31st week of 2022 patent applcation highlights part 49 |
Patent application number | Title | Published |
20220245238 | Trusted Execution Environment to Provide Attestation of Code Execution Result - A system comprising at least one secure server computer configured to execute a predefined code sequence in a transactional fashion on input data to produce output data, and configured to provide a signed response packet that proves that the code sequence (unmodified since its installation) was executed on the input data and resulted in the output data. In an embodiment, the code and its secure isolated execution environment on the secure server computer system may be transactional. In an embodiment, the customer critical code and the secure isolated execution environment may be instantiated each time the application (executing on another computer) transmits a request with input data. Upon completion of the transaction, the secure server computer may remove the customer critical code and the secure execution environment from system memory, deleting its context and any other data related to the environment. | 2022-08-04 |
20220245239 | CYPHERGENICS-BASED DECODING AND ENCODING OF PROGRAM DATA - A method for executing computer programs in a trusted execution environment of a device is disclosed. The method includes retrieving a genomic differentiation object corresponding a computer program; modifying the genomic differentiation object based on genomic regulation instructions (GRI) to obtain a modified genomic differentiation object; and executing a first executable instruction of the computer program. Executing the first executable instruction includes: retrieving first encoded data that is input to the first executable instruction; extracting a sequence from metadata associated with the encoded data; generating a first genomic engagement factor (GEF) based on the first sequence, the GRI and, and the modified genomic differentiation object; decoding the first encoded data based on the first GEF to obtain first decoded data; and executing the first executable instruction using the first decoded data. | 2022-08-04 |
20220245240 | SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR - A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected. | 2022-08-04 |
20220245241 | Compressibility Metric-based Detection of a Ransomware Threat to a Storage System - An illustrative method includes a data protection system determining a first compressibility metric associated with write traffic processed by a storage system, the first compressibility metric indicating an amount of storage space saved if the write traffic is compressed; determining a second compressibility metric associated with read traffic processed by a storage system, the second compressibility metric indicating an amount of storage space saved if the read traffic is compressed; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and performing, based on the determining that the storage system is possibly being targeted by the security threat, a remedial action with respect to the storage system. | 2022-08-04 |
20220245242 | DETECTION OF COMPROMISED STORAGE DEVICE FIRMWARE - An apparatus, system, and method for detecting compromised firmware in a non-volatile storage device. A control bus of a non-volatile storage device is monitored. The non-volatile storage device includes a processor and electronic components coupled to the control bus. Signal traffic on the control bus is analyzed for events and/or triggers related to storage operations initiated on the control bus by the processor. Storage operations include one or more commands directed to at least one of the electronic components. If the latency for the storage operation satisfies an alert threshold a host is notified of compromised firmware. | 2022-08-04 |
20220245243 | SECURING MACHINE LEARNING MODELS AGAINST ADVERSARIAL SAMPLES THROUGH MODEL POISONING - A method for securing a genuine machine learning model against adversarial samples includes receiving a sample, as well as receiving a classification of the sample using the genuine machine learning model or classifying the sample using the genuine machine learning model. The sample is classified using a plurality of backdoored models, which are each a backdoored version of the genuine machine learning model. The classification of the sample using the genuine machine learning model is compared to each of the classifications of the sample using the backdoored models to determine a number of the backdoored models outputting a different class than the genuine machine learning model. The number of the backdoored models outputting a different class than the genuine machine learning model is compared against a predetermined threshold so as to determine whether the sample is an adversarial sample. | 2022-08-04 |
20220245244 | SECURE PERIPHERAL COMPONENT ACCESS - According to an embodiment, a device comprises a non-maskable interrupt (NMI) signal path, a processor, and a peripheral component. The peripheral component may comprise secret data, such as a secret key. The processor may perform a preconfigured NMI interrupt service routine (ISR), in response to detecting a preconfigured signal in the NMI signal path. Access to at least a part of the peripheral component may be enabled in response to detecting the preconfigured signal in the NMI signal path. Thus, the processor may be able to access the secret data, for example, when the processor is running the NMI ISR. A device, a method, and a computer program are described. | 2022-08-04 |
20220245245 | UNMASKING RANSOMWARE ATTACKS - Techniques unmasking ransomware attacks are disclosed. In some embodiments, a computer system performs operations comprising: generating a first prediction that a file system comprising a plurality of files has been attacked by ransomware based on snapshot metadata of the file system using a snapshot-level machine learning prediction model, the snapshot metadata comprising a plurality of file change data indicating a plurality of file change events that have been performed on the file system; in response to the first prediction, generating a classification for each one of the files based on the file change data using a file-level machine learning prediction model, the classification indicating whether the files have been targeted by the ransomware for encryption; determining that one or more files have been targeted by the ransomware based on the classification; and displaying the classification for the one or more files on a computing device of a user. | 2022-08-04 |
20220245246 | INTEGRITY VERIFICATION FOR A SOFTWARE STACK OR PART OF A SOFTWARE STACK - The present disclosure relates to a method for integrity verification of a software stack or part of a software stack resident on a host machine. A management entity generates a measurement log for a disk image associated with the software stack or the part of a software stack. A verifier entity retrieves the generated measurement log and compares the generated measurement log with a reference measurement of a verification profile previously assigned by the verifier entity to the software stack or the part of a software stack to verify the software stack or the part of a software stack. | 2022-08-04 |
20220245247 | EXCEPTION HANDLERS IN A SANDBOX ENVIRONMENT FOR MALWARE DETECTION - An anti-malware application can emulate a suspicious program in a sandbox environment and retrieve any exception handlers the suspicious program attempts to register with the operation system. When the suspicious program triggers an exception, the anti-malware application can save a current context of the suspicious program being emulated. To emulate the handling of the exception, the anti-malware application can validate an exception handler chain including one or more exception handlers added by the suspicious program. The anti-malware application can then select and emulate an exception handler based on the saved context of the suspicious program at the time the exception was triggered. If the first exception handler is successful at resolving the exception, the anti-malware application can then save an updated post-exception context and continue emulation of the suspicious program based on the result of the first exception handler. | 2022-08-04 |
20220245248 | Machine learning-based malware detection system and method - Disclosed is a computer implemented method for malware detection that analyses a file on a per packet basis. The method receives a packet of one or more packets associated a file, and converting a binary content associated with the packet into a digital representation and tokenizing plain text content associated with the packet. The method extracts one or more n-gram features, an entropy feature, and a domain feature from the converted content of the packet and applies a trained machine learning model to the one or more features extracted from the packet. The output of the machine learning method is a probability of maliciousness associated with the received packet. If the probability of maliciousness is above a threshold value, the method determines that the file associated with the received packet is malicious. | 2022-08-04 |
20220245249 | SPECIFIC FILE DETECTION BAKED INTO MACHINE LEARNING PIPELINES - A set of features including a first feature and a second feature is received at a server. A subset of the set of features is determined for use in generating a model usable by a device to locally make a malware classification decision. The device has reduced computing resources as compared to computing resources of the server. The subset of the set of features is used to generate the model. The generated model includes the first feature and does not include the second feature. A determination is made, at a time subsequent to the generation of the model, that an updated model should be deployed to the device. An updated model is generated. | 2022-08-04 |
