. In this way, the first unit in the composite device has a remote attestation function, and may perform trustworthiness attestation on another unit in the composite device to which the first unit belongs. | 2022-07-28 |
20220237296 | AUTHENTICATION AND NOTIFICATION HEURISTICS - Systems and methods for providing updates to an electronic device are provided. Upon receiving an update statement, indicating availability of an update to an application on an electronic device, a determination is made as to whether an update notification threshold has been met at the electronic device based upon the indication of availability of the update to the application. When the update notification threshold has been met at the electronic device, a graphical indication of the availability of the update to the application is provided. However, when the update notification threshold has not been met, the graphical indication of the availability of the update to the application is not provided. | 2022-07-28 |
20220237297 | SECURE COPROCESSOR ENFORCED SYSTEM FIRMWARE FEATURE ENABLEMENT - A method includes, in response to a request to enable a set of firmware features in a processing device, performing a validation process based on a key certificate associating a first entity identifier with a firmware feature description file indicating the set of firmware features, and in response to a violation detected during the validation process, enabling a countermeasure in the processing device. | 2022-07-28 |
20220237298 | SYSTEMS AND METHODS FOR PROVIDING SECURED BOOT AND SCAN FOR DEVICES WITH LIMITED ACCESS - An information handling system may include a host system comprising a host system processor and a management controller communicatively coupled to the host system processor and configured to perform out-of-band management of a plurality of devices of the information handling system, and further configured to, during a powering on of the host system randomly select a subset of one or more devices of the plurality of devices for partial validation of firmware of the plurality of devices, randomly select a plurality of offsets associated with the one or more devices for partial verification of the firmware, and perform verification of the one or more devices at the plurality of offsets. | 2022-07-28 |
20220237299 | SECURE BOOT OF VEHICULAR PROCESSORS - Among other things, techniques for securely booting processors in a vehicle are described. An apparatus comprises a circuit coupled to one or more processors of a vehicle and managing a secure boot process for the processors. The circuit receives an indication that the vehicle has been powered on and sends, to a network server, a request for boot files for the processors of the vehicle. In response, the circuit receives, from the server, most recent versions of boot files respectively corresponding to the processors, wherein each boot file includes a digital signature of a trusted authority. In response to obtaining the most recent versions of the boot files, the circuit sequentially boots the processors using the respective boot files, wherein each processor executes a corresponding boot file upon verifying authenticity of the digital signature in the boot file using a corresponding class authentication key. | 2022-07-28 |
20220237300 | FIRMWARE COMPONENT IDENTIFICATION AND VULNERABILITY ASSESSMENT - Methods, systems, apparatuses, and computer-readable storage mediums are described for identifying an origin of a device firmware component. A firmware disassembler is configured to disassemble firmware code obtained from a device, such as a portable electronics device, to generate assembly code. A decompiler is configured to decompile the assembly code to generate source code based on the device firmware. A code neutralizer generates a first neutralized code from the source code. A firmware identifier compares at least a portion of the neutralized code to a code repository to identify an origin of the firmware code. Based at least on the identified origin of the firmware code, a vulnerability determiner determines whether the firmware code contains a vulnerability, such as a security vulnerability that may be exploited. | 2022-07-28 |
20220237301 | AUTOMATIC VULNERABILITY MITIGATION - An image for a containerized application is created. From the image, one or more main processes of the containerized application are identified. The one or more main processes comprise a first subset of a plurality of processes of the containerized application. Within a sandbox environment, the containerized application is started. Based on the started application within the sandbox environment, a second subset of processes within the plurality is determined. The second subset includes one or more dependent processes associated with the first subset. A third subset of processes within the plurality is determined. The third subset excludes the first and second subsets and is associated with a vulnerability list. According to the third subset, a mitigated image for the containerized application is generated. | 2022-07-28 |
20220237302 | RULE GENERATION APPARATUS, RULE GENERATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A rule generation apparatus | 2022-07-28 |
20220237303 | ATTACK GRAPH PROCESSING DEVICE, METHOD, AND PROGRAM - An attack graph processing device includes a node extraction unit which extracts a node relating to a rule classified into a predetermined group from an attack graph that is configured from one or more nodes indicating the state of a system to be diagnosed, or the state of the primary agent of an attack on the system to be diagnosed, and one or more edges indicating the relationship among a plurality of nodes, the attack graph being generated using rules indicating a condition in which the attack can be executed, and a graph configuration unit which simplifies the attack graph on the basis of the extracted node. | 2022-07-28 |
