34th week of 2022 patent applcation highlights part 50 |
Patent application number | Title | Published |
20220269695 | DATA SYNCHRONIZATION ERROR RESOLUTION - A synchronization protocol is provided that can be used to resolve synchronization errors encountered while trying to synchronize versions of data objects between a client device and a remote computing system. The protocol includes a client device, in an offline processing mode, handling user interface (“UI”) manipulation actions on one or more UI elements of one or more UI screens. The handling of the UI manipulation actions modifies or creates a local version of a data object stored on the client device. The UI manipulation actions are stored by the client device and sent to the remote computing system. The client device receives a synchronization error notification from the remote computing system. After receiving the notification, the client device displays, in one of the UI screens, the local version of the data object and one or more indications of a synchronization error. | 2022-08-25 |
20220269696 | MULTIMASTER DATABASE FOR IDENTITY AND ELECTRONIC MAIL IN DDIL ENVIRONMENTS - The present invention generally relates to systems and methods for providing an enterprise user with an electronic identity and an electronic mailbox when the user has denied, degraded, intermittent, or latent network connectivity. In aspects, a database limited to a single user containing the user's electronic identity and electronic mailbox is provided. The single user database is replicated using a multi-master replication scheme across the cloud and on-premises servers. When a user is entering an environment with denied, degraded, intermittent, or latent network connectivity (“DDIL”), the single user database is replicated to a DDIL server. The user is provided access to their electronic identity and electronic mailbox in the single-user database via the DDIL server during periods of denied, degraded, intermittent, or latent network connectivity. The single user database can be replicated across the cloud/on-premises servers during periods when network connectivity is established and adequate for replication. | 2022-08-25 |
20220269697 | SYSTEMS AND METHODS FOR ELECTRONIC DATA RECORD SYNCHRONIZATION - Systems and methods for database record synchronization are disclosed herein. An example apparatus includes at least one memory; machine readable instructions; and processor circuitry to execute the machine readable instructions to perform a comparison between a first record and a second record, the first record associated with a first database and the second record associated with a second database different than the first database, the first record including a base record and a supplemental record and the second record including a base record and a supplemental record; determine a sequence in which to modify the second record based on the comparison; and cause transmission of a first message and a second message to the second database based on the sequence to modify the second record. | 2022-08-25 |
20220269698 | PHRASE BASED UNSTRUCTURED CONTENT PARSING - From an unstructured content using an ontology, a forward materialization graph is generated. The forward materialization graph is converted to a set of vector representations comprising multidimensional numbers representing elements of the forward materialization graph. A set of inference paths is computed for the set of vector representations. An inference path in the set of inference paths connecting a first vector representation with a second vector representation. Based on a set of features, the set of vector representations is formed into clusters, a feature in the set of features comprising a relevance probability, the relevance probability corresponding to a relevance of a portion of the unstructured content according to a relevance metric. A structured representation of the unstructured content is placed at an edge location of a content delivery network determined using the set of clusters. | 2022-08-25 |
20220269699 | SYSTEMS AND METHODS FOR PROVIDING DATA TRANSFER USER INTERFACES - Methods and computer systems for handling data transfers. Receiving, via a communications module, a request for a data transfer from a transferor to a recipient, the request including one or more parameters. Identifying a category of the data transfer based on at least one of the one or more parameters and stored categorization data. Processing the request for the data transfer based on the category by providing, to a computing device associated with the transferor, a category-specific user interface for processing the request for the data transfer. | 2022-08-25 |
20220269700 | SYSTEM AND METHOD FOR CONTROLLING AND DETERMINING ACCURACY OF ACTIVITY DURATION KEYS - Systems, methods, and other embodiments associated with determining a configuration accuracy for activity duration keys are described. In one embodiment, a method includes comparing a duration time of an activity duration key to each reported time duration for completing selected activities from activity records and determining a difference associated to each activity record. An accuracy value is assigned to each activity record based on the difference, wherein the accuracy value indicates either a good (accurate) value or a bad (inaccurate) value. The configuration accuracy of the activity duration key is calculated based at least on a number of the activity records that were assigned the good (accurate) value relative to a number of the activity records assigned the bad (inaccurate) value. | 2022-08-25 |
