30th week of 2021 patent applcation highlights part 50 |
Patent application number | Title | Published |
20210232655 | SYSTEM AND METHOD FOR A WEB SCRAPING TOOL AND CLASSIFICATION ENGINE - A web scaping system configured with artificial intelligence and image object detection. The system processes a web page with a neural network to perform object detection to obtain structured data, including text, image and other kinds of data, from web pages. The neural network allows the system to efficiently process visual information (including screenshots), text content and HTML structure to achieve good quality and decrease extraction time. | 2021-07-29 |
20210232656 | CALCULATION APPARATUS, CALCULATION METHOD AND PROGRAM - Disclosed is a method whereby a solution of an optimization problem under multiple structures can be obtained at high speed even when a function to be minimized is ill-conditioned. One aspect of the present invention relates to a computing device that computes an optimal solution of an optimization function f+g+h represented by a sum of three functions f, g, and h, including: a first computing unit that computes a proximal point of a function F+h representing the optimization function f+g+h, the function F+h being a sum of a function F=f+g represented by a sum of two functions f and g and a function h; a second computing unit that computes an approximate proximal point of the function F; and a convergence determination unit that determines whether or not a predetermined termination condition is satisfied based on a proximal point computed by the first computing unit and an approximate proximal point computed by the second computing unit, and causing the first computing unit and the second computing unit to repeatedly compute the proximal point and the approximate proximal point until the predetermined termination condition is satisfied. | 2021-07-29 |
20210232657 | INFORMATION PROCESSING SYSTEM, COMBINATORIAL OPTIMIZATION METHOD, AND COMBINATORIAL OPTIMIZATION PROGRAM - An information processing system is used for solving combinatorial optimization problems for an objective function of a plurality of variables. The information processing system includes: two optimization systems that are a first optimization system and a second optimization system; and an extraction system. The first optimization system performs a first optimization process that allows, as continuous variables, the variables to continuously change in-between discrete values, and operates optimization and outputs evaluation which satisfies some restrictive conditions, using the continuous variables. The extraction system performs an extraction process that extracts variables, based on the continuous values of the first optimization system, and extracts, as ambivalent variables, the variables which cannot be decided to which discrete values should be taken. The second optimization system performs a second optimization process that solves the combinatorial optimization problem, based on the variables that are the ambivalent variables extracted in the extraction process. | 2021-07-29 |
20210232658 | METHOD FOR COMBINING ANALOG NEURAL NET WITH FPGA ROUTING IN A MONOLITHIC INTEGRATED CIRCUIT - A method for implementing a neural network system in an integrated circuit includes presenting digital pulses to word line inputs of a matrix vector multiplier including a plurality of word lines, the word lines forming intersections with a plurality of summing bit lines, a programmable Vt transistor at each intersection having a gate connected to the intersecting word line, a source connected to a fixed potential and a drain connected to the intersecting summing bit line, each digital pulse having a pulse width proportional to an analog quantity. During a charge collection time frame charge collected on each of the summing bit lines from current flowing in the programmable Vt transistor is summed. During a pulse generating time frame digital pulses are generated having pulse widths proportional to the amount of charge that was collected on each summing bit line during the charge collection time frame. | 2021-07-29 |
20210232659 | QUERY RECOMMENDATIONS FOR A DISPLAYED RESOURCE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual information to a user. In one aspect, a method includes receiving, from a user device, a query-independent request for contextual information relevant to an active resource displayed in an application environment on the user device, generating a first set of queries from displayed content from the resource, generating a second set of queries from the first set of queries, determining a quality score for each of the queries of the second set of queries, selecting one or more of the queries from the second set of queries based on their respective quality scores, and providing, to the user device for each of the selected one or more queries of the second set of queries, a respective user interface element for display with the active resource. | 2021-07-29 |
20210232660 | METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED - The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files. | 2021-07-29 |
20210232661 | COMPUTING DEVICE USE RESTRICTION SYSTEM - A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user. | 2021-07-29 |
20210232662 | METHODS TO PROTECT STAKEHOLDERS' ALGORITHMS AND INFORMATION IN UNTRUSTED ENVIRONMENTS - A computer implemented method executed by a secure machine for securely executing a program subject to conditions specified in an agreement, e.g., smart contract, comprising: receiving a request from a user machine to execute the program and in response obtaining instructions from the smart contract; executing validation process specified in the instructions; obtaining validation approval and in response downloading the program onto the secure machine; downloading data from the user machine onto the secure machine; running the program using the data on the secure machine; transmitting output of the data from the secure machine; and, deleting the program and the data from the secure machine. | 2021-07-29 |
20210232663 | System, Method, and Apparatus for Assisting with Passwords - A system for providing a password hint authenticates a username and password against a stored username and stored password. Upon failure of the authentication, the system determines a password formation rule that was in force when the user created the stored password then compares the password to the password formation rule and if the password violated any part of the password formation rule, the system reports each part of the password that violated the any part of the password formation rule. | 2021-07-29 |
20210232664 | SECURING COMPUTING DEVICES - Examples described herein relate to a system consistent with the disclosure. For instance, the system may comprise a display, a computing device, a display, an input mechanism commutatively coupled to the computing device, and an independent second processing resource to receive a password entry to unlock the computing device while the computing device is in a S5 state, determine a total number of incorrect password entry attempts to successfully unlock the computing device, save the total number of password entry attempts to a non-volatile memory of the independent second processing resource, and secure the computing device in response to a determination that the total number of incorrect password entry attempts exceeds a threshold value. | 2021-07-29 |
20210232665 | COMPUTING SYSTEM VIRTUALIZATION CONTINUOUS AUTHENTICATION SYSTEM - A computing system virtualization continuous authentication system includes a computing system virtualization system that is configured to provide a virtual computing system on a computing client device, and a computing system virtualization management server device that is coupled to the computing system virtualization system and a management terminal. The computing system virtualization management server device monitors user activity information that is associated with a management session that corresponds with the management of the computing system virtualization system and that is associated with an authenticated user account on the computing system virtualization management server device. The computing system virtualization management server device determines that a first authentication challenge is required during the management session based on the user activity information and provides the first authentication challenge to the management terminal. | 2021-07-29 |
20210232666 | Authentication Session Extension Using Ephemeral Behavior Detection - Hardware on a device, including sensors that may be embedded in or accessible to the device, extend the validity session of an authentication event by identifying behavior of the user periodically during the session. By detecting behavior that may be directly or indirectly unrelated to the application—but is necessarily present if the user remains the same—the session is extended for as long as that behavior is within some defined parameters. This process may be accomplished either by using an expert system or through the application of machine learning. Such a system may take input from sensors and detects a pattern in those inputs that coincide with the presence of that ephemeral personal or behavioral patterns that it is desired to detect. Using that detected behavior, the validity of a session can be extended using statements about the variance or invariance of the detected ephemeral personal or behavioral states. | 2021-07-29 |
20210232667 | BIOMETRIC SYSTEM AND METHOD FOR RECOGNIZING A BIOMETRIC CHARACTERISTIC IN THE BIOMETRIC SYSTEM - A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE. | 2021-07-29 |
20210232668 | ANDROID SYSTEM-BASED SMART TERMINAL UNLOCKING METHOD AND DEVICE, AND SMART TERMINAL - A smart terminal unlocking method and device employing an Android system, and a smart terminal are provided. The method includes that: a smart terminal receives a system unlocking operation performed by a user to acquire unlocking information; determines, according to the unlocking information, whether a system of the smart terminal is allowed to be unlocked; determines whether a lock screen program of a third-party application is running when the system is allowed to be unlocked; shuts the lock screen program of the third-party application when the lock screen program of the third-party application is running, and unlocks the system to enter a system interface; and directly unlocks the system to enter the system interface when the lock screen program of the third-party application is not running. | 2021-07-29 |