20220237304 | Data Processing Device and Method for Processing Secret Data - According to various embodiments, a data processing device is described comprising a memory configured to store data words in the form of at least two respective shares, a logic circuit configured to receive the at least two shares of at least one of the data words and to process the shares to generate at least two shares of a result data word, a remasking circuit configured to receive at least two shares of at least one of the data words and refresh the shares and an output circuit configured to store the at least two shares of the result data word or to store the refreshed at least two shares depending on a control sequence specifying a sequence of real operations and dummy operations. | 2022-07-28 |
20220237305 | SIGNAL PROCESSING DEVICE, SIGNAL PROCESSING METHOD, AND PROGRAM - The present technology relates to a signal processing device, a signal processing method, and a program for enabling reduction of a processing load while ensuring safety. The signal processing device includes a control unit configured to acquire designation information indicating a designated portion to be encrypted in output data and an encryption processing unit configured to encrypt the designated portion indicated by the designation information in the output data using a key. Furthermore, the designated portion indicated by the designation information is changed with time. The present technology can be applied to an in-vehicle camera. | 2022-07-28 |
20220237306 | METHOD AND SYSTEM FOR LIMITING DATA ACCESSIBILITY IN COMPOSED SYSTEMS - A system for managing composed information handling systems to manage access to data by applications hosted by the composed information handling systems includes a system control processor that instantiates a composed information handling system using a compute resource set that hosts applications and a hardware resource set that stores a portion of the data, associates, using authorization information, storage areas of the at least one hardware resource set with the applications to obtain storage area associations, obtains a data access request from the compute resource set for the portion of the data which is stored in a storage area of the storage areas, makes a determination, based on the storage area associations and an initiator of the data access request, that the initiator of the data access request is not authorized to access the portion of the data, and refuses to service the data access request. | 2022-07-28 |
20220237307 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND APPROVAL SCREEN GENERATION METHOD - A request acceptance section | 2022-07-28 |
20220237308 | SYSTEMS AND METHODS FOR SECURING AND SHARING DATA USING DISTRIBUTED LEDGER TECHNOLOGY - Embodiments of the present disclosure disclose a distributed ledger technology (e.g., blockchain)-based system that provides tools and mechanisms to place users in control of their data. In embodiments, the system may include a platform device configured to initiate a connection with a lab test service provider whose systems (e.g., computer systems) may store data pertaining to the user. In embodiments, the platform device is configured to secure the data stored at the lab test service provider by facilitating deployment of that data into a distributed ledger. Once the data is secured in the distributed ledger, the platform device may be configured to provide controlled distribution or sharing of the secured data with other users or other third-party systems. | 2022-07-28 |
20220237309 | SIGNAL OF RISK ACCESS CONTROL - One example method includes signal of risk access control. Access control is performed based on metadata that includes at least an intent of use, a requestor, and an end user. Access to combinations of data or data sets are based on context metadata that is evaluated at the time of the request instead of after the fact. The context metadata and other labels applied to the data or data sets can be used to orchestrate data access control operations. | 2022-07-28 |
20220237310 | METHOD AND SYSTEM FOR PROACTIVE DATA PROTECTION OF VIRTUAL MACHINES - A system for managing data protection of virtual machines (VMs) hosted by hosts of data clusters includes a data protection manager. The data protection manager identifies a data protection event associated with at least one VM, obtains, in response the data protection event, data protection rules and a protection policy associated with the at least one VM, spawn, by a monitoring engine orchestrator, a monitoring engine to the data cluster, initiates performance of the data protection services for the at least one VM using a first storage of storages, obtains, after the spawning, monitoring information from the monitoring engine, makes a determination that a data protection rule event of the data protection rule events occurred using the monitoring information, and in response to the determination, initiates the performance of a corrective action of corrective actions based on the data protection rules using a second storage of the storages. | 2022-07-28 |
20220237311 | Enhanced Securing and Secured Processing of Data at Rest - In one embodiment, data at rest is securely stored. A data safe performing data plane processing operations in response to requests of received read data requests, received write data requests, and received read information responses, with the data safe being immutable to processing-related modifications resulting from said performing data plane processing operations. Performing these data plane processing operations does not expose any pilot keys outside the data safe in plaintext form nor in encrypted form. The pilot keys are used to encrypt information that is subsequently stored in a storage system. In one embodiment, the information encrypted and decrypted by the data safe includes data structure instances including feature-preserving encrypted entries generated using feature-preserving encryption on corresponding plaintext data items. In one embodiment, a data vault performs queries on the data structure instances including feature-preserving encrypted entries after retrieval from storage and decryption by the data safe. | 2022-07-28 |