20220245250 | COMPUTER RECOVERY SYSTEM - A computer-implemented method can be used for restoring a computer system following an infection event. The computer system can have a plurality of machines, in which a plurality of back-up copies are associated with each one of the plurality of machines, and in which each of the plurality of back-up copies associated with a particular machine is a different version back-up. The method can include searching the plurality of back-up copies to identify one or more clean-back-up copies that do not comprise a signature of the infection event and restoring one or more of the plurality of machines using a respective clean-back-up copy. | 2022-08-04 |
20220245251 | Secure in-service firmware update - A computer system includes a volatile memory and at least one processor. The volatile memory includes a protected storage segment (PSS) configured to store firmware-authentication program code for authenticating firmware of the computer system. The at least one processor is configured to receive a trigger to switch to a given version of the firmware, to obtain, in response to the trigger, a privilege to access the PSS, to authenticate the given version of the firmware by executing the firmware-authentication program code from the PSS, to switch to the given version of the firmware upon successfully authenticating the given version, and to take an alternative action upon failing to authenticate the given version. | 2022-08-04 |
20220245252 | SEAMLESS FIRMWARE UPDATE MECHANISM - An apparatus is disclosed. The apparatus comprises one or more processors to receive a request to perform a firmware update at a device, prepare a second trusted compute base (TCB) layer for the firmware update, generate a first compound device identifier (CDI) associated with a first TCB layer to be used by the second TCB layer to attest an operational state of the first TCB layer prior to applying the update and generate a second CDI associated with the first TCB layer to be used by the second TCB layer to attest the operational state of the first layer after the update has been applied and perform the firmware update of the second TCB layer. | 2022-08-04 |
20220245253 | SECURE ELEMENT AND METHOD FOR STARTING AN APPLICATION - The present description concerns a method of starting a first application configured to be implemented by at least one low-level operating system of a secure element, including the verification of at least a first piece of information updated after each operation of resetting of the secure element, the first piece of information being associated with the at least one low-level operating system. | 2022-08-04 |
20220245254 | CONTROL APPARATUS FOR VEHICLE - A control apparatus for a vehicle includes a processor, a storage, and a first determining unit. The processor is configured to control a control target mounted in the vehicle. The storage is configured to contain unauthorized entry data. The unauthorized entry data indicates a presence of an unauthorized entry into the vehicle. The first determining unit is configured to make a determination on a necessity of a secure boot process upon activation of the processor, on the basis of the unauthorized entry data. | 2022-08-04 |
20220245255 | SYSTEMS AND METHODS FOR PROCESSOR VIRTUALIZATION - A system for secure processor virtualization including a secure initialization memory and one or more processors coupled to the secure initialization memory is disclosed. The secure initialization memory includes initialization instructions for launching a security runtime environment before operating systems and cryptographic keying for security handoffs. The processors are configured to retrieve the initialization instructions from the secure initialization memory at startup, execute the initialization instructions to launch the security runtime environment and retrieve at least a portion of the cryptographic keying, and generate specific keying for chip-level resources the processors by combining instruction sets of the chip-level resources and the cryptographic keying. The processors are further configured to initialize a plurality of isolated enclaves on the security runtime environment and pin chip-level resources to the plurality of enclaves according to the specific keying and by establishing exclusive cryptographic links between the chip-level resources and the plurality of enclaves. | 2022-08-04 |
20220245256 | System and Method for Attributing User Behavior from Multiple Technical Telemetry Sources - Systems and methods for attributing user behavior from multiple technical telemetry sources are provided. An example method includes determining that the user has logged into the computing device, in response of the determination, collecting log data from a plurality of telemetry sources associated with the computing device, extracting, from the log data, activity data concerning activities of the computing device, analyzing the activity data to determine that the activity data are attributed to the user, generating, based on the activity data, behavior attributes of the user, associating the behavior attributes with a unique identifier of the computing device, and estimating security integrity of the computing device based on a comparison of the behavior attributes to reference behavior attributes. The reference behavior attributes include further behavior attributes determined using log data of at least one further computing device associated with the user. | 2022-08-04 |
20220245257 | DETECTING SECOND-ORDER SECURITY VULNERABILITIES IN LIBRARIES - A method for executing a second-order taint analysis on library code may include generating, by executing a first-order taint analysis on the library code starting at a sink, a first execution path from a load instruction to the sink. The load instruction may perform: reading a first value using a first global identifier. The method may further include determining a store instruction by matching the load instruction and the store instruction. The store instruction may perform: writing a second value using a second global identifier. The method may further include, generating a second execution path from the store instruction to the load instruction, generating, by executing the first-order taint analysis on the library code starting at the store instruction, a third execution path from an entry point to the store instruction, and forming a potential second-order taint flow by joining the first, second, and third execution paths. | 2022-08-04 |
20220245258 | VULNERABILITY SCANNING - Aspects of vulnerability scanning are disclosed. In one example, configuration and context information of a first device for which vulnerability scanning is to be performed is obtained. The configuration information includes telemetry data of the first device. A second device is provisioned based on the configuration information to create a cloned first device. The vulnerability scanning is performed on the cloned first device based on the context information to obtain a scan report. | 2022-08-04 |
20220245259 | METHOD FOR EVALUATING RISK OF DATA LEAKAGE IN APPLICATION, RECORDING MEDIUM AND DEVICE FOR PERFORMING THE METHOD - A method for evaluating the risk of data leakage in an application includes the steps of: extracting a DEX (Dalvik Executable) file and a so (Shared Object) file by decompressing an APK file of a mobile application; extracting DEX code information from the DEX file by parsing the DEX file; translating a content of the so file into IR (Intermediate Representation); extracting IR code information from the translated IR; generating a call-reference structure between the DEX file and the so file by processing the extracted DEX code information and the extracted IR code information; and outputting weakness information according to a risk designated in advance based on the generated call-reference structure. Accordingly, it is possible to extend the call-reference coverage of an android application. | 2022-08-04 |
20220245260 | METHOD FOR CHECKING THE SECURITY OF A TECHNICAL UNIT - Various embodiments of the present disclosure are directed to methods for checking the security of a technical unit, wherein at least one first plausible model variant is determined. In one example embodiment, the method includes the following steps carried out on a test computer system: assigning known vulnerabilities to components of the model variants; defining an attack aim; creating at least one attack model, based on the attack aim, for each model variant; weighting the nodes of the attack model with respect to at least one evaluation variable; determining an evaluation of at least one test vector of the attack model with respect to the evaluation variable; determining a security value as the pessimal value of all evaluations; and issuing a security confirmation if the security value corresponds to a security criterion. | 2022-08-04 |
20220245261 | PARALLEL TOKENIZATION OF DATE AND TIME INFORMATION IN A DISTRIBUTED NETWORK ENVIRONMENT - Data in various formats can be protected in a distributed tokenization environment. Examples of such formats include date and time data, decimal data, and floating point data. Such data can tokenized by a security device that instantiates a number of tokenization pipelines for parallel tokenization of the data. Characteristics of such data can be used to tokenize the data. For instance, token tables specific to the data format can be used to tokenized the data. Likewise, a type, order, or configuration of the operations within each tokenization pipeline can be selected based on the data format or characteristics of the data format. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The tokenization pipeline outputs are combined, producing tokenized data, which can be provided to a remote system for storage or processing. | 2022-08-04 |