20210232669 | DEVICE CONTROL SYSTEM - A device control system includes: a device to be controlled; a wearable device that acquires biometric information on a user; a management server that determines personal data associated with the user of the wearable device when receiving the biometric information, and generates an operating condition of the device to be controlled, based on the received biometric information and the determined personal data, the personal data being one of a plurality of pieces of personal data indicating a preference of each user regarding the operating condition of the device to be controlled; and a controller that generates a control signal for controlling the device to be controlled, based on the operating condition generated by the management server, and transmits the generated control signal to the device to be controlled. | 2021-07-29 |
20210232670 | ARTIFICIAL INTELLIGENCE SERVICE METHOD AND DEVICE THEREFOR - An artificial intelligence service method and a device therefor are disclosed. Specifically, a method for providing an artificial intelligence service by an artificial intelligence device may comprise the steps of: receiving an input of user data including user biometric information; performing user adaptive training for transforming a base artificial intelligence model to be suitable for characteristic of the user data; and providing an artificial intelligence service by applying an artificial intelligence model generated as a result of the user adaptive training. | 2021-07-29 |
20210232671 | BIOMETRIC AUTHENTICATION SYSTEM, CONTROL DEVICE, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A biometric authentication system includes: a storage device that stores pieces of biometric information and pieces of registered information associated with the respective pieces of the biometric information and identifying the respective pieces of the biometric information; an acquisition device that acquires the biometric information of a user to be authenticated; and a control device that is configured to cause a notification device, when the biometric information acquired by the acquisition device matches a piece of the biometric information stored in the storage device, to notify of a piece of the registered information associated with the matched piece of the biometric information. | 2021-07-29 |
20210232672 | COMPUTER-BASED SYSTEMS WITH PROGRAMMED AUTOMATIC REAL-TIME UPDATABLE BROWSING DATA OBJECTS AND ACTIVITY DATA OBJECTS AND METHODS OF USE THEREOF - In order to provide improved matching of records between different sources, systems and methods include generating a data link between a stored interaction profile of the user and activity data records that identify activities performed by the user. Online interaction data associated with the user is received, including tracking data indicative of online interactions with content. The online interaction data is stored in the stored interaction profile associated with the user. An activity model is used to predict correlation parameters representing groupings of online interactions of the online interaction data with activities performed by the user, where the prediction is based on the tracking data and each activity in the interaction profile. The interaction profile is updated with the groupings and user activities are authenticated based on the interaction profile. | 2021-07-29 |
20210232673 | SECURING PHYSICAL ACCESS TO FILE CONTENTS - A computing system may perform a method that involves receiving an input indicating at least one person, other than a user of a computing device, is proximate to the computing device, determining that the person is within a threshold distance of the computing device based on the received input, and modifying an output of the computing device in response to determining that the person is within the threshold distance from the computing device, so as to inhibit the person from receiving content from the computing device. | 2021-07-29 |
20210232674 | RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs) - Examples of the present disclosure describe systems and methods for restricting access to application programming interfaces (APIs). For example, when a process calls an API, the API call may be intercepted by a security system for evaluation of its trustfulness before the API is allowed to run. Upon intercepting an API call, the process calling the API may be evaluated to determine if the process is known to the security system, such that known processes that are untrusted may be blocked from calling the API. Further, when the security system cannot identify the process calling the API, the security service may evaluate a call stack associated with the call operation to determine if attributes of the call operation are known to the security system. If the call operation is known to the security system as untrusted, the call operation may be blocked from calling the API. | 2021-07-29 |
20210232675 | STACK PIVOT EXPLOIT DETECTION AND MITIGATION - Examples of the present disclosure describe systems and methods for detecting and mitigating stack pivoting exploits. In aspects, various “checkpoints” may be identified in software code. At each checkpoint, the current stack pointer, stack base, and stack limit for each mode of execution may be obtained. The current stack pointer for each mode of execution may be evaluated to determine whether the stack pointer falls within a stack range between the stack base and the stack limit of the respective mode of execution. When the stack pointer is determined to be outside of the expected stack range, a stack pivot exploit is detected and one or more remedial actions may be automatically performed. | 2021-07-29 |
20210232676 | Uniform Enclave Interface - A uniform enclave interface is provided for creating and operating enclaves across multiple different types of backends and system configurations. For instance, an enclave manager may be created in an untrusted environment of a host computing device. The enclave manager may include instructions for creating one or more enclaves. An enclave may be generated in memory of the host computing device using the enclave manager. One or more enclave clients of the enclave may be generated by the enclave manager such that the enclave clients configured to provide one or more entry points into the enclave. One or more trusted application instances may be created in the enclave. | 2021-07-29 |
20210232677 | Automated Detection of User Device Security Risks Related to Process Threads and Corresponding Activity - Methods, apparatus, and processor-readable storage media for automated detection of user device security risks related to process threads and corresponding activity are provided herein. An example computer-implemented method includes obtaining information pertaining to processes running on a user device; obtaining information pertaining to images loaded into at least one memory associated with at least one of the processes running on the user device; obtaining information pertaining to threads created in connection with at least one of the processes running on the user device; automatically identifying at least one of the threads as a security risk by processing the information pertaining to the images and the information pertaining to the threads; and performing at least one automated action based on the identification of at least one of the one or more threads as a security risk. | 2021-07-29 |
20210232678 | DETECTION OF MALICIOUS DATA IN A CONTAINERIZED ENVIRONMENT - A system which includes at least one host, wherein the host is configured to implement at least one container group including a first container, a data communication module, an interface, and a malicious detection module, wherein the data communication module is configured to collect data based on data communication of the container group, and transmit collected data, or data representative thereof, to the interface, the interface being configured to transmit collected data, or data representative thereof, to the malicious detection module, for detecting malicious data. | 2021-07-29 |
20210232679 | Secure IC with Soft Security Countermeasures - An Integrated Circuit (IC) includes functional circuitry and protection circuitry. The protection circuitry is configured to maintain a counter value, which is indicative of a cumulative amount of hostile attacking attempted on the functional circuitry over a lifetime of the IC, to detect events indicative of suspected hostile attacks on the functional circuitry, to decide, responsively to a detected event, on an update of the counter value depending on a time difference between the detected event and a most recent power-up in the IC, and update the counter value in accordance with the decided update, and to disable at least part of the IC in response to the counter value crossing a threshold. | 2021-07-29 |
20210232680 | DYNAMIC VISUALIZATION OF SCRIPTS BASED ON CENTRALIZED SECURITY ASSESSMENTS - Disclosed embodiments relate to systems and methods for generating visual representations of scripts based on centralized security assessments. Techniques include identifying, at a centralized script execution resource in a network environment, a first script; performing a multidimensional analysis for a particular action of the first script based on at least: a service identity of the particular action, an action type of the particular action, and a target resource associated with the particular action; and providing a visual representation of a context of the particular action based on the multidimensional analysis, the visual representation expressing the service identity, the action type, and the target resource. | 2021-07-29 |
20210232681 | HYPERVISOR LEVEL SIGNATURE CHECKS FOR ENCRYPTED TRUSTED EXECUTION ENVIRONMENTS - A system includes a hypervisor, a memory, and boot firmware stored in the memory. The boot firmware is configured to execute on a processor to load a trusted code that includes a condition checker from the hypervisor, check a signature of the trusted code, and verify the signature is trusted by a guest. The boot firmware is also configured to load the trusted code into an encrypted memory at a known guest address. The hypervisor is configured to protect the known guest address. The trusted code includes a first instruction, one or more intermediate instructions, and a final instruction. The first instruction and the final instruction are exits to the hypervisor. The hypervisor is also configured to execute the condition checker and detect an inconsistency in guest memory. | 2021-07-29 |