20220237312 | METHODS AND APPARATUS FOR EFFICIENTLY IMPLEMENTING A DISTRIBUTED DATABASE WITHIN A NETWORK - An apparatus includes a processor and a memory operatively coupled to the processor and associated with an instance of a distributed database at a first compute device. The processor is configured to select an anonymous communication path. Each blinded public key from a sequence of blinded public keys associated with the anonymous communication path is associated with a pseudonym of a compute device from a set of compute devices that implement the anonymous communication path. The processor is configured to generate an encrypted message encrypted with a first blinded public key. The processor is configured to generate an encrypted data packet including the encrypted message and a compute device identifier associated with a second compute device. The encrypted data packet is encrypted with a second blinded public key. The processor is configured to send the encrypted data packet to a third compute device. | 2022-07-28 |
20220237313 | DIRECT ACCESS TO HOST MEMORY FOR GUESTS - Direct access to host memory for guests is disclosed. For example, a system includes a processor, a host memory, a filesystem daemon, a guest including a storage controller, and a filesystem queue accessible to the filesystem daemon and the storage controller. The storage controller receives a file retrieval request associated with a file stored in the host memory and forwards the file retrieval request to the filesystem daemon by adding the file retrieval request to the filesystem queue. The filesystem daemon retrieves the file retrieval request from the filesystem queue, determines a host memory address (HMA) associated with the file, and causes the HMA to be mapped to a guest memory address (GMA). The guest accesses the file in the host memory with the GMA, and later terminates access to the file, where the filesystem daemon is then configured cause the GMA to be unmapped. | 2022-07-28 |
20220237314 | Reinforcing SQL transactions dynamically to prevent injection attacks - A database protection system (DPS) mitigates injection attacks. DPS receives an unrestricted database query, extract a syntax tree, and evaluates whether it recognizes the query. To this end, DPS applies a hash function over the extracted syntax tree, and then determines whether the resulting hash has been seen by DPS before. If so, DPS retrieves a previously-generated prepared statement associated with the syntax tree, and that prepared statement is then forward to the database server in lieu of sending the original query. If the syntax tree is not recognized, DPS creates a new prepared statement, generates a hash of the syntax tree, and stores the hash and the new prepared statement, and forwards the new prepared statement. The prepared statements are configured based on the native wire protocol used by the database server, and DPS includes additional functionality by which it can learn the semantics of this protocol if necessary. | 2022-07-28 |
20220237315 | METADATA STORAGE ARCHITECTURE AND DATA AGGREGATION - The present disclosure is associated with operation of a metadata server for package management including development and deployment of software. To illustrate, a metadata server stores a database model including multiple data structures that each include one or more entries of multiple data objects and a set of mapping rules defining links between different data structures of the multiple data structure. A method of operating the metadata server includes determining access permissions for an entity. The access permissions correspond to authorization to access a set of the multiple data structures. The method further includes identifying and executing a mapping rule to authorize a link between two or more data structures. The method further includes accessing a portion of requested metadata from the two or more data structures that have an authorized active link, and providing an output of the portion of the requested metadata arranged according to an output format. | 2022-07-28 |
20220237316 | METHODS AND SYSTEMS FOR IMAGE SELECTION AND PUSH NOTIFICATION - Disclosed are methods, systems, and non-transitory computer-readable medium for image selection and push notification. For instance, the method may include receiving a data message from a device, extracting a video from the data message, processing the video to select at least one image from the video in accordance with image selection criteria including at least a blurriness criteria and a human orientation criteria, and determining a user associated with the data message. The method may further include transmitting a push notification including the at least one image to a user device associated with the user, receiving a user indication message from the user device, the user indication message including a user indication of a security issue or not, and performing a security action based on the user indication. | 2022-07-28 |
20220237317 | TECHNOLOGY FOR DE-IDENTIFYING AND RESTORING PERSONAL INFORMATION IN ENCRYPTION KEY-BASED IMAGE - Disclosed is a technology for de-identifying and restoring personal information in an image based on an encryption key. An image processing method for de-identifying and restoring image information, which is performed by an image processing system, may include detecting an object information area in image information, de-identifying the detected object information area by using an encryption key generated in relation to the detected object information area, and restoring the de-identified object information area by using the encryption key. | 2022-07-28 |
20220237318 | TRUST EVALUATION AND SHARING SYSTEM - A method of creating a trust profile using a computer includes receiving personal information from a user at the computer, gathering biographical information about the user, validating the personal information from the gathered biographical information, collecting risk information regarding the user according to the validated personal information from at least one data source, assessing the collected risk information, creating a trust profile for the user from the collected risk information, and enabling the user to share the trust score or trust profile with an evaluator. | 2022-07-28 |