20220269701 | METHOD, APPARATUS, SYSTEM AND STORAGE MEDIUM FOR DATA VISUALIZATION - A data visualization method is disclosed, including receiving business data and classifying the business data according to a business type associated with the business data so as to form multiple sets of target data, processing at least one set of the multiple sets of target data to obtain update data for an interactive interface, the interactive interface corresponding to the business type of the at least one set of target data and configured to display the at least one set of target data; rendering the interactive interface based on the update data to update content of the interactive interface. Thereby, isolation of data of different business types and linkage of data of the same business type are achieved, which improves the efficiency of visualized presentation of data. | 2022-08-25 |
20220269702 | INTELLIGENT ANNOTATION OF ENTITY-RELATIONSHIP DATA MODELS - Intelligent annotation of data models can be implemented. In one embodiment, the method can receive a data model including entities and relationships between the entities. An entity can include a set of attributes. The method can annotate the data model by defining a logical entity including one or more of the entities, validate the logical entity, and automatically generate a message structure corresponding to the logical entity. The message structure can include properties mapped to at least some of the attributes of entities contained in the logical entity. The properties can be defined in one or more database tables represented by the logical entity. | 2022-08-25 |
20220269703 | PERMISSIONS-AWARE SEARCH WITH INTELLIGENT ACTIVITY TRACKING AND SCORING ACROSS GROUP HIERARCHIES - Methods and apparatuses for providing a permissions-aware search and knowledge management system that incorporates user suggested results, document verification, and intelligent user activity tracking across group hierarchies to improve the quality and relevance of search results are described. The permissions-aware search and knowledge management system may enable content stored across a variety of local and cloud-based data stores to be indexed, searched, and displayed to authorized users. The identification and ranking of relevant documents corresponding with a user's search query may take into account user suggested results from the user and others assigned to the same group as the user, whether the underlying content of a search result was verified by a content owner as being up-to-date, the amount of time that has passed since the underlying content was verified by the content owner, and the recent activity of the user and related group members. | 2022-08-25 |
20220269704 | IRRELEVANCY FILTERING - The present invention relates to filtering textual data based on topic relevancy. More particularly, the present invention relates to generating training data to train a computer model to substantially filter out irrelevant data from a collection of data that may include both irrelevant and relevant data. Aspects and/or embodiments seek to provide a method for filtering data when generating datasets of short-form data for topics of interest. Aspects and/or embodiments also seek to provide a training dataset that can be used to train a computer model to perform relevancy/irrelevancy filtering of short-form data using relevant and irrelevant extracts from long-form data. | 2022-08-25 |
20220269705 | SYSTEM AND METHOD FOR GENERATING A RESEARCH REPORTING NARRATIVE - The invention includes systems and methods to provide a research reporting narrative, in particular, for research metrics. Specifically, the invention includes content performance metrics and contributing factors to performance, The invention collects, analyzes, and places into a narrative format, data from research that is not easily digestible. The invention provides a quick and efficient report for absorption by users, | 2022-08-25 |
20220269706 | METHODS AND SYSTEMS TO PARSE A SOFTWARE COMPONENT SEARCH QUERY TO ENABLE MULTI ENTITY SEARCH - Systems and methods for parsing a software component search query to enable multi entity searches are provided. An exemplary method includes filtering a search query for unwanted characters, correcting a spelling of the search query, applying a first machine learning model to remove filter terms from the search query, parsing the query to extract entities, categorizing the entities as natural language, programming language, or keyword text, applying a second machine learning model to enhance search characteristics of the entities characterized as natural language, applying a third machine learning model to enhance search characteristics of the entities characterized as programming language, applying a fourth machine learning model to enhance search characteristics of the entities categorized as keyword text, consolidating the enhanced entities into an enhanced search query, applying a fifth machine learning model to determine intended sources for the search query, and searching the intended sources for results. | 2022-08-25 |