20210232682 | MALWARE PROTECTION FOR VIRTUAL MACHINES - A computer-implemented method at a data management system comprises receiving a write made to a virtual machine; computing, outside of the virtual machine, a fingerprint of the write; comparing, outside of the virtual machine, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if malware is detected based on a number of matches from the comparing breaching a predetermined threshold over a predetermined amount of time. | 2021-07-29 |
20210232683 | MALWARE PROTECTION FOR VIRTUAL MACHINES - A computer-implemented method at a data management system comprises: receiving, at a storage appliance from a server hosting a virtual machine, a write made to the virtual machine; computing, at the storage appliance, a fingerprint of the transmitted write; comparing, at the storage appliance, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time. | 2021-07-29 |
20210232684 | INTEGRITY VERIFICATION FOR A SOFTWARE STACK OR PART OF A SOFTWARE STACK - The present disclosure relates to a method for integrity verification of a software stack or part of a software stack resident on a host machine. A management entity generates a measurement log for a disk image associated with the software stack or the part of a software stack. A verifier entity retrieves the generated measurement log and compares the generated measurement log with a reference measurement of a verification profile previously assigned by the verifier entity to the software stack or the part of a software stack to verify the software stack or the part of a software stack. | 2021-07-29 |
20210232685 | METHODS FOR BEHAVIORAL DETECTION AND PREVENTION OF CYBERATTACKS, AND RELATED APPARATUS AND TECHNIQUES - A security engine may use event-stream processing and behavioral techniques to detect ransom ware. The engine may detect process behavior associated with encrypting a file, encrypting a storage device, or disabling a backup file, and may assign a ransomware category to the process based thereon The engine may initiate protection actions to protect system resources from the process, which may continue to execute. The engine may monitor the process for specific behavior corresponding to its ransomware category. Based on the extent to which such specific behavior is detected, the engine may determine that the process is not ransomware, assign a ransomware subcategory to the process, or adjust the process's threat score. Monitoring of the process may continue, and the threat score may be updated based on the process's behavior. If the threat score exceeds a threshold corresponding to the ransomware category (or subcategory), a corresponding policy action may be initiated. | 2021-07-29 |
20210232686 | ATTACK DETECTION DEVICE, ATTACK DETECTION METHOD, AND ATTACK DETECTION PROGRAM - Provided is an attack detection device including: an abnormality detection unit configured to detect, by acquiring an abnormality detection result which includes a facility ID, occurrence of an abnormality in a facility associated with the facility ID; a storage unit configured to store, as adjustment history data, data that associates the facility ID and an adjustment time; and an attack determination unit configured to determine that there is an attack on the facility associated with the facility ID, by obtaining an adjustment frequency of the facility from the adjustment history data which is stored in the storage unit, based on a result of detection by the abnormality detection unit, when the adjustment frequency exceeds an allowable number of times set in advance for the facility. | 2021-07-29 |
20210232687 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processing device includes: a processor; and a memory including at least one set of instructions that, when executed by the processor, causes the processor to perform operations. The operations include: obtaining incident information about an incident of a cyberattack that occurred in a vehicle; obtaining first vehicle information about a state of a first vehicle; storing, in the memory, the incident information and the first vehicle information; determining a risk level of a vehicle function of the first vehicle, based on a degree of matching between the incident information and the first vehicle information stored in the memory, the vehicle function of the first vehicle being one among one or more vehicle functions of the first vehicle; generating a function restriction command for restricting the vehicle function, when the risk level is higher than a first criterion; and outputting the function restriction command. | 2021-07-29 |
20210232688 | DETERMINE WHETHER TO PERFORM ACTION ON COMPUTING DEVICE BASED ON ANALYSIS OF ENDORSEMENT INFORMATION OF A SECURITY CO-PROCESSOR - Examples disclosed herein relate to a computing device that includes a central processing unit, a management controller separate from the central processing unit, and a security co-processor. The management controller is powered using an auxiliary power rail that provides power to the management controller while the computing device is in an auxiliary power state. The security co-processor includes device unique data. The management controller receives the device unique data and stores a representation at a secure location. At a later time, the management controller receives endorsement information from an expected location of the security co-processor. The management controller determines whether to perform an action on the computing device based on an analysis of the endorsement information and the stored representation of the device unique data. | 2021-07-29 |
20210232689 | INFORMATION PROCESSING DEVICE, VERIFICATION METHOD AND VERIFICATION PROGRAM - An information processing device includes a memory, and processing circuitry coupled to the memory and configured to acquire, from a storage of a security module with tamper resistance, information related to a verification key and ID information of the configuration file for verifying a digital signature for a configuration file, and use the acquired information related to the verification key and ID information to cause an application program to execute processing of verifying integrity of configuration data of the configuration file, acquire registration version information from the storage of the security module, and use the acquired registration version information to cause the application program to execute processing of verifying a configuration version of the configuration file, and update the registration version information to the version of the configuration version when the configuration version of the configuration file and the registration version information satisfy a predetermined condition. | 2021-07-29 |
20210232690 | INFORMATION PROCESSING APPARATUS AND START-UP METHOD OF THE SAME - An information processing apparatus includes a first CPU, a second CPU, a first nonvolatile memory that stores a boot program to be executed by the first CPU at a time of start-up, and a second nonvolatile memory that stores a first boot program and a second boot program for verifying a program. The first CPU determines whether or not a verification method is set in the first nonvolatile memory, and if not, the first CPU executes the first boot program, and writes the setting of the verification method to the second nonvolatile memory. If the verification method is set, the first CPU executes the second boot program in accordance with the setting, and when the processing of the second boot program is normally ended, the second CPU starts up the information processing apparatus. | 2021-07-29 |
20210232691 | AUTOMATICALLY REPLACING VERSIONS OF A KEY DATABASE FOR SECURE BOOTS - A technique includes, in a first phase of a secure boot of a computer system, executing boot code of the computer system to access a first version of a secure boot key database to authenticate driver code. The first version of the secure boot key database stores a key corresponding to a plurality of drivers. The technique includes executing the boot code to automatically prepare the secure boot key database for a second phase of the secure boot in which operating system bootloader code is executed. Preparing for the second phase includes executing the boot code to automatically replace the first version of the secure boot key database with a second version of the secure boot key database, and the second version of the secure boot key database stores a key, which corresponds to the operating system bootloader code. The technique includes in the second phase of the secure boot, executing the boot code to access the secure boot key database to authenticate the operating system bootloader code. | 2021-07-29 |
20210232692 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - An evaluation item generation unit ( | 2021-07-29 |
20210232693 | PROCESS-BASED VIRTUALIZATION SYSTEM FOR EXECUTING A SECURE APPLICATION PROCESS - The present disclosure relates to a process-based virtualization system comprising a data processing unit. The system comprises a computer readable storage media, wherein a first memory component of the computer readable storage media is configured for access by an OS, secure and non-secure applications and the firmware, and wherein a second memory component of the computer readable storage media is configured for access by the firmware and not by the OS and the non-secure application. The data processing unit is configured to operate in a first mode of operation that executes a non-secure application process using the OS, and to operate in a second mode of operation that executes the secure application using the firmware, thereby executing application code using the second memory component. | 2021-07-29 |
20210232694 | METHODS AND APPARATUS FOR OFFLOADING ENCRYPTION - A method may include transferring data from a host to an encryption offload engine through an interconnect fabric, encrypting the data from the host at the encryption offload engine, and transferring the encrypted data from the encryption offload engine to a storage device through a peer-to-peer connection in the interconnect fabric. The method may further include transferring the encrypted data from the storage device to the encryption offload engine through a peer-to-peer connection in the interconnect fabric, decrypting the encrypted data from the storage device at the encryption offload engine, and transferring the decrypted data to the host through the interconnect fabric. The method may further include transferring the encrypted data from the storage device to the host, and verifying the encryption of the encrypted data at the host. | 2021-07-29 |