20220237319 | PRIVACY PROTECTION-BASED MULTICOLLINEARITY DETECTION METHODS, APPARATUSES, AND SYSTEMS - One or more embodiments of the present specification provide privacy protection-based multicollinearity detection methods, apparatuses, and systems. Data alignment is performed by a member device on respective local feature data with other member devices to construct a joint feature matrix. Privacy protection-based multi-party matrix multiplication computation is performed to compute a product matrix of a transposed matrix of the joint feature matrix and the joint feature matrix. An inverse matrix of the product matrix is determined based on respective submatrices of the product matrix. A variance inflation factor of each attribute feature is determined by the member device with the other member devices using respective submatrices of the inverse matrix and the respective local feature data. Multicollinearity is determined by the member device with the other member devices based on fragment data of the variance inflation factor of each attribute feature. | 2022-07-28 |
20220237320 | MANAGEMENT APPARATUS, MANAGEMENT METHOD, VERIFICATION APPARATUS, COMPUTER PROGRAM AND RECORDING MEDIUM - A management apparatus is operated by one operating entity. The management apparatus includes: a storage unit that stores a policy information, which is associated with data provided by a data provider to another operating entity that is different from the one operating entity, and which defines a provision permission policy of the data provider for the data; an acquisition unit that refers to a log information in which a first hash value of one policy information is recorded and that obtains a policy information corresponding to the one policy information from the storage unit, the one policy information being associated with one data provided to a data user from the another operating entity; and a comparison unit that calculates a second hash value of the obtained policy information and that compares it with the first hash value. | 2022-07-28 |
20220237321 | INFORMATION MANAGEMENT DEVICE AND INFORMATION MANAGEMENT METHOD - An information management device includes: an obtainer that obtains first company information and personal information from a first company, the first company information relating to a first product or service of the first company, the personal information relating to a user who has purchased the first product or who has been provided with the service; a company information storage that stores the first company information obtained; a personal information storage that stores the personal information obtained; an integrator that integrates the company information and the personal information based on a purchase record or a use record to generate integrated information, the purchase record indicating that the user has purchased the first product, the use record indicating that the user has used the service; and a manager that manages an output of the integrated information based on restriction information for restricting an output destination of the integrated information. | 2022-07-28 |
20220237322 | SYSTEMS AND METHODS FOR PRIVACY-PRESERVING INVENTORY MATCHING WITH SECURITY AGAINST MALICIOUS ADVERSARIES - A method for privacy-preserving inventory matching may include: (1) receiving a plurality of axe submissions; (2) arranging the parties into data structures based on a direction in the party's axe submission; (3) sending each party's commitment to the other party; (4) receiving, from each party, output secret-shares of an arithmetized comparison circuit; (5) verifying that the output secret-shares of the arithmetized comparison circuit received from the parties match commitments to the output secret-shares sent by the respective opposite party; (6) identifying a minimal party based on the outputs of the arithmetized comparison circuit; (7) generating and sending a proof of the minimal party identification to the minimal party; (8) receiving a minimal quantity integer from the minimal party; (9) revealing the minimal quantity integer to the first party and the second party; and (10) executing the trade for the minimal quantity integer. | 2022-07-28 |
20220237323 | COMPATIBLE ANONYMIZATION OF DATA SETS OF DIFFERENT SOURCES - Creating compatible anonymized data sets by performing with machine learning equipment that operates a machine learning model by defining data types of variables of a data set; identifying quasi-identifiers for the data set; defining reidentification sensitivity of all or any targeted subset of the individual variables and quasi-identifiers; defining missing data handling rules for the individual variables; defining allowed data transformations including generalization and use of synthesized data; optimizing quasi-identifier selection, use of synthesized data and a choice of data transformations to minimize information loss and maximize privacy metrics based on the data set; the allowed data transformations; and the missing data handling rules; training the machine learning model using the data set according to the defined data types; the optimized quasi-identifier selection; the optimized use of synthesized data; and the choice of data transformations; and anonymizing the data set using the training of the machine learning model. | 2022-07-28 |
20220237324 | METHOD FOR A MULTI-COUNTRY DATA PIPELINE TO PROTECT PERSONALLY IDENTIFYING INFORMATION - A multi-country data pipeline keeps all of the PII received from a user that is in a first country in the first country. The data pipeline allows the non-personal data received from the user to be transmitted and analyzed in a second country. The method further allows the results of the analysis in the second country to be transmitted back to the first country where the PII is added to the results of the analysis. The data pipeline allows the results of the analysis in the second country to be used to take a desired action for the user in the first country, all while the PII of the user never leaves the first country. | 2022-07-28 |