20220269707 | METHOD AND SYSTEM FOR ANALYZING ENTITIES - A recurrent neural network (RNN) method implemented on a computer system is used to produce summaries of unstructured text generated by multiple networks of individuals interacting over time by encoding the unstructured text into intermediate representations and decoding the intermediate representations into summaries of each network. Parameter data for the RNN is obtained by using multiple different versions of the same source texts to train the computer system. The method and computer system can be used to identify which of the networks match a query by determining which network generates the query with low or lowest cost. | 2022-08-25 |
20220269708 | SYSTEMS AND METHODS FOR PARTITIONING SEARCH INDEXES FOR IMPROVED EFFICIENCY IN IDENTIFYING MEDIA SEGMENTS - Systems and methods for identifying a media segment of audio or video content are described. The video segment is identified by deriving data from media content and comparing said data to a reference database in order to identify said video segment. Embodiments of the invention improve the speed and accuracy of the media identification process by advantageously partitioning the indexes in subdivisions where high value reference information is separated from the bulk information, for example. | 2022-08-25 |
20220269709 | SYSTEMS AND METHODS FOR SELECTING IMAGES FOR A MEDIA ITEM - A server system obtains a collection of images, each image in the collection of images being associated with a first set of text descriptors. The server system obtains a media item being associated with a second set of text descriptors. The server system selects a subset of the collection of images, including: selecting an initial subset of the collection of images, wherein the initial subset of the collection of images consists of images that share a text descriptor with the media item; obtaining a set of preferences for a user of the media-providing service; and selecting the subset of the collection of images from the initial subset of the collection of images based on the set of preferences for the user of the media-providing service. The server system concurrently presents: a respective image of the subset of the collection of images; and the media item. | 2022-08-25 |
20220269710 | METHODS AND SYSTEM FOR DISTRIBUTING INFORMATION VIA MULTIPLE FORMS OF DELIVERY SERVICES - Systems and methods of managing content and content requests are described. A data store of profiles of potential content contributors is provided. A request from a first source for content comprising content criteria is received, the content criteria comprising content contributor characteristics and content subject matter. Based on the content contributor characteristics and the profiles, at least a first potential content contributor is identified. At least a portion of the content request content criteria is transmitted to the first potential content contributor. If recorded content is received from the first content contributor, the first source is provided with access to the received recorded content. At least partly in response to acceptance by the first source of the received recorded content, the first source is enabled to publish the accepted received recorded content. | 2022-08-25 |
20220269711 | MEDIA CONTENT DISCOVERY AND CHARACTER ORGANIZATION TECHNIQUES - Techniques for recommending media are described. A character preference function comprising a plurality of preference coefficients is accessed. A first character model comprises a first set of attribute values for the plurality of attributes of a first character. The first and second characters are associated with a first and second salience value, respectively. A second character model comprises a second set of attribute values for the plurality of attributes of a second character of the plurality of characters. A first character rating is calculated using the plurality of preference coefficients and the first set of attribute values. A second character rating of the second character is calculated using the plurality of preference coefficients with the second set of attribute values. A media rating is calculated based on the first and second salience values and the first and second character ratings. A media is recommended based on the media rating. | 2022-08-25 |
20220269712 | GROUP PROFILE GENERATION AND CONTENT ITEM SELECTION BASED UPON GROUP PROFILES - One or more computing devices, systems, and/or methods are provided. A first plurality of sets of device information associated with a plurality of devices may be received and/or identified. The plurality of devices may be grouped into a plurality of groups based upon the first plurality of sets of device information. A plurality of group profiles associated with the plurality of groups may be generated. A first group profile of the plurality of group profiles may be associated with a first group of the plurality of groups. The first group profile may be generated based upon sets of device information, of the first plurality of sets of device information, associated with the first group. A request for content associated with a first device belonging to the first group may be received. A first content item may be selected for presentation via the first device based upon the first group profile. | 2022-08-25 |