20210232695 | AUGMENTING EXECUTABLES HAVING CRYPTOGRAPHIC PRIMITIVES - In general, this disclosure describes techniques for replacing target cryptographic primitives in executable binary files with other, potentially more secure, cryptographic primitives. In some examples, a computing system for augmenting cryptographic executables includes a locator to determine if an executable program in an executable binary file includes a target cryptographic primitive. The computing system can include a patch generator to generate patch instructions in response to a determination by the locator that the executable program includes the target cryptographic primitive. The patch instructions cause the executable program to execute a replacement cryptographic primitive instead of the target cryptographic primitive. A rewriter engine of the computing system can modify, based on the patch instructions, the executable program to generate a modified executable binary file. | 2021-07-29 |
20210232696 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO DATA - A method for controlling access to a set of data is provided. The method includes receiving, via an interface, a request from an agent to access the set of data in a database; extracting an access criterion relating to a predefined data access constraint and a predetermined data access policy from the request; and determining whether the agent is granted access to the set of data using the criterion, where the access criterion is based on an attribute that is associated with an element within the set of data. | 2021-07-29 |
20210232697 | COMPUTER SYSTEM AND DATA ACCESS CONTROL METHOD - The computer system is connected to a DB that stores data acquired from a production system in which a plurality of machines operate, and includes a generation unit and a data search unit. The DB stores operation data and environment data. The generation unit generates, by analyzing schedule information including a production schedule of the plurality of products, first owner information for storing first access control data including an owner, the machines, and a first access period set based on operation time, and generates, based on the first owner information, second owner information for storing second access control data including the owner, a type of the environment data, and a second access period set based on the first access period. The data search unit controls accesses to the DB based on the first owner information and the second owner information. | 2021-07-29 |
20210232698 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING PROGRAM - A system includes a plurality of information processing devices configured to manage, in a distributed manner, meta information indicating access authority for directories having a hierarchical structure for accessing a file, wherein at least one of the plurality of information processing devices is configured to: receive an access request to the file; respond with a confirmation result of the access authority according to confirmation of the access authority of an access request source from a higher directory of the file to the file based on the meta information; and in response to determining that creating of an access right confirmation history of the confirmation result of the access authority of the access request source from the higher directory to the file based on an access history for the file is to be performed, create the access right confirmation history in association with identification information of the access request source. | 2021-07-29 |
20210232699 | Data Breach Detection and Mitigation - A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions. | 2021-07-29 |
20210232700 | USING POLICIES TO COMPLY WITH A REQUEST FROM A PERSON FOR DATA THAT PERTAINS TO A PERSON - Described are methods and systems for using policies to comply with a person's request for data pertaining to the person, pursuant to applicable data privacy laws. A policy is retrieved responsive to receiving a query that includes data to identify records that store data pertaining to the person. The policy indicates first and second database objects, and respective first and second sets of fields, which store data that pertains to persons. The policy is applied. Applying the policy includes retrieving, as first values, data stored in the first set of fields of a first record associated with the data in the query, and retrieving, as second values, data stored in the second set of fields of a second record associated with the first record. The first and second values, and the names of the fields from which they were retrieved, are stored in a document. | 2021-07-29 |
20210232701 | SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGE - The present disclosure relates to methods and systems for contextual data masking and registration. A data masking process may include classifying ingested data, processing the data, and tokenizing the data while maintaining security/privacy of the ingested data. The data masking process may include data configuration that comprises generating anonymized labels of the ingested data, validating an attribute of the ingested data, standardizing the attribute into a standardized format, and processing the data via one or more rules engines. One rules engine can include an address standardization that generates a list of standard addresses that can provide insights into columns of the ingested data without externally transmitting the client data. The masked data can be tokenized as part of the data masking process to securely maintain an impression of the ingested data and generate insights into the ingested data. | 2021-07-29 |
20210232702 | METHOD AND SYSTEM FOR DATA PRIVACY PROTECTION IN RELATIONAL DATABASES - A system and methods are provided for protecting private data items in a relational database, including: storing non-private attributes of entities of a first entity type in a first non-private table and storing one or more non-private attributes of entities of a second entity type in a second non-private table; and storing private attributes of entities of both the first and second entity types in a private table, wherein each record of the private table includes a single private-attribute field and a scrambled field, wherein the scrambled field is a transformation of an entity type field, a record identifier field, and an attribute identifier field, wherein the entity type field identifies an entity type of the given entity, the record identifier field identifies a corresponding record of a non-private table, and the attribute identifier field indicates an identifier of the private attribute whose value is stored in the private-attribute field. | 2021-07-29 |
20210232703 | SYSTEMS AND METHODS FOR DOMAIN-BASED SMART CONTRACT EXECUTION GOVERNANCE IN A DLT NETWORK - Disclosed herein are systems and methods for governing domain-based smart contract execution in a DLT network. In one exemplary aspect, a method may comprise receiving a request to register a first domain in a cloud that comprises nodes of the DLT network and generating the first domain responsive to the request, wherein the first domain comprises a set of smart contracts and policies, e.g. specifically for personal data management, for a first subset of the nodes and wherein a pre-existing second domain in the cloud comprises a different set of smart contracts and policies for a second subset of the nodes. In response to determining to execute the smart contract from the first domain, the method comprises executing a domain policy associated with the first domain, wherein the domain policy determines data privacy settings for the smart contract. The method may comprise executing the smart contract and storing computation results. | 2021-07-29 |
20210232704 | METHOD AND SYSTEM FOR MANAGING VEHICLE GENERATED DATA - A system for collecting and managing vehicle-generated data from multiple vehicles are provided. The vehicle-generated data is pseudonymized by pseudonymized identifiers, and the pseudonymized vehicle-generated data is collected and managed by a neutral data server operated by an operator who is independent of vehicle manufacturers. Vehicle manufacturers can reestablish the link of the pseudonymized event data with the vehicle that had generated the event data and the vehicle driver. | 2021-07-29 |
20210232705 | METHOD AND SYSTEM FOR GENERATING SYNTHETICALLY ANONYMIZED DATA FOR A GIVEN TASK - A method and a system are disclosed for generating synthetically anonymized data, the method comprising providing first data to be anonymized; providing a data embedding comprising data features, wherein data features enable a representation of corresponding data, and wherein the data is representative of the first data; providing an identifier embedding comprising identifiable features, wherein the identifiable features enable an identification of the data and the first data; providing a task-specific embedding comprising task-specific features, wherein said task-specific features enables a disentanglement of different classes relevant to the given task; generating synthetically anonymized data, the generating comprising a generative process using samples comprising a first sampling from the data embedding which ensures that a corresponding first sample originates away from a projection of the data and the first data in the identifier embedding and a second sampling from the task-specific embedding which ensures that a corresponding second sample originates close to the task-specific features and wherein the generating further mixes the first sample and the second sample in a generative process. | 2021-07-29 |
20210232706 | GENERATING BEHAVIORAL PROFILES - Online consumption data may be secured by receiving data associated with first online interactions actually performed during a predetermined time period, generating, via a machine learning model for each of a plurality of different personas, data associated with second online interactions that simulate Internet traffic, selecting a plurality of the received data associated with the first online interactions that matches the generated data associated with the second online interactions of one or more of the personas, replacing the generated data associated with the second online interactions of the one or more personas with the selected data, and outputting the one or more personas with the replaced data. | 2021-07-29 |