20220237325 | CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS - A consent receipt management system is configured to: (1) automatically cause a prior, validly received consent to expire (e.g., in response to a triggering event); and (2) in response to causing the previously received consent to expire, automatically trigger a recapture of consent. In particular embodiments, the system may, for example, be configured to cause a prior, validly received consent to expire in response to one or more triggering events. | 2022-07-28 |
20220237326 | SYSTEM AND METHOD FOR CERTIFYING INTEGRITY OF DATA ASSETS - Systems, methods and non-transitory computer readable media are provided for certifying integrity of data assets stored on a client computing system. The data assets are certified by: calculating a state representation of at least one data asset stored on the client computing system using a data verification module deployed to the client computing system; and transmitting the state representation over a network from the client computing system to a remote computing system for storage in an immutable ledger. Systems, methods and non-transitory computer readable media are also provided for verifying integrity of data asserts. | 2022-07-28 |
20220237327 | MANAGING AND PROTECTING CHARGING STATIONS FOR DRONES - An approach is provided to manage in-flight drones. The approach identifies a drone at a drone charging station with the identified drone being unauthorized to be at the drone charging station. Responsively, the approach then secures the identified drone and removes the identified drone from the drone charging station. | 2022-07-28 |
20220237328 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - A laptop computer includes a processor that executes an operating system, an embedded controller, in communication with the processor, that controls hardware elements within the laptop computer independently of the processor, and a wireless tag unit, embedded within the laptop computer, that is readable and writable with takeout detection information via wireless communication. The takeout detection information indicates that the laptop computer has been taken out from a use permissible location. The embedded controller is programmed to directly communicate with the wireless tag unit to determine whether the takeout detection information has been written on the wireless tag, and upon determining that the takeout detection information has been written on the wireless tag, assert a signal to the processor to restrict at least some functionalities of the processor. | 2022-07-28 |
20220237329 | SYSTEM AND METHOD FOR VALIDATING TRUST PROVISIONING OPERATION ON SYSTEM-ON-CHIP - A system-on-chip (SoC) includes a memory, a trust provisioning system, a one-time programmable (OTP) element, and a comparator. The memory is configured to store a first secret key before an execution of a trust provisioning operation. The trust provisioning system is configured to receive an encrypted version of a first set of secure assets and one of a second secret key and an encrypted version of the second secret key, and execute the trust provisioning operation on the SoC to store the first set of secure assets and the second secret key in the OTP element. The comparator is configured to compare the first and second secret keys to generate a valid signal that is indicative of a validation of the trust provisioning operation. The first set of secure assets and a second set of secure assets associated with the SoC are accessible based on the valid signal. | 2022-07-28 |
20220237330 | ELECTRONIC APPARATUS - An electronic apparatus includes a non-rewritable memory part and a security setting unit. The non-rewritable memory part is configured to store a usage environment code. The security setting unit is configured to read the usage environment code from the memory part, select a security algorithm in accordance with a value of the usage environment code, and set the selected security algorithm to the electronic apparatus. | 2022-07-28 |
20220237331 | CONTROL DEVICE FOR A MOTOR VEHICLE, AND MOTOR VEHICLE - The approach relates to a control device for a motor vehicle, that includes a printed circuit board having at least one microprocessor for providing functions of the control device. At least one security function of the functions is subject to a security requirement that is increased with respect to at least one other function of the functions. A security area is provided on the printed circuit board, in which area all the components provided for performing the security function, including at least one first microprocessor, are implemented so as to fulfill the security requirement. Any communication of the first microprocessor in and out of the security area, which communication at least partially uses the printed circuit board, takes place in an end-to-end encrypted manner. At least one second microprocessor, that does not meet the security requirement, provides the at least one other function outside the security area, and is arranged on the printed circuit board. | 2022-07-28 |
20220237332 | SYSTEMS AND METHODS FOR ASYNCHRONOUS PROGRAMMABLE GATE ARRAY DEVICES - Systems and methods of use and fabrication are described for a THx2 threshold gate cell for a programmable gate array including a mode-independent PMOS configuration and an NMOS configuration configured to operate in one of a TH12 mode and a TH22 mode, wherein x is set to a threshold of 1 for the TH12 mode and x is set to a threshold of 2 for the TH22 mode. | 2022-07-28 |
20220237333 | SECURE COPROCESSOR ENFORCED SYSTEM FIRMWARE FEATURE ENABLEMENT - A method includes performing a validation process on a firmware feature description file indicating a set of firmware features in an integrated circuit package, and communicating a result of the validation process to firmware feature enablement logic residing in the integrated circuit package. | 2022-07-28 |