20220245262 | SECURE INFORMATION STORAGE, TRANSFER AND COMPUTING - The present disclosure relates generally to homomorphic encryption, and specifically to using homomorphic encryption for secure information storage, transfer and computing. Described are systems for governing information transfers and systems for secure financial processing that include a hardware security module configured to generate a public key and a corresponding private key, homomorphically re-encrypt a set of confidential information into an encrypted information package, and make the encrypted information package available to be communicated. | 2022-08-04 |
20220245263 | Smart Read-Only Mode for Web Browsing - A method for secure browsing, including: providing a system for protecting a user browsing an internet website; rendering a requested web page of the website into read-only mode; and changing selected input fields on the requested web page into write mode. A method for secure browsing, including: providing a system for protecting a user browsing an internet website; and rendering selected input field on a web page of the website into read-only mode. | 2022-08-04 |
20220245264 | SECURE TRANSFER OF DATA BETWEEN PROGRAMS EXECUTING ON THE SAME END-USER DEVICE - It is often necessary to securely transfer data, such as authenticators or authorization tokens, between programs running on the same end-user device. The teachings hereof enable the pairing of two programs executing on a given end-user device and then the transfer of data from one program to the other. In an embodiment, a first program connects to a server and sends encrypted data elements. A second program intercepts the connection and/or the encrypted data elements. The second program tunnels the encrypted data elements (which remain opaque to the second program at this point) to a server, using an encapsulating protocol. This enables the server to receive the data elements sent by the first program, decrypt them, and provide them to the second program via return message using control fields of the encapsulating protocol. Once set up, the tunneling arrangement enables bidirectional data transfer. | 2022-08-04 |
20220245265 | CONTENT PROTECTING COLLABORATION BOARD - A marking onto a collaboration board, located in a first location, is detected. The marking includes the creation of one or more content elements on the collaboration board. Responsive to detecting the markings one or more content elements on the collaboration board are analyzed. A first content element of the one or more content elements is classified based on analyzing the one or more content elements. The first content element is classified as a first privileged content element. The first location of the collaboration board is scanned. The scanning is based on the classifying of the first privileged content element. An unauthorized person is identified based on scanning the first location. The unauthorized person is not permitted to view the collaboration board. A security response is performed on the collaboration board regarding the one or more content elements. The security response is performed responsive to identifying the unauthorized person. | 2022-08-04 |
20220245266 | SYSTEM AND METHOD FOR PROVIDING A SECURITY POLICY - Disclosed herein are systems and methods for providing a security policy for an electronic control unit (ECU) implementing an Autosar Adaptive Platform (AAP) standard. In one aspect, an exemplary method comprises maintaining a list of allowed interactions, the allowed interactions being between control applications and a basic component, the basic component including at least a program element defined by the AAP standard. In one aspect, when a request for a verdict as to whether or not access for an interaction of a first control application with the basic component is received from an operating system (OS) kernel, the method comprises performing a search in the list of allowed interactions, and when the interaction for which the request is received is found in the list, the method comprises providing a verdict to the OS kernel allowing the interaction. | 2022-08-04 |
20220245267 | GENERATING USER-SPECIFIC ENTITY INTERLINKAGES OF EXTRACTED ENTERPRISE TOPIC DESCRIPTIONS - An entity interlinkage platform may receive a corpus of enterprise documents and user profile data that corresponds to an individual user. The entity interlinkage platform utilizes topic extraction models to extract entities from the corpus and further utilizes the user profile data to generate a knowledge graph that includes interlinkages between the extracted entities. The entity interlinkage platform may identify a multitude of topic descriptions and corresponding topic terms from source documents that an access control list permits an individual user to access. Then, based on the user profile data, the entity interlinkage platform may generate a knowledge graph that is tailored for the individual user's specific purposes within the enterprise. For example, the knowledge graph may be generated based on knowledge graph preferences (which may be defined by the individual user) indicating preferred topic description types and/or levels of detail in association with specific topics and/or categories of topics. | 2022-08-04 |
20220245268 | PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES - Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation. | 2022-08-04 |
20220245269 | DATA STORAGE SYSTEM WITH DECENTRALIZED POLICY ALTERATION - A data storage system may track data access operations to a memory with a distribution module and translate the tracked data access operations into at least one activity with the distribution module. The distribution module generates a decentralization strategy and then creates a first visual representation of the at least one activity and a second visual representation of the at least one activity with the distribution module. The respective visual representations are distributed to a first user and a second user with the first user and second user respectively selected by the decentralization strategy for analysis for a purpose assigned by the decentralization strategy. The distribution module grants the first user a first temporary permission to alter at least one operational policy of the memory in response to a result of the first purpose. | 2022-08-04 |
20220245270 | Personal Health Record System and Method using Patient Right of Access - Methods and systems for managing access to patient healthcare data, using a patient right of access called for in relevant industry law, simplifies processes of digitally identifying, granting, querying, extracting, and transforming a personal health record (PHR). An identity of the patient, an execution of a right of access form by the patient, and presence of the right of access form within memory of the system, are verified by the system. A query for healthcare data pertaining to the patient may be relayed by the system from a querying entity to a possessing entity in possession of the requested healthcare data. The requested data may be received by the system and stored within a database associated with the patient, creating or augmenting a PHR for the patient. The requested data may be anonymized by the system for a researcher studying a pool of patients. | 2022-08-04 |
20220245271 | SYSTEM FOR EFFICIENT MANAGEMENT OF INVALID ACCESS TOKENS - A client system comprises processing circuitry configured to receive, from a user device, a first access request comprising a first instruction to access a protected resource; transmit a token request for an access token to be used for accessing the protected resource; and receive an access token in response to the token request, the access token having a corresponding time to expire. The client system comprises a token storage unit configured to store the access token. The processing circuitry is further configured to receive a rejection message indicating that the access token is not valid for receiving the protected resource; and store, at the token storage unit, an invalidation flag associated with the stored access token, in response to receiving the rejection message. | 2022-08-04 |
20220245272 | SYSTEMS AND METHODS FOR PROVIDING DATA LOSS PREVENTION VIA AN EMBEDDED BROWSER - Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application. | 2022-08-04 |
20220245273 | SHARING CLOUD DATA WITH AN APPLICATION - Security credentials associated with a first account maintained by a database system are authenticated. Based on authenticating the security credentials, a user interface element is provided to enable sharing of customer data associated with the first account with an application. A request to share customer data with the application is received. Based on the request, third-party data that is accessible by the first account is identified. The third-party data corresponds to a second account maintained by the database system. The second account corresponds to a third-party data provider. The application is enabled to access cloud data associated with the first account based on the request. The cloud data comprises the customer data and the third-party data. | 2022-08-04 |
20220245274 | SYSTEM AND METHOD FOR DETECTION OF PATTERNS IN APPLICATION FOR APPLICATION TRANSFORMATION AND APPLYING THOSE PATTERNS FOR AUTOMATED APPLICATION TRANSFORMATION - Disclosed are a system and a method for detection of patterns in application for application transformation and applying those patterns for automated application transformation. The system and the method enable user to identify patterns in transformation of the application from existing infrastructure/machines of organization. The transformed application thus created are easily exported and/or installed on multiple computing devices having different system architecture and successful execution of the application containerized within the container is facilitated. The system and the method reduce dependency on individual skills and ability. The system and the method bring consistency and efficiency in application transformation and increase performance of existing techniques that effect application transformation. | 2022-08-04 |