20210232707 | Linking Blockchain Records to Identify Certification, Track Pedigree and Identify Obsolete Digital Content - A permissioned blockchain, using off-chain storage, provides advantages over blockchains that rely on consensus and/or store information within the blockchain. Advantages include enhanced viability, compactness, and the ability to register material with distribution limitations (e.g., military classified). Examples create an immutable public record of data signatures that confirm when data is intact, without distributing the data itself, so that widespread availability of the blockchain (beyond those privileged to see the data) advantageously increases the size of the community that is able to detect spoofing or forgery attempts. A permissioning entity limits submissions to manage blockchain growth, foreclosing problematic material that may risk long-term viability. Examples render blockchain operations resistant to advanced persistent threats (APTs), leverage digital signatures as additional trust elements for high-risk data, link records to track pedigree and enable identification of superseded (obsolete) data, and leverage out-of-band date proof to enable independent verification of integrity and no-later-than data-of-existence. | 2021-07-29 |
20210232708 | METHOD FOR PROTECTING ENCRYPTED CONTROL WORD, HARDWARE SECURITY MODULE, MAIN CHIP AND TERMINAL - Provided is a method for protecting an encrypted control word. The method includes: receiving a hardware security module entitlement management message and an encrypted control word transmitted from a main chip, where the hardware security module entitlement management message includes a key for decrypting the encrypted control word; decrypting, based on the hardware security module entitlement management message and a hardware security module root key stored in the hardware security module, the encrypted control word to obtain a control word; reencrypting the control word based on a re-encryption key stored in the hardware security module to obtain a reencrypted control word; and transmitting the reencrypted control word to the main chip, so that the main chip decrypts, based on a main chip entitlement management message transmitted from the front end, the reencrypted control word to obtain the control word. | 2021-07-29 |
20210232709 | RESERVING ONE OR MORE SECURITY MODULES FOR A SECURE GUEST - A security module, such as a cryptographic adapter, is reserved for a secure guest of a computing environment. The reserving includes binding one or more queues of the security module to the secure guest. The one or more queues are then managed based on one or more actions relating to the reservation. | 2021-07-29 |
20210232710 | Methodology for Forming a Resistive Element in a Superconducting Structure - A method of forming a superconducting structure is provided that includes forming a superconducting element in a first dielectric layer, forming a protective pad formed from a resistive material over at least a portion of the superconducting element, forming a second dielectric layer overlying the first dielectric layer, and etching an opening through the second dielectric layer to the protective pad, such that no portion of the superconducting element is exposed in the opening. A cleaning process is performed on the superconducting structure, and a contact material fill with a resistive material is performed to fill the opening and form a resistive element in contact with the superconducting element through the protective pad. | 2021-07-29 |
20210232711 | RFID INFORMATION PROCESSING - This disclosure relates to radio frequency identification (RFID)-based communications technologies. In one aspect, a radio-frequency-based communications apparatus includes an antenna, a near field communication (NFC) radio frequency module and an electronic product code (EPC) radio frequency module separately connected to the antenna, an NFC processing module connected to the NFC radio frequency module, and an EPC processing module connected to the EPC radio frequency module. The NFC radio frequency module and the NFC processing module are configured to process signals transmitted according to one or more predetermined NFC protocols. The EPC radio frequency module and the EPC processing module are configured to process signals transmitted according to one or more predetermined EPC protocols. | 2021-07-29 |
20210232712 | DETECTION AND REPAIR OF FAILED HARDWARE COMPONENTS - A portable handheld device receives from a central repository, information on a failed hardware component of a computational device, wherein the information includes an authentication code to permit access to the failed hardware component and a time window in which the failed hardware component is permitted to be accessed. The portable handheld device uses the authentication code to access the failed hardware component for repair or replacement during the time window. | 2021-07-29 |
20210232713 | Authentication System - In an authentication system, when an electrical component with a temporary ID recorded by a temporary ID assignment device is connected to a switching hub, a temporary authentication device performs temporary authentication based on switching hub information describing the switching hub to which the electrical component is connected, the temporary ID of the electrical component, and temporary authentication inquiry information. A main authentication device performs main authentication based on the switching hub information of the switching hub to which the electrical component with a formal ID recorded by the formal ID assignment device is connected, and the formal ID of the electrical component, and main authentication inquiry information. | 2021-07-29 |
20210232714 | SYSTEMS AND METHODS FOR MANAGING CONTENT - Systems, methods, and non-transitory computer readable media are configured to determine a likelihood of a user choosing to reveal a given content item when contents of the content item are obscured. The likelihood can be determined based at least in part on a trained machine learning model. An extent by which to obscure the content item based at least in part on the likelihood can be determined. Subsequently, an obscured version of the content item can be provided for display. The content item can be obscured based at least in part on the determined extent. | 2021-07-29 |
20210232715 | Security Module With Multiple Independent Physical and Virtual Lanes - A security module is disclosed. In embodiments, the security module includes a common host platform configured to co-host a plurality of certified functions via a plurality of interconnected hardware resources. The common host platform may be configured to host a first certified function independently certified via a first certifying authority, and a second certified function independently certified via a second certifying authority. The first certified function may be hosted on a first sub-set of dedicated hardware resources and a first sub-set of shared hardware resources. The second certified function may hosted on a second sub-set of dedicated hardware resources and the first sub-set of shared hardware resources including one or more hardware resources shared with the first certified function. | 2021-07-29 |
20210232716 | VARIATIONAL MODELING METHOD AND SYSTEM FOR EDITING OF GEOMETRIC OBJECTS - A method of automatically identifying a network of geometries is performed on a data processing system. The method includes receiving one or more geometries having all or part of a network of geometries; recognizing adjacent tangencies to automatically identify another geometry in the network, or to determine that each geometry is connected to its neighbor through adjacent tangencies; repeating the recognition step until all geometries forming the network of geometries have been determined; and labelling the identified network as a slotdog. | 2021-07-29 |
20210232717 | MEASUREMENT TABLES INCLUDING TARGET IDENTIFICATION INFORMATION INDICATING A MEASUREMENT TARGET - Methods for generating a measurement table including target identification information indicating a measurement target are disclosed herein. One method includes adding, by a processor, attribute information for a dimension value of a measurement target included in drawing data and a delimiter for identifying number information for the dimension value to the dimension value, adding the number information including a drawing sheet number and a dimension number for the measurement target to the delimiter, and generating a measurement table including target identification information indicating the measurement target corresponding to the drawing data and inspection standards based on dimension addition information. The attribute information is associated with the number information added to the delimiter and is based on the dimension value of the measurement target. Apparatus and systems that can perform the methods generating a measurement table including target identification information indicating the measurement target are also disclosed herein. | 2021-07-29 |
20210232718 | Method and system for human centered design implementation - An end-to-end platform that will incorporate all phases and several methods for conducting Human Centered Design (HCD). The phases included in the platform are: observation, ideation, rapid prototyping, user feedback, iterative improvements, and implementation. The modular, scalable, and extensible platform will include an integrated platform for designing digital and non-digital systems or products using Human Centered Design. | 2021-07-29 |
20210232719 | SYSTEM AND METHOD FOR GENERATING AND VISUALIZING AN INTERIOR DESIGN IN A THREE-DIMENSIONAL REPRESENTATION - The present disclosure provides systems and methods for generating an interior design pertaining to a floor plan and creating a three-dimensional (3D) representation of the interior design for achieving high quality interior decor for residential as well as commercial properties. An aspect of the present disclosure pertains to a system for generating and visualizing the interior design in the 3D representation that includes a two-dimensional image receive module to receive a two-dimensional input image of the floor plan, a shape determination module to determine shape of a defined space of the floor plan, an object position determination module to determine position of one or more objects in the defined space, an object placement module to place the one or more objects in the defined space, and a three-dimensional representation generation module to generate a 3D representation of the interior design pertaining to the floor plan. | 2021-07-29 |