20220237334 | DEVICE FOR PROTECTING AND SUPERVISING AN ELECTRONIC SYSTEM COMPRISING AT LEAST ONE ELECTRONIC COMPONENT. ASSOCIATED METHOD FOR PROTECTING AND SUPERVISING THE INTEGRITY OF THE ELECTRONIC SYSTEM AND OF THE DEVICE, AND FOR JAMMING ATTACKS - A device for protecting an electronic system, such as an integrated circuit, the device incorporating a pulse transformer including a ferrite sheet or layer with low magnetic losses that covers a surface of the electronic system and that is encircled by two coils that are located a distance away from each other, one of these coils, the transmission coil, being connected to a transmission stage for transmitting electrical pulses, and the other of these coils, the reception coil, being connected to a reception stage, the whole thing being connected to and controlled by a microcontroller. | 2022-07-28 |
20220237335 | EQUIPMENT STATE ANALYSIS DEVICE, EQUIPMENT STATE ANALYSIS METHOD, AND PROGRAM - An object of the present invention is to provide a facility state analysis apparatus, a facility state analysis method, and a program capable of extracting a pole having a high risk without an inspector visiting a site. The facility state analysis apparatus according to the present invention creates a pole model from a material characteristic, dimensions, and a structure model of a pole, highly accurately estimates, by using a finite element method, a facility state such as deflection and an inclination when tension by a separately created cable model is applied to the pole model, and visualizes strength remaining in a facility system. | 2022-07-28 |
20220237336 | OBJECT SIMULATION USING REAL-WORLD ENVIRONMENTS - Systems and methods disclosed relate to generating training data. In one embodiment, the disclosure relates to systems and methods for generating training data to train a neural network to detect and classify objects. A simulator obtains 3D models of objects, and simulates 3D environments comprising the objects using physics-based simulations. The simulations may include applying real-world physical conditions, such as gravity, friction, and the like on the objects. The system may generate images of the simulations, and use the images to train a neural network to detect and classify the objects from images. | 2022-07-28 |
20220237337 | CHIP MODULE STRUCTURE AND METHOD AND SYSTEM FOR CHIP MODULE DESIGN USING CHIP-PACKAGE CO-OPTIMIZATION - A chip module, including a radio frequency integrated circuit (RFIC) chip and a package, and a method and system for designing the module. Chip and package design are performed so the RF front end (FE) is split between chip and package. The chip includes an amplifier with a first differential port and the package includes a passive device and matching network with a second differential port connected to the first differential port. The second differential port is power matched to the first differential port using complex power matching based on port voltage reflection coefficients in order to achieve improved performance (i.e., a peak power transfer across a bandwidth as opposed to at only one frequency). The power matching process can result in a chip power requirement reduction that allows for device size scaling. Thus, designing the chip and designing the package is iteratively repeated in a chip-package co-optimization process. | 2022-07-28 |
20220237338 | RANK-CORRELATED PATTERNS FOR GUIDING HARDWARE DESIGN - A system and method for implementing design cycles for developing a hardware component including receiving sets of experimental data, each of set experimental data resulting from an application of a set of variables to the hardware component during a common or a different design cycle of the hardware component, where each variable represents an aspect of the hardware component, determining discretized classes of the experimental data based on one or more quality metrics, and obtaining statistical measurements of the variables to determine correlations between the discretized classes of the quality metrics and the statistical measurements of variables for determining a pattern of the quality metrics to reduce the number of design cycles implemented on the hardware component during the developing of the hardware component. | 2022-07-28 |
20220237339 | WORKLOAD GENERATOR AND SIMULATOR FOR STORAGE CACHING SYSTEMS - A method and system for calibrating a simulator instance is disclosed. Specifically, the method and system disclosed herein may receive, by a workload generator, a trace file specifying operations; generate, by the workload generator, a workload based on the operations, wherein the workload includes one or more read or write requests corresponding to the operations of the workload; receive, by the simulator instance, the read or write requests from the workload generator; and process, by the simulator instance, the read or write requests based on a set of simulation parameters to generate simulation results, wherein the simulation instance is calibrated, at least in part, based on the simulation results. | 2022-07-28 |
20220237340 | SUBFIELD MOISTURE MODEL IMPROVEMENT USING OVERLAND FLOW MODELING WITH SHALLOW WATER COMPUTATIONS - Subfield moisture model improvement in generating overland flow modeling using shallow water calculations and kinematic wave calculations is disclosed. In an embodiment, a computer-implemented data processing method comprises: receiving precipitation data and infiltration data for an agricultural field; obtaining surface water depth data, surface water velocity data, and surface water discharge data for the same agricultural field; determining subfield geometry data for the agricultural field; executing a plurality of water calculations and wave calculations using the subfield geometry data to generate an overland flow model that includes moisture levels for the agricultural field; based on, at least in part, the overland flow model, generating and causing displaying a visual graphical image of the agricultural field comprising a plurality of color pixels having color values corresponding to the moisture levels determined for the agricultural field. Output of the overland flow model is provided to control computers of seeders, planters, fertilizer spreaders, harvesters, or combines to control seeding, planting, fertilizing or irrigation activities in the field. | 2022-07-28 |