20220245275 | CONTEXTUAL DATA LOSS PREVENTION FOR A GROUP-BASED COMMUNICATION SYSTEM - A system, method, and computer-readable media for providing contextual data loss prevention (DLP) within a group-based communication system. At least a portion of a DLP policy may be suspended within a DLP engine based on a context for which a user input is to be displayed. Accordingly, the user input may be displayed without interference from the DLP engine. | 2022-08-04 |
20220245276 | OPEN ACCESS TOKEN FOR DETERMINING THAT FILE IS ACCESSIBLE TO EVERYONE - Techniques for implementing proactive data security operations for files using an analysis of access permission levels for the files are disclosed. In some embodiments, a computer system performs operations comprising: determining that data of a file includes sensitive information based on an analysis of the data using a data classification model; determining that access to the file is open using an access classification model; and based on the determination that the data of the file includes sensitive information and the determination that the access to the file is open, causing a notification to be displayed on a computing device of a user, the notification comprising an indication that the file includes sensitive information and that access to the file is open. | 2022-08-04 |
20220245277 | DYNAMIC ACCESS CONTROL FOR SENSITIVE INFORMATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media for containment of sensitive data within a communication platform. The system displays a communication interface including a first input section for receiving an input message associated with a sending user account, and a display section for displaying message information received by the sending user account from other user accounts. The system determines a requirement to input sensitive information. The system then displays a sensitive data user interface including second input section for receiving a sensitive message, and an interface control for setting an expiration time value for the sensitive message. | 2022-08-04 |
20220245278 | DETECTING AND PREVENTING STORAGE OF UNSOLICITED SENSITIVE PERSONAL INFORMATION - A sensitive personal information detection and prevention system can receive a text string based on a user input into a field of a graphical user interface associated with a server. The system can, prior to storage of the text string by the server device, determine whether the text string comprises sensitive personal information, wherein the determining can comprise referring to a configurable map that can be updated. The system can, in response to determining that the text string comprises the sensitive personal information, prevent the storage of the text string by the server. It can facilitate providing a message for display on the graphical user interface comprising an indication that the text string comprises the sensitive personal information, and an instruction to re-submit the text string without the sensitive personal information, or a notification that the sensitive personal information has been masked. | 2022-08-04 |
20220245279 | Private and Non-Private Tasks in Augmented Reality Systems - Method, system and product for performing private and non-private tasks in Augmented Reality (AR) systems. A privacy policy of a user using an AR device is obtained. A frame sensor is utilized to obtain frames for processing. An overlay display for the frame is generated. The overlay display is generated based on an execution of a non-private task on a non-trusted device and based on an execution of a private task on a trusted device. The private task and the non-private task are determined based on the privacy policy. The overlay display is displayed by an AR device. | 2022-08-04 |
20220245280 | Gracefully Handling Endpoint Feedback When Starting to Monitor - A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed. | 2022-08-04 |
20220245281 | Method and Arrangement for Providing Data from an Industrial Automation Arrangement to an External Arrangement - A method and arrangement for providing data from an industrial automation arrangement to an external application operated in a data cloud and arranged outside a first data network, where an industrial Edge device processes raw data from the data source and makes the processed data available to the external application, the external application transmits a work order to the gateway component, the work order is checked by the gateway component, the raw data are captured and processed according to the work order, and the processed, abstracted and/or anonymized data are provided to the external application or a destination defined in the work order, such that an external user can automatically control access and hence use the data without accessing the underlying raw data because the level of data access is automatically negotiated and produced between the components involved (data source, gateway component) while taking into account requirements and rules. | 2022-08-04 |
20220245282 | METHODS AND APPARATUSES FOR IDENTIFYING PRIVACY-SENSITIVE USERS IN RECOMMENDER SYSTEMS - A privacy system includes a computing device configured to obtain user transactional data characterizing at least one transaction of a user on an ecommerce marketplace and to determine a privacy vulnerability score of the user by comparing the transactional data to a user vulnerability distribution. The computing device is also configured to send the privacy vulnerability score to a personalization engine. | 2022-08-04 |
20220245283 | INTELLIGENT DETECTION OF SENSITIVE DATA WITHIN A COMMUNICATION PLATFORM - Methods, systems, and apparatus, including computer programs encoded on computer storage media provide for the intelligent detection of sensitive information within a communication platform. The system displays a communication interface including a first input section for receiving an input message associated with a sending user account, and a display section for displaying message information received by the sending user account from other user accounts. The system determines or retrieves a sensitive messaging profile for the sending user account, then receives an input message associated with the sending user account. The system detects that the input message comprises sensitive information, and transmits a sensitive message to one or more receiving user accounts within a sensitive container component, with the sensitive message including at least a subset of the input message. | 2022-08-04 |
20220245284 | COMPUTER-IMPLEMENTED METHOD FOR IMPROVING A SOCIAL NETWORK SITE COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER READABLE MEDIUM FOR THE SAME - A method, at a terminal in a digital communications network, comprising: establishing direct or indirect communication access and linkage between the user-operated terminal and at least one remote computer(s) on which are stored, or by which access is available to prevent legible display of, stored user account object data; displaying indicia, or broadcasting data, representative of or indicating one or more predetermined criteria for selecting a subset of the stored user account object data; collecting data, representative of, or indicating, only the subset of the stored user account object data; and transmitting instructions to prevent legible display of the subset of the stored user account object data, according to the collected data representative of, or indicating, the one or more predetermined criteria for selecting the subset of the stored user account object data, from the terminal to the at least one remote computer(s). A terminal, system, and computer readable medium are also disclosed. | 2022-08-04 |
20220245285 | CLUSTER RESOURCE SIGNATURE VERIFICATION - Methods and systems for verifying a resource definition include simulating an original resource definition to identify at least one change that is made to the original resource definition by a management service. A signature of a received resource definition is generated, omitting portions of the received resource definition that correspond to the at least one identified change. The signature of the received resource definition is compared to a signature of the original resource definition to find a match and to verify the received resource definition. The received resource definition is implemented, responsive to finding the match. | 2022-08-04 |
20220245286 | METHOD FOR PROTECTING DEVICE SOFTWARE INTEGRITY IN CONTINUITY SCENARIO - A software verification method and apparatus are provided. The method includes: reading flag information, where the flag information is used to indicate a target digital certificate; selecting one of a plurality of digital certificates as a target digital certificate based on the flag information, where the plurality of digital certificates include a first digital certificate and a second digital certificate, and the target digital certificate includes a cryptographic resource; and verifying software deployed on a device based on the cryptographic resource. Using the foregoing technical solution can ensure continuity of the software verification service in the device. | 2022-08-04 |
20220245287 | ENCRYPTED HUMAN INTERFACE KEYBOARD - Systems and methods for sending and receiving communications securely between a human interface keyboard and a computer terminal are described. In some embodiments, the keyboard includes a human interface display and a processor to encrypt keystrokes entered by a user. Synchronization between the keyboard and the computer terminal is maintained by the devices, by encrypting and decrypting a signal according to the same randomized negotiated ASCII CharSet, which is generated by the computer terminal. | 2022-08-04 |