20210232720 | SYSTEM AND METHOD OF BRIDGING 2D AND 3D ASSETS FOR PRODUCT VISUALIZATION AND MANUFACTURING - A product visualization and manufacturing system and method which bridges two-dimensional (2D) and three-dimensional (3D) technologies in order to quickly and effectively display the product. The system and methods are helpful for many different product types, but especially for custom-designed jewelry products. The 2D/3D bridging invention enables a user to generate a three-dimensional generic base model of a product, modify the three-dimensional generic base model using two-dimensional image manipulation, and display a three-dimensional customized base model of a customized product. Templates, material libraries, HDRI maps, and lighting schemes may be employed. | 2021-07-29 |
20210232721 | Systems and Methods for Utilizing a 3D CAD Point-Cloud to Automatically Create a Fluid Model - A multiple fluid model tool for utilizing a 3D CAD point-cloud to automatically create a fluid model is presented. For example, a system includes a modeling component, a machine learning component, and a three-dimensional design component. The modeling component generates a three-dimensional model of a mechanical device based on point cloud data indicative of information for a set of data values associated with a three-dimensional coordinate system. The machine learning component predicts one or more characteristics of the mechanical device based on input data and a machine learning process associated with the three-dimensional model. The three-dimensional design component that provides a three-dimensional design environment associated with the three-dimensional model. The three-dimensional design environment renders physics modeling data of the mechanical device based on the input data and the one or more characteristics of the mechanical device on the three-dimensional model. | 2021-07-29 |
20210232722 | METHOD FOR DESIGNING HIGH-RIGIDITY BLADE BASED ON STOCHASTIC ISOGEOMETRIC ANALYSIS - In a method for designing a high-rigidity blade based on stochastic isogeometric analysis, the models of stochastic fields of the material property and the external load of the blade are established based on manufacturing conditions and service environment of the blade; an optimization model of the blade is established according to high-rigidity design requirements of the blade and a constraint condition of lift-drag ratio, which is then solved. In the solution procedure, a stochastic isogeometric analysis method is used to calculate the stochastic displacement of the blade under the influence of the randomness of the material property and the external load, and the maximum lift-drag ratio of the blade airfoil is also calculated, based on which the fitness values of individuals in the current population are calculated, so that the high-rigidity design of the blade is realized in the premise of ensuring the lift-drag ratio. | 2021-07-29 |
20210232723 | NETWORK DESIGN EVALUATION METHOD, NETWORK DESIGN EVALUATION DEVICE, AND PROGRAM - An object is to provide a network design evaluation method, a network design evaluation apparatus, and a program with the ZDD algorithm for finding all edge-disjoint paths in a given graph G within a finite time. A network design evaluation method according to the present invention includes extracting all paths for each specified pair of vertices in a given graph in the frontier-based search, representing a set of paths having, as elements, the paths extracted for each pair of vertices in a ZDD, and performing a disjoint join operation for all the sets of paths represented in ZDDs, to thereby extract edge-disjoint paths. | 2021-07-29 |
20210232724 | Method and Apparatus for Specifying Locations for Objects, and Determining Routes for Connecting Mediums Between the Objects, in a Three-Dimensional Model of a Building - A method for defining a route for a connecting medium through a three-dimensional building, involving modeling the three-dimensional building as a two-dimensional array of panels, wherein any two panels in the array of panels are connected panels if a connecting medium can be directly routed from one panel to the other panel, a set of coordinates for each of one or more panels in the array of panels where a connecting medium can enter or exit the panel, and a union of the respective set of coordinates for each of the one or more connected panels in the array of panels where a connecting medium can be routed between the connected panels. The process selects one or more panels in the array through which to route the connecting medium based on the unions of the respective set of coordinates for each of the one or more connected panels in the array of panels. | 2021-07-29 |
20210232725 | SYSTEM AND METHOD FOR TESTING AN INTEGRATED MONITORING SYSTEM - Provided are a closed-loop system and a method for testing an intelligent alarm application of an integrated monitoring system. The system includes: a host computer and a slave computer, where the host computer and the slave computer perform downloading files and command interactions through an internal protocol, the host computer includes a visual signal configuration module, a scheduling protocol analysis and simulation module and an evaluation module, and the slave computer includes an intelligent electronic devices (IEDs) server simulation module. | 2021-07-29 |
20210232726 | DYNAMIC ASSET MANAGEMENT SYSTEM AND METHODS FOR GENERATING INTERACTIVE SIMULATIONS REPRESENTING ASSETS BASED ON AUTOMATICALLY GENERATED ASSET RECORDS - Methods and systems are provided for generating an interactive simulation representing one or more assets based on one or more asset records. Based on information from asset records stored at a database system of a cloud-based computing system, an asset simulator module, executed at a cloud-based computing system, can generate one or more simulated representations of the assets. A simulator application executed at the cloud-based computing system can augment the simulated representations of the assets with (at least) additional information from the asset records stored in the database system, and generate a user interface that presents an interactive simulation of the assets. The user interface can include the simulated representations of the assets with the additional information from the asset records stored in the database system. | 2021-07-29 |
20210232727 | FLEXIBLE METHODS FOR GENERATION OF GNSS NAVIGATION DATA - The disclosed technology teaches simulating new satellite messages for a GNSS simulation, providing a configuration file and programming script file, neither of which is pre-compiled into GNSS simulation code, that specify format for a message for a satellite and message format combination not yet operational or not yet compiled into the GNSS simulation code. Included is reading and applying the configuration file and running a script from the programming script file to generate navigation data for simulating positioning messages during the GNSS simulation and using the navigation data for simulating positioning signals during the GNSS simulation and testing of a GNSS receiver against the satellite and message format combination. The disclosed technology also teaches determining message format and values to use when simulating position signals by combining field format and field data values from a combination of the configuration files, almanac, ephemeris and related data, and the programming script files. | 2021-07-29 |
20210232728 | SIMILARITY CALCULATION DEVICE, SIMILARITY CALCULATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING PROGRAM - A similarity calculation device calculates a similarity between a first material and a second material and includes: a memory; and a processor configured to: create a conflict graph that is a graph that has a plurality of nodes made up of combinations of respective atoms that constitute the first material and respective atoms that constitute the second material, and an edge formed between two nodes among the plurality of nodes, and that has an edge between two nodes when the nodes are compared and are not identical to each other, and has no edge between two nodes when the nodes are compared and are identical to each other; search for a maximum independent set in the conflict graph by executing a ground state search using an annealing method; and compute the similarity between the first material and the second material based on the maximum independent set. | 2021-07-29 |
20210232729 | Systems and Methods to Define and Monitor a Scenario of Conditions - Systems and methods to define a scenario of conditions comprising the steps of defining at least one condition for at least one educational objective, the at least one condition being represented by a constraint and scheduling the conditions into a scenario of conditions. In some embodiments, the scheduling is performed by analyzing the constraints using constraint programming. In some embodiments, the constraints comprise mathematical or computational constraints representing a range of variables. Also disclosed are systems and methods to monitor a scenario of conditions. | 2021-07-29 |
20210232730 | EVALUATION OF AEROSPACE SYSTEMS - A computer implemented method for evaluating an aerospace system comprises steps of providing a model of the aerospace system, wherein the model comprises a hybrid system model having a state space, providing a temporal formula that corresponds to a desired sequence of partitions of the state space, and attempting to falsify the logical complement of the temporal formula with respect to the model. | 2021-07-29 |
20210232731 | SCALABLE SYSTEM AND ENGINE FOR FORECASTING WIND TURBINE FAILURE - An example method utilizing different pipelines of a prediction system, comprises receiving event and alarm data from event logs, failure data, and asset data from SCADA system(s), retrieve patterns of events, receiving historical sensor data from sensors of components of wind turbines, training a set of models to predict faults for each component using the patterns of events and historical sensor data, each model of a set having different observation time windows and lead time windows, evaluating each model of a set using standardized metrics, comparing evaluations of each model of a set to select a model with preferred lead time and accuracy, receive current sensor data from the sensors of the components, apply the selected model(s) to the current sensor data to generate a component failure prediction, compare the component failure prediction to a threshold, and generate an alert and report based on the comparison to the threshold. | 2021-07-29 |