20220237341 | MODEL-BASED SYSTEMS ENGINEERING TOOL UTILIZING IMPACT ANALYSIS - A model-based systems engineering tool that determines an impact analysis of a change upon a system model includes a relations database storing a framework describing pre-established relationships between a plurality of elements that are part of the system model. The pre-established relationships are determined based on a model-based systems engineering architecture. The model-based systems engineering tool includes one or more processors in electronic communication with the relations database and a memory coupled to the processors. The memory stores data into one or more databases and program code that causes the model-based systems engineering tool to receive an indication to change a root element, wherein the root element is one of the plurality of elements that are part of the system model. In response to receiving the indication to change the root element, the model-based systems engineering tool determines a first level of elements of the system model. | 2022-07-28 |
20220237342 | DEVELOPMENT SUPPORT APPARATUS, DEVELOPMENT SUPPORT METHOD, AND STATE DETECTION METHOD - A development support apparatus includes: an estimation unit that estimates behavior of an energy storage device by using an equivalent circuit model reflecting a state of charge (SOC)-operating voltage characteristic in a high change-amount region where an amount of change in an operating voltage with respect to an amount of change in the SOC is relatively higher than in other regions among SOC-operating voltage characteristics during constant current charge and discharge of the energy storage device; and an output unit that outputs a result of an estimation by the estimation unit. | 2022-07-28 |
20220237343 | TECHNIQUES FOR PROVIDING CONCRETE INSTANCES IN TRAFFIC SCENARIOS BY A TRANSFORMATION AS A CONSTRAINT SATISFACTION PROBLEM - A system and method for determining concrete instances in traffic scenarios are provided. The method includes receiving a scenario in a scenario description language, wherein the scenario includes at least one sub-scenario; identifying at least one variable for the scenario and the at least one sub-scenario based on parsing of at least one actor and the received scenario; identifying at least one constraint relation derived from the scenario and the at least a sub-scenario; generating, from the at least one variable and at least one constraint, a constraint satisfaction problem; processing the constraint satisfaction problem to generate sequences of states for the at least one variable that comply with the at least one constraint, wherein the sequence of states defines the behavior of the at least one actor with time values; and determining at least one solution that includes the sequences of states. | 2022-07-28 |
20220237344 | GENERATIVE DESIGN SHAPE OPTIMIZATION WITH DAMAGE PREVENTION OVER LOADING CYCLES FOR COMPUTER AIDED DESIGN AND MANUFACTURING - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using generative design processes. A method includes obtaining a design space for a modeled object, one or more design criteria, one or more in-use load cases, and one or more specifications of material, wherein the design criteria comprise a required number of loading cycles for the modeled object; iteratively modifying a generatively designed three dimensional shape of the modeled object, comprising: performing numerical simulation of the modeled object, finding a maximized stress or strain element for each of the one or more in-use load cases, determining an expected number of loading cycles for each of the one or more in-use load cases, redefining a fatigue safety factor inequality constraint for the modeled object, computing shape change velocities in accordance with at least the fatigue safety factor inequality constraint, and updating the level-set representation. | 2022-07-28 |
20220237345 | COMPUTING SYSTEM FOR IMPLEMENTING AND OPERATING MODEL DESCRIBING TARGET SYSTEM, AND METHOD OF PREDICTING BEHAVIOR OF TARGET SYSTEM USING THE SAME - Disclosed herein is a computing system for implementing and operating a system model describing a target system, the computer system comprises a processor configured to select first data as input data of a first sub-module, based on structural information, from among new input data for the target system, provide second data as input data of a second sub-module, based on the structural information, wherein the second sub-module is defined to receive output data of the first sub-module as input data thereof by the structural information, control the second sub-model to infer a behavior of the target system based on the second data, and provide third data based on output data of the second sub-module as an output of the system model describing the behavior of the target system. | 2022-07-28 |
20220237346 | SIMULATION METHOD, SIMULATION APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - A simulation method includes coarse-graining a plurality of atoms that constitute a magnetic body to be simulated and generating a magnetic body model composed of a collection of particles, applying a magnetic moment to each of a plurality of the particles of the magnetic body model, obtaining a magnetic field due to an interparticle exchange interaction acting between the plurality of particles, based on an interatomic exchange interaction of the magnetic body, obtaining an oscillating magnetic field acting on each of the plurality of particles, based on an oscillating magnetic field originating from a thermal fluctuation acting on the atoms, obtaining a total magnetic field acting on each of the plurality of particles, based on the magnetic field and the oscillating magnetic field, and time-evolving the magnetic moment of each of the plurality of particles, based on the total magnetic field acting on each of the plurality of particles. | 2022-07-28 |