20220245288 | VIDEO-BASED PRIVACY SUPPORTING SYSTEM - Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction between a computer and a user of the computer based on the environment of the computer and the user. For example, the computer-controlled system provided by the invention comprises an input-output device including an image sensor configured to collect facial recognition data proximate to the computer. The system also includes a user security parameter database encoding security parameters associated with the user; the database is also configured to communicate with the security processor. The security processor is configured to receive the facial recognition data and the security parameters associated with the user, and is further configured to at least partially control the operation of the data input device and the data output device in response to the facial recognition data and the security parameters associated with the user. | 2022-08-04 |
20220245289 | Analyzer - A tradeoff between a model accuracy and an amount of calculation in numerical analysis that simulates an underground structure pull-out test is solved. A structure model generation unit generates a structure model obtained by modeling an underground structure. A particle generation unit sets the maximum diameter of SPH particles that does not cause indication of a time history result underestimating a pull-out resistance force that is a result of the analysis, and generates the SPH particles obtained by modeling soil that is a supporter of the underground structure. An operation unit applies coupled analysis to the structure model and the SPH particles by a finite element method and an SPH method. | 2022-08-04 |
20220245290 | SYSTEMS AND METHODS FOR MODELING BUILDINGS AND RISK ASSESSMENT - In one embodiment, a smart home modeling system receives objective data from a public data source. The system modifies baseline age information from the objective data based on indications from service and upgrade records, as well as smart home sensor measurements, to generate a corrected age model for the home. The system determines the effective ages of systems in the home in the corrected age model, and then uses the corrected age model to generate a risk model for the home. Based on the generated risk model, maintenance needs and statuses are re-evaluated. The system provides a virtual dashboard to view results from the smart home model. The dashboard displays alerts about particular systems of the home with elevated risk levels. Additionally, the dashboard generates price information based on the corrected age model and the risk model. The dashboard also notifies a user about service interventions for home systems. | 2022-08-04 |
20220245291 | APPARATUS, SYSTEM AND METHOD FOR THREE-DIMENSIONAL (3D) MODELING WITH A PLURALITY OF LINKED METADATA FEEDS - Technologies and techniques for operating a dynamically updatable computer system. A design tool generates a three-dimensional (3D) model base having plurality of model subcomponents with different characteristics. First dynamic metadata and second dynamic metadata associated with each of the plurality of model subcomponents are received, wherein the second dynamic metadata is associated with the first dynamic metadata, and wherein the first dynamic metadata and second dynamic metadata is configured to change over time. Each of the first dynamic metadata are linked to respective portions of the plurality of model subcomponents, based on the model component characteristics. Each of the second dynamic metadata are linked to the respective portions of the plurality of model subcomponents linked to the first dynamic metadata. A 3D model is generated that includes the processed first and second dynamic metadata, wherein the first dynamic metadata and second dynamic metadata is automatically updated within the 3D model. | 2022-08-04 |
20220245292 | AR ENHANCED STRUCTURAL TRANSFORMATION ESTIMATOR AND MODELING ENGINE - Individual nodes of a plurality of nodes can be fixed to the architectural structure and associated with a different segment of a plurality of segments of a first model of an architectural structure. Positional data associated with the nodes can be received. A structural change to the architectural structure can be estimated based on a comparison of positional data associated with the nodes. A second model representing the architectural structure as modified by the structural change can be generated. The second model can be generated based on (i) the first model and (ii) the estimated change to the architectural structure. | 2022-08-04 |
20220245293 | GENERATION OF TOOL PATHS FOR SHOE ASSEMBLY - A tool path for treating a shoe upper may be generated to treat substantially only the surface of the shoe bounded by a bite line. The bite line may be defined to correspond to the junction of the shoe upper and a shoe bottom unit. Bite line data and three-dimensional profile data representing at least a portion of a surface of a shoe upper bounded by a bite line may be utilized in combination to generate a tool path for processing the surface of the upper, such as automated application of adhesive to the surface of a lasted upper bounded by a bite line. | 2022-08-04 |
20220245294 | METHODS AND APPARATUS FOR DETERMINING A SHIM PROFILE FOR ASSEMBLING A FIRST PART WITH A SECOND PART - A method for determining a shim profile for assembling a first mating surface of a first part with a second mating surface of a second part includes: obtaining a baseline surface model of the first mating surface; scanning the first mating surface when the first part is in a deviated configuration to generate a scan-based surface model of the first mating surface; deforming the scan-based surface model of the first mating surface relative to the baseline surface model of the first mating surface to generate a first deformed surface model of the first mating surface; deforming the first deformed surface model of the first mating surface relative to a surface model of the second mating surface to generate a second deformed surface model of the first mating surface; and comparing the second deformed surface model of the first mating surface to the surface model of the second mating surface. | 2022-08-04 |
20220245295 | GENERATING A DYNAMIC PHOTOVOLTAIC SYSTEM DESIGN AND PROPOSAL - Generating a photovoltaic system design and proposal includes fetching a maximum solar panel design for a photovoltaic system design from a photovoltaic system design tool; fetching an electricity profile for the photovoltaic system design; receiving one or more modifications to one or more of the photovoltaic system design and an environment of the photovoltaic system; determining customer pricing based on one or more of the modified photovoltaic system design and the modified environment of the photovoltaic system; and generating a customer proposal based on the modified photovoltaic system design and the modified environment of the photovoltaic system. | 2022-08-04 |
20220245296 | Generating Vector Representations of Visual Objects - Generating vector representations of visual objects is leveraged in a digital medium environment. For instance, a raster-based visual input object is encoded into a global latent code and individual path latent codes for visual components of the raster visual object are extracted from the global latent code. The path latent codes are decoded and used to generate vector representations of the original raster versions of the visual components. The vector representations are rasterized and composited to generate an output object that simulates a visual appearance of the input object. | 2022-08-04 |
20220245297 | SCALABLE SYSTEM AND METHOD FOR FORECASTING WIND TURBINE FAILURE USING SCADA ALARM AND EVENT LOGS - An example method comprises receiving event and alarm data from event logs, failure data, and asset data from SCADA system(s), retrieve patterns of events from the SCADA data, receiving historical sensor data from sensors of components of wind turbines, training a set of models to predict faults for each component using the patterns of events and historical sensor data, each model of a set having different observation time windows and lead time windows, evaluating each model of a set using standardized metrics, comparing evaluations of each model of a set to select a model with preferred lead time and accuracy, receive current sensor data from the sensors of the components, apply the selected model(s) to the current sensor data to generate a component failure prediction, compare the component failure prediction to a threshold, and generate an alert and report based on the comparison to the threshold. | 2022-08-04 |
20220245298 | DYNAMIC STABILITY ANALYSIS METHOD AND DEVICE FOR LINEAR TIME-PERIODIC SYSTEM - The disclosure discloses a dynamic stability analysis method and device for a linear time-periodic (LTP) system. The method includes the following steps. Calculate the Q matrix corresponding to the LTP system, and use the eigenvalue of Q matrix whose real part is positive as an instability eigenvalue. Each instability eigenvalue is subjected to the following steps. (S1) the state space model is transformed into the infinite-order harmonic state space (HSS) model, and the truncation order m of HSS model is initialized to 1. (S2) after m-th order truncation of the HSS model, its eigenvalue thereof is calculated. If the real part of the eigenvalue of HSS model is not the same as the real part of the instability eigenvalue, m is updated, and step (S2) is performed again; otherwise, modal participation factor analysis is performed to obtain the state variables that dominate the system instability. | 2022-08-04 |
20220245299 | SYSTEMS AND METHODS FOR CALCULATING A TIME DURATION AND AN AMOUNT OF MATERIAL REQUIRED FOR PRINTING A THREE-DIMENSIONAL OBJECT - Systems and methods for calculating a time duration and an amount of material consumption required for printing a tray of one or more three-dimensional objects using a three-dimensional printing system are disclosed. | 2022-08-04 |