20220269713 | AUTOMATIC GENERATION OF PRESENTATION SLIDES FROM DOCUMENTS - Systems and methods for creating presentation slides. A slide title is received and portions of source documents relevant to the title are identified based on a dense vector information retrieval machine learning process. An abstractive summary of the portions is generated based on a long form question answering machine learning process. A first presentation slide is created with the abstractive summary and the title. The first presentation slide is presented to an operator and an input indicating one of accepting or rejection the abstractive summary is received. Based on the input that indicating rejecting the abstractive summary, the abstractive summary is removed from the presentation slide and negative training feedback for the abstractive summary is provided to at least one of the dense vector information retrieval machine learning process or the long form question answering machine learning process. | 2022-08-25 |
20220269714 | MULTIMEDIA INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM - A multimedia information processing method, apparatus, electronic device, and medium are provided. The method includes: receiving a user's selection operation for any piece of multimedia information among multimedia information to be processed, the multimedia information to be processed comprising at least two pieces of multimedia information, any piece of multimedia information being any piece of multimedia information except the last piece; determining a target multimedia information piece on the basis of a selected operation; upon receiving a trigger operation for the target multimedia information piece, determining a corresponding processing method; on the basis of the determined processing method, correspondingly processing the target multimedia information piece. Thus, the complexity of processing multimedia information is reduced and efficiency is improved, thereby improving user experience. | 2022-08-25 |
20220269715 | FACIAL BASED IMAGE ORGANIZATION AND RETRIEVAL METHOD - Embodiments of the invention include a system and set of processes for organizing image collections. The system detects individuals in each image uploaded into the system using facial recognition or similar methods. The user and viewers of the images may then view dynamic albums based on the interrelationships of individuals in images. Users and viewers may browse all images with an individual or see albums of images with two selected individuals or similar combinations based on the relationships between users. | 2022-08-25 |
20220269716 | FILE PROCESSING DEVICE, FILE PROCESSING METHOD, AND PROGRAM - The present technology relates to a file processing device, a file processing method, and a program that achieve quick index display. | 2022-08-25 |
20220269717 | Secure Matching and Identification of Patterns - A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity. | 2022-08-25 |
20220269718 | Method And Apparatus For Tracking Object - Disclosed is a method for tracking an object, which is performed by a computing device including at least one processor, including: obtaining a query set including one or more query samples from a first frame included in an image sequence including two or more image frames; obtaining a detection set including one or more detection samples from a second frame included in the image sequence; and determining a label corresponding to each query sample included in the query set, based on the label of each detection sample included in the detection set. | 2022-08-25 |
20220269719 | METHOD OF PERSONALIZED IMAGE AND VIDEO SEARCHING BASED ON A NATURAL LANGUAGE QUERY, AND AN APPARATUS FOR THE SAME - A method of personalized image retrieval includes obtaining a natural language query including a name; replacing the name in the natural language query with a generic term to provide an anonymized query and named entity information; obtaining a plurality of initial ranking scores and a plurality of attention weights corresponding to a plurality of images using a trained scoring model that inputs the anonymized query and the plurality of images; obtaining a plurality of delta scores corresponding to the plurality of images using a re-scoring model that inputs the plurality of attention weights and the named entity information; and obtaining a plurality of final ranking scores by modifying the plurality of initial ranking scores based on the plurality of delta scores. The trained scoring model performs semantic based searching and the re-scoring model determines a probability that faces detected in the plurality of images correspond to the name. | 2022-08-25 |