20220237347 | Training Wave-Based Physical Systems as Recurrent Neural Networks - A method is disclosed for designing an analog computer that implements a trained recurrent neural network. A computer simulates a wave-based physical system including a wave propagation domain, a boundary layer that approximates a boundary condition, a source of waves, probes for measuring properties of propagated waves, a material within a central region of the wave propagation domain. The simulation also includes a discretized numerical model of a differential equation describing dynamics of wave propagation in the physical system. The simulation is trained with sequential training data by inputing samples of the training data at the source in batches, computing for each batch measured properties of propagated waves at the probes, evaluating for each batch a loss function between the measured properties of propagated waves at the probes and correct classification, and minimizing the loss function with respect to physical characteristics of the material within a central region of the simulation domain using gradient-based optimization. | 2022-07-28 |
20220237348 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus has an output data acquisition unit configured to acquire an output value obtained by performing an experiment or simulation based on an input parameter of a predetermined number of dimensions, an evaluation value calculation unit configured to calculate and output an evaluation value of the output value, an outlier processing unit configured to output a converted evaluation value including a specified value obtained by converting the evaluation value that does not satisfy a predetermined criterion, a next input parameter determination unit configured to determine a next input parameter based on the input parameter and the converted evaluation value corresponding to the input parameter, and an iteration determination unit configured to repeat processing of the output data acquisition unit, the evaluation value calculation unit, the outlier processing unit, and the next input parameter determination unit until a predetermined condition is satisfied. | 2022-07-28 |
20220237349 | MODEL GENERATION DEVICE, SYSTEM, PARAMETER CALCULATION DEVICE, MODEL GENERATION METHOD, PARAMETER CALCULATION METHOD, AND RECORDING MEDIUM - A model generation device includes: a model generation means for generating a second model indicating a relationship between a parameter included in a first model and a sample, the first model indicating a relationship between the sample and a label of the sample. | 2022-07-28 |
20220237350 | SIMULATING FLUID FLOW WITH NEURAL NETWORKS - A neural network is trained for, and may be used in, the simulation of the fluid flow through a domain around an object geometry. A first training process for the neural network includes training ( | 2022-07-28 |
20220237351 | COMPUTING SYSTEM AND METHOD OF VERIFYING CIRCUIT DESIGN IN COMPUTING SYSTEM - A computing system configured to verify design of an integrated circuit (IC) includes a memory and a processor. The memory is configured to store computer executable instructions. The processor is configured to generate a first coverage model for at least two high-level parameters from the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard or hardware description language (HDL) code by executing the computer executable instructions, generate a second coverage model for low-level internal signals from the HDL code by executing the computer executable instructions, and generate a plurality of test packets for a regression test by using at least one of the first coverage model or the second coverage model by executing the computer executable instructions. | 2022-07-28 |
20220237352 | QUANTUM CIRCUIT VALUATION - Systems and techniques that facilitate quantum circuit valuation are provided. In various embodiments, a system can comprise an input component that can access a first quantum circuit. In various embodiments, the system can further comprise a valuation component that can appraise the first quantum circuit based on one or more factors (e.g., frequency factor, complexity factor, resource factor, similarity factor), thereby yielding a value score that characterizes the first quantum circuit. In various instances, the system can further comprise an execution component that can recommend deployment of the first quantum circuit based on determining that the value score exceeds a threshold. | 2022-07-28 |
20220237353 | FAULT DETECTION OF CIRCUIT BASED ON VIRTUAL DEFECTS - Disclosed herein are related to a method, a device, and a non-transitory computer readable medium for testing a circuit model in an integrated circuit. In one aspect, to each of a plurality of sets of input conditions of a circuit model, a corresponding virtual defect is assigned. The virtual defect may be generated irrespective of a physical characteristic of an integrated circuit formed according to the circuit model. Each virtual defect may be associated with a corresponding set of input conditions. In one aspect, a table of the circuit model including a plurality of logic behavioral models of the circuit model is generated. Each of the plurality of logic behavioral models may include a corresponding set of the plurality of sets of input conditions, a corresponding output result, and the corresponding virtual defect. Based at least in part on the table of the circuit model, a test pattern for the circuit model can be generated. | 2022-07-28 |
20220237354 | GENERATING DIGITAL CIRCUITS - There is provided a computer-implemented method for determining a hardware description which specifies the behaviour of a digital circuit. The method comprises obtaining data defining a finite state machine and determining one or more expression evaluation logic operations, wherein conditional expressions can be evaluated by one or more of the expression evaluation logic operations. Subsequently, the method includes defining a circuit signal to represent the current state of the finite state machine and determining one or more state-transition logic operations effective to transition the current state of the finite state machine in accordance with the transitions specified by edges within the finite state machine. From this, the method may generate a hardware description which specifies the behaviour of a digital circuit which, in operation, performs the finite state machine. | 2022-07-28 |