20220245300 | METHOD AND SYSTEM FOR CONSTRUCTING STATISTICAL EMULATORS FOR RESERVOIR SIMULATION MODELS WITH UNCERTAIN INPUTS - A method for generating a stochastic emulation model is disclosed. In an embodiment, the method uses a computer ( | 2022-08-04 |
20220245301 | YIELD RATE PREDICTION METHOD IN MANUFACTURE OF INTEGRATED CIRCUIT WAFER - The invention provides a yield rate prediction method for manufacture of integrated circuit wafers, which includes the following steps: obtaining candidate reference product models; obtaining parameters of the candidate reference products; obtaining functions of candidate reference products; predicting candidate reference products; selecting a final reference product; obtaining a new product prediction model; and predicting yield rate of new product. The yield rate prediction method for manufacture of integrated circuit wafer provided by the disclosure is performed based on the functional relationship between random defect density and yield rate in wafer manufacturing. By referring to the yield rate data of mature products on the production line, establishing data model and performing regression analysis, a more accurate yield rate prediction value of a new product can be obtained, thus providing a new product yield rate prediction method for manufacture of semiconductor integrated circuit wafers. | 2022-08-04 |
20220245302 | SPARSE AND NON CONGRUENT STOCHASTIC ROLL-UP - When storing the results of a very large number of stochastic simulation trials of rare events, the amount of data involved may be prohibitive. Sparse and Non-Congruent Stochastic Roll-up are methods for decomposing and storing the results from Monte Carlo simulations such that the data stored only reflects the trials on which a risk event occurred, or focuses attention on some trials over other trials. When the need arises to view or calculate with the fully expressed data set, the results may be aggregated while maintaining statistical relationships between the components of the simulation. | 2022-08-04 |
20220245303 | VIBRATION NOISE REDUCTION ANALYSIS METHOD AND ANALYZER FOR AUTOMOTIVE PANEL PARTS - A vibration noise reduction analysis method for automotive panel parts is executed by a computer and used for reducing vibration noise in a panel part caused by vibrations transmitted from an exciter of an automobile to the panel part through vibration transmission frame parts. The vibration noise reduction analysis method includes: an automotive body mesh model acquisition process; a specific frequency band selection process for a vibration noise reduction target panel part model; a vibration transmission frame part model specification process; an individual mesh sheet thickness optimization process; a divided area setting process for a vibration transmission frame part model; an individual divided-area sheet thickness optimization process; and a divided area/optimal sheet thickness determination process for a vibration transmission frame part. | 2022-08-04 |
20220245304 | SYSTEM AND METHOD FOR IDENTIFYING DISTORTION-COMPENSATION THRESHOLD FOR SINTERING PARTS WITH COMPLEX FEATURES - A system includes a memory module configured to store a computer model of a part for manufacturing with an additive manufacturing machine, and a processor communicatively coupled to the memory module. The processor is configured to receive the computer model, discretize the computer model into a mesh, predict a deformation behavior the plurality of nodes of the mesh under a simulated sintering process, determine a buckling factor for the part based on the predicted deformation behavior of the mesh, determine whether the buckling factor exceeds a threshold, in response to determining that the buckling factor exceeds the threshold, export the computer model to the additive manufacturing machine for pre-build processing, and in response to determining that the buckling factor does not exceeds the threshold, output, to a display of the system, at least one of an alert that the part is unstable or the buckling factor. | 2022-08-04 |
20220245305 | HYBRID MEASUREMENT AND SIMULATION BASED DISTORTION COMPENSATION SYSTEM FOR ADDITIVE MANUFACTURING PROCESSES - A compensation field indicating an amount of distortion compensation to be applied across at least a portion of a component is determined, and a nominal computer-aided design (CAD) model of a component is modified based on the compensation field. The amount of distortion compensation corresponds to a multiplication product of: (i) a deviation between the nominal CAD model and a physical representation of the component having been produced based on the nominal CAD model, and (ii) a nonlinear scale factor map that includes a map associating a plurality of locations of the nominal CAD model to corresponding ones of a plurality of scale factors respectively representing an increase or a decrease in the amount of distortion compensation to be applied based on a simulated effect upon the component in response to an iterative simulation process. | 2022-08-04 |
20220245306 | MODEL MOSAIC FRAMEWORK FOR MODELING GLUCOSE SENSITIVITY - Methods, systems, and devices for modeling a relationship between glucose sensitivity and a sensor electrical property are described herein. More particularly, the methods, systems, and devices describe partitioning an input signal feature space relating glucose sensitivity and a sensor electrical property into subspaces and training a model for each subspace. For example, the subspace models may form a mosaic of models, for which the output is more accurate than a single model. | 2022-08-04 |
20220245307 | HYBRID PHYSICS/MACHINE LEARNING MODELING OF PROCESSES - Embodiments described herein include processes for generating a hybrid model for modeling processes in semiconductor processing equipment. In a particular embodiment, method of creating a hybrid machine learning model comprises identifying a first set of cases spanning a first range of process and/or hardware parameters, and running experiments in a lab for the first set of cases. The method may further comprise compiling experimental outputs from the experiments, and running physics based simulations for the first set of cases. In an embodiment, the method may further comprise compiling model outputs from the simulations, and correlating the model outputs with the experimental outputs with a machine learning algorithm to provide the hybrid machine learning model. | 2022-08-04 |
20220245308 | METHOD AND SYSTEM FOR CARRYING OUT A SIMULATION - A simulation includes loading a first generator of a Cycle Generative Adversarial Network (CycleGAN) with a model dataset during a training phase in order to train the first generator in cooperation with a first discriminator of the CycleGAN assigned to the first generator, and loading a second generator of the CycleGAN with a hardware dataset in order to train the second generator in cooperation with a second discriminator of the CycleGAN assigned to the second generator, and loading the first generator with an input dataset during an operational phase in order to provide an output dataset. | 2022-08-04 |
20220245309 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM RECORDING MEDIUM, INFORMATION PROCESSING SYSTEM, INSPECTION DEVICE, AND INSPECTION METHOD - An information processing apparatus that can estimate, for example, performance of the lens by using a learning model and easily evaluate a quality of the lens. The information processing apparatus comprises: a first acquisition unit configured to acquire first information in which a use state of a lens unit having at least one optical element after shipment is recorded; a second acquisition unit configured to acquire second information in which lens performance or standard of the lens unit or a lens unit different from the lens unit is recorded in advance; and a first processing unit configured to use the first information and the second information as input data of a predetermined learning model, and generate a learned model in which parameters in the learning model are adjusted. | 2022-08-04 |
20220245310 | SYSTEM AND METHOD FOR MODELING RIGID BODY MOTIONS WITH CONTACTS AND COLLISIONS - System and method for modeling motion and collision of rigid bodies in a dynamic system includes a collision detector that detects active contacts of the rigid bodies. A differentiable contact impulse solver applies constraints on contact forces related to a compression phase, applies coefficient of restitution on contact forces related to a restitution phase, solves for contact forces and velocity impulses associated with the active contacts in the compression phase and the restitution phase, and estimates trajectories of the rigid bodies while optimizing for maximum rate of energy dissipation. | 2022-08-04 |
20220245311 | DESIGN SUPPORT SYSTEM, DESIGN SUPPORT METHOD, AND RECORDING MEDIUM - A design support system includes variable extraction means and setting means. In the design support system, the variable extraction means extracts from verified design data a variable that defines design constraint. The setting means sets the design constraint by analyzing, using statistical processing or machine learning, a frequency distribution of the variable extracted by the variable extraction means. | 2022-08-04 |
20220245312 | GENERATING AUTONOMOUS VEHICLE SIMULATION DATA FROM LOGGED DATA - Logged data from an autonomous vehicle is processed to generate augmented data. The augmented data describes an actor in an environment of the autonomous vehicle, the actor having an associated actor type and an actor motion behavior characteristic. The augmented data may be varied to create different sets of augmented data. The sets of augmented data can be used to create one or more simulation scenarios that in turn are used to produce machine learning models to control the operation of autonomous vehicles. | 2022-08-04 |