20210232732 | Optimization of Prototype and Machine Design within a 3D Fluid Modeling Environment - Techniques that facilitate optimization of prototype and machine design within a three-dimensional fluid modeling environment are presented. For example, a system includes a modeling component, a machine learning component, and a graphical user interface component. The modeling component generates three-dimensional model of a mechanical device based on a library of stored data elements. The machine learning component predicts one or more characteristics of the mechanical device based on a first machine learning process associated with the three-dimensional model. The machine learning component also generates physics modeling data of the mechanical device based on the one or more characteristics of the mechanical device. The graphical user interface component provides, via a graphical user interface, a three-dimensional design environment associated with the three-dimensional model and a probabilistic simulation environment associated with optimization of the three-dimensional model. | 2021-07-29 |
20210232733 | SYSTEMS AND METHODS FOR COMPUTER SIMULATION OF DETAILED WAVES FOR LARGE-SCALE WATER SIMULATION - Embodiments of the present invention provide a novel method and discretization for animating water waves. The approaches disclosed combine the flexibility of a numerical approach to wave simulation with the stability and visual detail provided by a spectrum-based approach to provide Eulerian methods for simulating large-scale oceans with highly detailed wave features. A graphics processing unit stores a one-dimensional texture referred to as a wave profile buffer that stores pre-computed results at a number of discrete sample points for performing wave height evaluation. The water surface is rendered according to water height values computed using the wave profile, accounting for advection, spatial diffusion, angular diffusion, boundary reflections, and dissipation. | 2021-07-29 |
20210232734 | SYSTEM FOR THE GLOBAL SOLUTION OF AN EVENT-DEPENDENT MULTICRITERIA NON-CONVEX OPTIMIZATION PROBLEM - A system for solving an event-dependent multicriteria optimization problem of at least one cyber-physical system, comprising a control device for controlling the at least one cyber-physical system, the control device controlling the cyber-physical system in dependence on a list of prioritized objectives by solving at least one event-dependent suboptimization problem is characterized in that each objective from the list of prioritized objectives is captured as an objective function, each objective function consisting of at least two parts, a first part of which relates to directly capturing the objective and a second part of which describes a condition under which each result of one of the preceding objectives of each of the preceding suboptimization problems is substantially not negatively affected. | 2021-07-29 |
20210232735 | Simulation-Based Material Characterization - A system for performing simulation-based material characterization includes a computing platform having a hardware processor and a system memory storing a software code. The hardware processor executes the software code to obtain a result of a physical test performed on a material, selects a parameterized model of the material based on the obtained result, and performs a simulation of the physical test using the parameterized model to generate a simulated result. The hardware processor further executes the software code to compare the simulated result with the obtained result of the physical test on the material, and adjusts one or more parameter value(s) of the parameterized model, based on the comparison, to improve the simulated result, and predict, after adjusting the parameter value(s), one or more characteristics of the material based on the parameterized model. | 2021-07-29 |
20210232736 | INDIVIDUAL IMPEDANCE-BASED RADIO-FREQUENCY HEATING TEMPERATURE FIELD PREDICTION METHOD AND SYSTEM - The present application relates to the field of biomedical engineering. Disclosed are an individual impedance-based radio-frequency heating temperature field prediction method and system which greatly improve the rate and accuracy of temperature distribution prediction. The method of the present application comprises: creating a first region; obtaining a position of an ablation needle, and with the ablation needle as a center, creating a second region in the first region; keeping the electrical conductivity within the second region constant, and adjusting the electrical conductivity in the first region such that impedance between the ablation needle and an earth pole is consistent with real individual impedance actually measured by a treatment system; performing mesh division on a combination of the first region and the second region and performing coupling computation using a radio-frequency field model and a biological heat transfer model to obtain temperature field time-space information. | 2021-07-29 |
20210232737 | ANALYSIS DEVICE, ANALYSIS METHOD, AND RECORDING MEDIUM - An analysis device includes a parameter sample data calculation unit that calculates a plurality of pieces of sample data for parameters for a simulator, based on a temporarily set distribution for the parameters, the simulator receiving inputs of data of a first type and outputting data of a second type; a second type sample data acquisition unit that inputs, to the simulator, target data of the first type indicating a target value for the data of the first type and sample data for the parameters and obtains sample data of the second type for each of the plurality of pieces of sample data for the parameters; and a parameter value calculation unit that calculates a weight for each of the plurality of pieces of sample data for the parameters based on the difference between target data of the second type indicating a target value for the data of the second type and the calculated sample data of the second type and based on the relationship between a first distribution followed by the target data of the first type and a second distribution that is the distribution for data of the first type and indicating a region indicating a target value to be achieved, and calculates, using the calculated weight, a value for the parameters corresponding to the target data of the first type and the target data of the second type. | 2021-07-29 |
20210232738 | ANALYSIS DEVICE, ANALYSIS METHOD, AND RECORDING MEDIUM - An analysis device includes a parameter sample data calculation unit that calculates a plurality of pieces of sample data for parameters for a simulator; a second type sample data acquisition unit that inputs, to the simulator, target data of the first type and each of the plurality of pieces of sample data for the parameters and obtains sample data of the second type for each of the plurality of pieces of sample data; and a parameter value calculation unit that calculates a weight for each of the plurality of pieces of sample data based on the difference between target data of the second type and the calculated sample data of the second type and calculates, using the calculated weight, a value for the parameters corresponding to the target data of the first type and the target data of the second type. | 2021-07-29 |
20210232739 | METHOD FOR MODELING OF A SYSTEM BY MEANS OF A QUANTUM COMPUTER - For manufacturing-related reasons, the qubits of known quantum computers are not to be regarded as equivalent, but instead a standard quantum computer has not only high-performance qubits with long decoherence times and good fidelities of operation but also low-performance qubits with short decoherence times and poor fidelities of operation. The invention utilizes these by subdividing a system to be modeled with such a quantum computer into a bath part of low relevance and a cluster part of high relevance, wherein a rough description of the bath part is assigned to the low-performance qubits and an exact description of the cluster part is assigned to the high-performance qubits. | 2021-07-29 |
20210232740 | Design Plan Generation Device - An object of the present invention is to provide a design plan generation device that is capable of obtaining information such as a configuration and performance of a mechanical structure with respect to a design specification of nonsimilar input data, and reliability of a prediction result, shortening a design period, and generating a design plan having high reliability. The design plan generation device includes: an analysis process information acquisition unit configured to acquire analysis process information in which an analysis procedure for a mechanical structure to be designed is defined; an analysis condition information acquisition unit configured to acquire analysis condition information necessary for an analysis; an analysis control unit configured to generate sampling points in a design space, execute calculation based on the analysis process information under a calculation condition corresponding to each of the sampling points, and acquire the calculation conditions and calculation results; a machine learning unit configured to execute machine learning using the calculation conditions and the calculation results, and acquire a machine learning result; a requirement specification acquisition unit configured to acquire a requirement specification of the mechanical structure; a design plan generation unit configured to generate a design plan of the mechanical structure based on the requirement specification and the machine learning result; and a reliability calculation unit configured to analyze the design space of the design plan and calculate reliability of the design plan based on an analysis result. The reliability calculation unit is configured to calculate distances to the sampling points in the design space and a first average value of the distances, calculate differences between the design plan and ones of the sampling points having shortest distances from the requirement specification among the distances and a second average value of the differences, and calculate the reliability of the design plan based on the first average value and the second average value. | 2021-07-29 |