20220245313 | METHOD FOR CALCULATING FLUID-STRUCTURE INTERACTION RESPONSE OF CERAMIC MATRIX COMPOSITES - Disclosed is a method for calculating a fluid-structure interaction response of ceramic matrix composites (CMCs). The method includes: calculating a stress-strain hysteresis curve under loading and unloading of a CMC unit cell model through a multi-scale method; performing an interpolation to calculate a hysteresis loop response under arbitrary loading and unloading through a hysteresis loop under loading and unloading calculated through the unit cell model, and using the hysteresis loop response as a proxy model for a dynamics calculation of a solid domain of a fluid-structure interaction; and calculating a fluid load on a fluid-structure interaction interface through CFD, writing a program to read the fluid load and map the same to a solid node, reading a displacement of the solid node and mapping the same onto the fluid node, where a fluid domain and the solid domain use the same time step. | 2022-08-04 |
20220245314 | CIRCUIT DESIGN VALIDATION TOOL FOR RADIATION-HARDENED DESIGN - One example includes a method for validating a circuit design. The method includes providing a set of coded rules. Each of the coded rules can define conditions for circuit cells to qualify the circuit design as being radiation-hardened. The method also includes accessing a circuit design netlist associated with the circuit design from a circuit design database. The method also includes evaluating each of the circuit cells in the circuit design netlist with respect to each of the coded rules. The method further includes providing a circuit evaluation report comprising an indication of failure of a set of the circuit cells with respect to one or more of the coded rules in response to the evaluation. | 2022-08-04 |
20220245315 | DYNAMIC FPGA LOGIC CAPACITY BASED ON ACCURATE EARLY ROUTABILITY ESTIMATION - A computer aided design (CAD) system receives a high level coding of a design for a circuit to be implemented in a field programmable gate array (FPGA). The system performs synthesis on the design, to produce a synthesized design. The system generates a routability estimation and a logic usage estimation for the synthesized design. The system determines whether the synthesized design is implementable on a specific FPGA, based on the routability estimation, the logic usage estimation, and available resources of the specific FPGA. | 2022-08-04 |
20220245316 | COMPUTER-IMPLEMENTED METHOD OF PERFORMING VOLTAGE RULE CHECK IN AN ELECTRONIC DESIGN AUTOMATION PLATFORM - A computer-implemented method of performing voltage rule check in an electronic design automation (EDA) platform is provided in the present invention, including steps of inserting pseudo device with safe operating area (SOA) model setting in a netlist generated by the EDA platform or in a schematic of process design kit (PDK), wherein parameters of the pseudo device and the model are set so that the pseudo device would not affect original circuits in the netlist and the schematic, performing SOA check in the netlist or the schematic through the EDA platform, and examining the warning messages triggered by the pseudo device and the model violating the SOA setting in the SOA check to find out layout sections violating the SOA setting. | 2022-08-04 |
20220245317 | SYSTEM AND METHOD FOR DETERMINING PATHS BETWEEN LOCATIONS IN A PHYSICAL SYSTEM - Pathways between reference locations in a physical system are generated based on a layout table. Nodes and edges of the directed graph are associated with cell locations of the layout table. The cell locations define features of the reference locations. Parameters of the nodes and edges are defined based on descriptors recalled from the cells associated with the nodes and edges. The nodes and edges are configured based on the descriptors. Path data regarding potential pathways is generated based on the defined nodes and edges. | 2022-08-04 |
20220245318 | METHOD OF GENERATING NETLIST INCLUDING PROXIMITY-EFFECT-INDUCER (PEI) PARAMETERS - For a method of manufacturing a semiconductor device, a corresponding layout diagram is stored on a non-transitory computer-readable medium, the layout diagram being arranged relative to first and second perpendicular directions, the layout diagram including cells such that, for a subset of the cells, each subject one of the cells (subject cell) in the subset has a neighborhood including first and second neighbor cells on corresponding first and second sides of the subject cell relative to the first direction. The method includes: for each subject cell in the subset, generating a sidefile which represents neighborhood-specific proximity-effect information. For each cell in the subset of the cells, the generating a sidefile includes populating the sidefile with a first neighbor-specific proximity-effect (NSPE) parameter corresponding to an inter-cell proximity-effect induced by the first neighbor cell and a second NSPE parameter corresponding to an inter-cell proximity-effect induced by the second neighbor cell. | 2022-08-04 |
20220245319 | METHOD FOR INTEGRATED CIRCUIT DESIGN - A method is disclosed herein. The method includes: providing, by an electronic design automation (EDA), a trigger signal to an application programming interface (API); providing, by the API, first parameters associated with parameterized cells in a netlist of an integrated circuit (IC); adjusting, by the API, the first parameters to generate second parameters associated with the parameterized cells in the netlist of the IC; updating, by the API, the netlist of the IC according to the second parameters; and performing, by the EDA, a simulation according to the netlist. | 2022-08-04 |
20220245320 | PASSIVELY COOLING HARDWARE COMPONENTS - A system and a method are disclosed for placing hardware components on a printed circuit board (“PCB”) in a way that enables all hardware components on the PCB to be passively cooled without using active cooling systems. Components are selected to be placed onto the PCB and heat metrics for each component is obtained (e.g., from a server). The components are ranked based on the amount of heat that each component generates. A corresponding position for each of the hardware components is determined based on the ranking of the components and the orientation of the PCB. The placement is based on the concept that air having higher temperature rises while air having cooler temperature falls. A representation of the PCB according to corresponding positions of the hardware components may be generated for display. | 2022-08-04 |
20220245321 | APPARATUS AND METHOD FOR GENERATING A PARAMETERIZED WAVEGUIDE OPTICAL ELEMENTS - A method and system for generating a physical layout for a grating coupler integrated in a photonically-enabled circuit are disclosed herein. In some embodiments, the method receives a parametrized wavelength, a parametrized first refractive index, a parametrized second refractive index, a parametrized taper length, a parametrized width, a parametrized grating length, and a parametrized incident angle of the optical beam incident onto the grating coupler and generates a physical layout for the grating coupler based on the received parametrized inputs, the generating of the physical layout is according to a predefined model, and outputs the physical layout of the grating coupler for manufacturing under a semiconductor fabrication process. | 2022-08-04 |
20220245322 | MACHINE-LEARNING BASED GENERATION OF TEXT STYLE VARIATIONS FOR DIGITAL CONTENT ITEMS - An online system generates a set of content item variations for a reference content item that include different styles of text for the content item. The different styles of text are generated by applying machine-learned style transfer models, for example, neural network based models to reference text of the reference content item. The text variations retain the textual content of the reference text but are synthesized with different styles. The online system can provide the content item variations to users on an online experimental platform to collect user interaction information that may indicate how users respond to different styles of text. The online system or the content providers can effectively target users with content items that include the style of text the users respond to based on the collected information. | 2022-08-04 |
20220245323 | SYSTEMS AND METHODS FOR LAYOUT CUSTOMIZATION - Systems and methods for customizing an interface are disclosed. Interaction data is received for at least one interaction with a network environment and an intent of the at least one interaction is identified based on the interaction data. A layout is selected for a user interface based on the identified intent. The layout includes at least one zone. The at least one zone of the layout is populated with one or more modules and the each of the one or more modules is populated with content based on the identified intent | 2022-08-04 |
20220245324 | DATA PROCESSING SYSTEMS, DEVICES, AND METHODS FOR CONTENT ANALYSIS - Systems, devices and methods operative for identifying a reference within a figure and an identifier in a text associated with the figure, the reference referring to an element depicted in the figure, the reference corresponding to the identifier, the identifier identifying the element in the text, placing the identifier on the figure at a distance from the reference, the identifier visually associated with the reference upon the placing, the placing of the identifier on the figure is irrespective of the distance between the identifier and the reference. | 2022-08-04 |
20220245325 | COMPUTER-READABLE RECORDING MEDIUM STORING DESIGN DOCUMENT MANAGEMENT PROGRAM, DESIGN DOCUMENT MANAGEMENT METHOD, AND INFORMATION PROCESSING APPARATUS - A non-transitory computer-readable recording medium stores a design document management program causing a computer to execute a process including: acquiring a plurality of design documents about a system; identifying a plurality of label items representing elements of the system based on appearance frequency information of character strings included in the plurality of design documents acquired; and generating structure information in which the plurality of label items are hierarchized based on appearance positions at which the character string corresponding to each of the plurality of label items identified appears in the plurality of design documents. | 2022-08-04 |
20220245326 | SEMANTICALLY DRIVEN DOCUMENT STRUCTURE RECOGNITION - One or more documents are received. Each document of the one or more documents is partitioned into segments using stylistic cues from a textual format of each document. Each of the segments is mapped to a respective embedding based on one or more language models. A dependency graph is computed based on the embeddings. A rooted, ordered tree is produced based on the dependency graph. The rooted, ordered tree represents a hierarchical structure of each document. | 2022-08-04 |
20220245327 | MODULAR SYSTEMS AND METHODS FOR SELECTIVELY ENABLING CLOUD-BASED ASSISTIVE TECHNOLOGIES - Systems and methods are disclosed for manually and programmatically remediating websites to thereby facilitate website navigation by people with diverse abilities. For example, an administrator portal is provided for simplified, form-based creation and deployment of remediation code, and a machine learning system is utilized to create and suggest remediations based on past remediation history. Voice command systems and portable document format (PDF) remediation techniques are also provided for improving the accessibility of such websites. | 2022-08-04 |
20220245328 | CUSTOMIZABLE DATA MANAGEMENT FORM BUILDER METHOD AND DEVICES - The embodiments disclose a method including providing a website interface within the customizable application builder with no code visualization tools for an application creation user, including a form builder for creating at least one form with at least one form element for receiving form input from an end user, each associated with a conditional rule builder, an auto pdf mapping tool, a manual pdf mapping tool and at least two dynamic pdf mapping tools, wherein upon submission of the form, the auto pdf mapping tool automatically generates a pdf of the entire form, including the at least one form element and the form input from the end user and wherein the end user can interactively integrate the entire auto pdf mapping tool automatically generated pdf form into at least one 3rd party application platform and access data from all of their 3rd party application platform using the pdf mapped elements. | 2022-08-04 |
20220245329 | SYSTEMS AND METHODS FOR CREATING CUSTOM ACTIONS - Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with one or more data objects in an online social network. A user interface includes a publisher with a custom action. The custom action is defined in accordance with custom action instructions provided by a first entity via an application programming interface (API). Such custom action instructions may declaratively or programmatically define the data object, the interaction to be performed with the data object, and other attributes associated with the custom action. A user may request to interact with the data object via selection of the custom action by a second entity. Information may be submitted through the publisher to interact with the data object to update a database system associated with the data object. A feed item may be presented for inclusion in the information feed based on the update. | 2022-08-04 |
20220245330 | METHOD AND SYSTEM FOR DISPLAYING AND SEARCHING INFORMATION IN AN ELECTRONIC DOCUMENT - The present disclosure describes an electronic document review method comprising the steps of displaying at least a first document section of said document in a first display window, displaying at least a second document section of said document in a second display window, and arranging said second window so that said second window is arranged within the border of the first window. Such a method allows for efficient review of electronic documents thereby enabling a user to reduce the amount of time the user spends for reviewing an electronic document. The disclosure also provides an electronic document review system. | 2022-08-04 |
20220245331 | METHOD AND APPARATUS FOR DISPLAYING ONLINE DOCUMENT, ELECTRONIC DEVICE, AND STORAGE MEDIUM - Provided are a method and apparatus for displaying an online document, an electronic device, and a storage medium. The method for displaying an online document includes, in response to receiving an interactive instruction for a first user through the online document, generating an online document notification message in the instant messaging session list of the first user, where the interactive instruction includes that a second user mentions the first user or that the second user mentions the content published by the first user in the online document; in response to receiving an instruction triggering the online document notification message, acquiring a target link address; and jumping to the target link address in an instant messaging window through a document container and displaying the online document in the instant messaging window, where the document container is integrated into an instant messaging framework. | 2022-08-04 |
20220245332 | GENERATING AND PROVISIONING OF ADDITIONAL CONTENT FOR SOURCE PERSPECTIVE(S) OF A DOCUMENT - Implementations described herein determine, for a given document generated by a given source, one or more portions of content (e.g., phrase(s), image(s), paragraph(s), etc.) of the given document that may be influenced by a source perspective of the given source. Further, implementations determine one or more additional resources that are related to the given source and that are related to the portion(s) of content of the given document. Yet further, implementations utilize the additional resource(s) to determine additional content that provides context for the portion(s) that may be influenced by a source perspective. A relationship, between the additional resource(s) and the portions of the given document, can be defined. Based on the relationship being defined, the additional content can be caused to be rendered at a client device in response to the client device accessing the given document. | 2022-08-04 |
20220245333 | CLIENT-SIDE 2D RENDERING OF SERVER-SIDE MULTIDIMENSIONAL DATA - A multidimensional data cube at a server may store values and functions. The functions may use values stored in the data cube as inputs to generate results. A client application may retrieve values stored at a server in a multidimensional data cube to be updated and viewed locally at the client. Instead of evaluating functions at the server and transmitting the results to the client, the functions themselves may be translated into equivalent functions that can be evaluated in real time at the client. As inputs to the functions are a changed at the client, the function results can be updated at the client without requiring back-and-forth transmissions to the server or additional queries to the data cube. | 2022-08-04 |
20220245334 | DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND DATA PROCESSING PROGRAM - A data processing device ( | 2022-08-04 |
20220245335 | Cross-Document Intelligent Authoring and Processing, With Arbitration for Semantically-Annotated Documents - Machine learning, artificial intelligence, and other computer-implemented methods are used to identify various semantically important chunks in documents, automatically label them with appropriate datatypes and semantic roles, and use this enhanced information to assist authors and to support downstream processes. Chunk locations, datatypes, and semantic roles can often be automatically determined from what is here called “context”, to wit, the combination of their formatting, structure, and content; those of adjacent or nearby content; overall patterns of occurrence in a document, and similarities of all these things across documents (mainly but not exclusively among documents in the same document set). Similarity is not limited to exact or fuzzy string or property comparisons, but may include similarity of natural language grammatical structure, ML (machine learning) techniques such as measuring similarity of word, chunk, and other embeddings, and the datatypes and semantic roles of previously-identified chunks. | 2022-08-04 |
20220245336 | AUTOMATIC TEMPLATE GENERATION WITH INBUILT TEMPLATE LOGIC INTERFACE - An automatic template system can allow users to create automatic templates and use the automatic templates to generate documents using data from a linked CRM system. To facilitate the generation of automatic templates, the automatic template system can provide a template creation interface allowing a user to generate an automatic template (including setting up template logic). The template creation interface can include a CRM integration area with a set of tagged data fields representing relevant data from a linked CRM database and a document editing area allowing a user to edit document content, insert merge fields linked to tagged data fields, and edit template logic via an inline logic interface for adding and modifying template logic. | 2022-08-04 |
20220245337 | AUTOMATED GRAPH BASED INFORMATION EXTRACTION - A set of sentences within a natural language text document are parsed, generating a word-level graph corresponding to a sentence in the set of sentences. Within the word-level graph using a trained entity identification model, a set of entity candidates are identified. From a set of graphs modelling relationships between portions of the set of sentences, a set of embeddings is generated. From a set of pairs of embeddings in the set of embeddings using a set of deconvolution layers, a set of links between entity candidates within the set of entity candidates is extracted. From the set of links and the set of entity candidates, an output graph modelling linkages between portions of the set of sentences within the natural language text document is generated. | 2022-08-04 |