20210232741 | FLUID LEAKAGE DETECTION SYSTEM, FLUID LEAKAGE DETECTION DEVICE, AND LEARNING DEVICE - A fluid leakage detection system includes: multiple sensors, provided in a building such as a plant, that respectively detect values of detection target amounts at the installation positions of the sensors; and a fluid leakage detection device that detects leakage of a fluid in the building based on the values of detection target amounts detected by the multiple sensors. The fluid leakage detection device includes: an actual measured value acquirer that acquires the values of detection target amounts detected by the multiple sensors; and a leakage state judgement unit that judges a leakage state of the fluid in the building based on distributions of the values of detection target amounts acquired by the actual measured value acquirer. | 2021-07-29 |
20210232742 | DETECTING TIMING VIOLATIONS IN EMULATION USING FIELD PROGRAMMABLE GATE ARRAY (FPGA) REPROGRAMMING - A method of detecting a timing violation between a first sequential element and a second sequential element in a circuit design being emulated in a hardware emulation system includes, in part, determining a timing relationship between first and second clocks applied respectively to the first sequential element and the second sequential element, reconfiguring a combinational logic disposed between the first sequential element and the second sequential element as one or more buffers, setting a delay across the one or more buffers to one or more clock cycles of the hardware emulation system based on the timing relationship, reprogramming the first and second clocks in accordance with the delay, and detecting a timing violation if a change in an output of the first flip-flop is not stored in the second flip-flop within the delay. | 2021-07-29 |
20210232743 | CIRCUIT TESTING AND MANUFACTURE USING MULTIPLE TIMING LIBRARIES - A method and system for manufacturing a circuit is disclosed. In some embodiments, the system includes: at least one processor configured to: generate a first timing library for a first set of circuit elements for a first set of input parameters based on device characteristics for each of the circuit elements in the first set of circuit elements, and storing the determined device characteristics in a database; and generating a second timing library for a second set of circuit elements for a second set of input parameters based on device characteristics previously stored in the database for a first subset of the second set of circuit elements and determining device characteristics for a second subset of the second set of circuit elements using one of an aging simulation or a stress simulation; and a circuit generation system, coupled to the at least one processor, the circuit generation system configured to form a circuit on a substrate, wherein the circuit includes at least one of the first set of circuit elements or the second set of circuit elements. | 2021-07-29 |
20210232744 | LOGIC DRIVE BASED ON STANDARD COMMODITY FPGA IC CHIPS - A chip package used as a logic drive, includes: multiple semiconductor chips, a polymer layer horizontally between the semiconductor chips; multiple metal layers over the semiconductor chips and polymer layer, wherein the metal layers are connected to the semiconductor chips and extend across edges of the semiconductor chips, wherein one of the metal layers has a thickness between 0.5 and 5 micrometers and a trace width between 0.5 and 5 micrometers; multiple dielectric layers each between neighboring two of the metal layers and over the semiconductor chips and polymer layer, wherein the dielectric layers extend across the edges of the semiconductor chips, wherein one of the dielectric layers has a thickness between 0.5 and 5 micrometers; and multiple metal bumps on a top one of the metal layers, wherein one of the semiconductor chips is a FPGA IC chip, and another one of the semiconductor chips is a NVMIC chip. | 2021-07-29 |
20210232745 | METHOD AND SYSTEM FOR SEMICONDUCTOR WAFER DEFECT REVIEW - A semiconductor wafer defect detection system captures test images of a semiconductor wafer. The system analyzes the test images with an analysis model trained with a machine learning process. The analysis model generates simulated integrated circuit layouts based on the test images. The system detects defects in the semiconductor wafer by comparing the simulated integrated circuit layouts to reference integrated circuit layouts. | 2021-07-29 |
20210232746 | SIMULATION METHOD FOR CHARACTERISTICS OF TRANSISTOR, SIMULATION METHOD FOR CHARACTERISTICS OF ELECTRONIC CIRCUIT INCLUDING TRANSISTOR, AND NONTRANSITORY RECORDING MEDIUM THAT STORES SIMULATION PROGRAM FOR CHARACTERISTICS OF TRANSISTOR - A simulation method includes a process of calculating a transient charge density q | 2021-07-29 |
20210232747 | Method and Structure for Mandrel and Spacer Patterning - A method includes forming a first mandrel pattern and a second mandrel pattern. The first mandrel pattern includes at least first and second mandrels for a mandrel-spacer double patterning process. The second mandrel pattern includes at least a third mandrel inserted between the first and second mandrels. The first mandrel pattern and the second mandrel pattern include a same material. The first and second mandrels are merged together with the third mandrel to form a single pattern. | 2021-07-29 |
20210232748 | METHOD FOR OPTIMIZING A PATTERNING DEVICE PATTERN - A method for optimizing a patterning device pattern, the method including obtaining an initial design pattern having a plurality of polygons, causing at least some of the polygons to be effectively connected with each other, placing evaluation features outside the boundaries of the polygons, and creating a patterning device pattern spanning across the connected polygons based on the evaluation features. | 2021-07-29 |
20210232749 | TIMING DRIVEN CELL SWAPPING - A method for cell swapping is provided. A location for swapping a first cell is determined. One or more legal positions for cell placement are determined at the location. A plurality of cells is determined for of the plurality of legal positions. A second cell from the plurality of cells is determined based on timing information associated with each of the plurality. The first cell is swapped with the second cell. | 2021-07-29 |
20210232750 | SEMANTIC NAVIGATION OF CONTENT DOCUMENTS - A computer-implemented method may be used for semantic navigation of content. The method may include determining a first content complexity level for a user, and presenting a first content to a user device operated by the user. The first content may be presented at the first content complexity level of the user. Additionally, the method may include receiving a navigation command from the user on a portion of the first content via the user device; and determining a second content at a second content complexity level based on the navigation command. The second content may convey the same information as the first content. Additionally, the method may include replacing the first content with the second content on the user device. The second content may be presented at the second content complexity level, and the second content complexity level may be different than the first content complexity level. | 2021-07-29 |
20210232751 | SENTENCE GENERATION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM - A sentence generation method is provided for an electronic device. The method includes obtaining an input sequence, encoding the input sequence to obtain a sentence eigenvector, decoding the sentence eigenvector to obtain a first predetermined quantity of candidate sentence sequences, clustering the first predetermined quantity of candidate sentence sequences to obtain sentence sequence sets of at least two types, screening out a second predetermined quantity of candidate sentence sequences from the sentence sequence sets of at least two types, the second predetermined quantity of candidate sentence sequences including at least two sentence feature types, and determining an output sequence corresponding to the input sequence according to the second predetermined quantity of candidate sentence sequences. | 2021-07-29 |
20210232752 | TECHNIQUES FOR VIEW CAPTURE AND STORAGE FOR MOBILE APPLICATIONS - Techniques can capture, store, and regenerate a view of content in applications (e.g., native applications) on devices (e.g., a mobile device). A capture management system can produce compact data storage of views of content in an application on a device and the efficient search thereof of views of content provided in the application. The views of content can be translated into a transportable data layer, such as HTML, and captured using delta encoding to identify changes and modifications in content accessed in any application at a device. A capture management system can accurately and efficiently capture events displayed for an application at a device and send the events to a server-side system, which can combine the events to reassemble the events. A user interface and user interaction events on an application at a mobile device can be reassembled for the purpose of playback and analysis of interactions with the application. | 2021-07-29 |
20210232753 | ML USING N-GRAM INDUCED INPUT REPRESENTATION - Generally discussed herein are devices, systems, and methods for generating an embedding that is both local string dependent and global string dependent. The generated embedding can improve machine learning (ML) model performance. A method can include converting a string of words to a series of tokens, generating a local string-dependent embedding of each token of the series of tokens, generating a global string-dependent embedding of each token of the series of tokens, combining the local string dependent embedding the global string dependent embedding to generate an n-gram induced embedding of each token of the series of tokens, obtaining a masked language model (MLM) previously trained to generate a masked word prediction, and executing the MLM based on the n-gram induced embedding of each token to generate the masked word prediction. | 2021-07-29 |
20210232754 | MOBILE TERMINAL DEVICE, SLIDE INFORMATION MANAGING SYSTEM, AND A CONTROL METHOD OF MOBILE TERMINAL - A mobile terminal device | 2021-07-29 |