20220269720 | Image Display Method and Electronic Device - An image display method applied to fields, including artificial intelligence (AI) and human computer interaction, includes detecting an input operation; displaying an image selection interface on a display in response to the input operation; determining at least one image related to the input operation from a group of associated images in a local memory or a cloud storage; displaying a thumbnail of the at least one image in the image selection interface; hiding another image; detecting a first operation where the first operation selects a first thumbnail in the image selection interface; and performing, on the first thumbnail, a processing procedure corresponding to the input operation. | 2022-08-25 |
20220269721 | METHOD AND SYSTEM FOR ACQUIRING SPECIES IDENTIFICATION NAMES AND READABLE STORAGE MEDIUM - A method and system for acquiring species identification names and a readable storage medium are provided. The method includes: identifying a species image provided by a user according to a species identification model and acquiring a species name; acquiring a plurality of candidate species names according to a species name database; and acquiring a species identification result name according to geographical area information and/or confidence coefficients of the candidate species names. The candidate species names include a plurality of conventional names. The method further includes: determining whether the species name is present in the pre-established species name database, where the species name database records the common names of a same species in different geographical areas; and selecting a conventional name of the species name corresponding to the geographical area information from the species name database and acquiring and outputting the identification result of the species. | 2022-08-25 |
20220269722 | METHOD AND APPARATUS FOR SEARCHING VOICE, ELECTRONIC DEVICE, AND COMPUTER READABLE MEDIUM - The present disclosure provides a method and apparatus for searching a voice, relates to the technical fields of Internet of Vehicles, smart cabins, voice recognition, etc. An implementation plan is: acquiring voice data recognizing the voice data to obtain corresponding text data; obtaining a mixed-matching data set based on the text data and a preset to-be-matched data set; and filtering the mixed-matching data set based on the to-be-matched data set, to obtain a search result set corresponding to the voice data. | 2022-08-25 |
20220269723 | SONG SIMILARITY DETERMINATION - Aspects of the technology described herein use acoustic features of a music track to capture information for a recommendation system. The recommendation can work without analyzing label data (e.g., genre, artist) or usage data for a track. For each audio track, a descriptor is generated that can be used to compare the track to other tracks. The comparisons between track descriptors result in a similarity measure that can be used to make a recommendation. In this process, the audio descriptors are used directly to form a track-to-track similarity measure between tracks. By measuring the similarity between a track that a user is known to like and an unknown track, a decision can be made whether to recommend the unknown track to the user. | 2022-08-25 |
20220269724 | AUDIO PLAYING METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM - The present application provides an audio playing method, an electronic device, and a computer readable storage medium. The method comprises: recognizing an audio file to be played as a text file containing sentence segmentation symbols; generating respective sentence segmentation tags at positions corresponding to the sentence segmentation symbols in the audio file, according to a correspondence relationship between the audio file and the text file; in response to a trigger operation, determining a target play point according to a current play position of the audio file and respective positions of the sentence segmentation tags; and playing the audio file from the target play point. | 2022-08-25 |
20220269725 | DYNAMIC DETECTION OF CUSTOM LINEAR VIDEO CLIP BOUNDARIES - Described herein are systems and methods for generating a video clip. The video clip may be generated based on applying a query to content metadata to identify a match within a content item. A start boundary and an end boundary for the video clip are determined based on the match(es). | 2022-08-25 |
20220269726 | Automated Field Placement For Uploaded Documents - Users of a database management engine may generate fillable digital documents by mapping interface elements onto form documents. When a user maps interface elements onto a form document, the user may accidentally overlap two or more interface elements. To rectify this, the database management engine may modify the position of one of interface elements based on a set of positioning rules. In addition, the database management engine may identify and suggest mappings to users based on similar documents that have been previously mapped. The database management engine identifies similar documents using information about the document, the user, and the mapping itself. The mapping associated with the most similar document may be provided to the user as a suggested mapping. The database management engine converts the form document and finalized mapping into a fillable digital document. The fillable digital document is sent to recipients, who complete the fillable digital document. | 2022-08-25 |
20220269727 | PROCESSING DATA USING CONTAINERIZED STATE-FREE INDEXING NODES IN A CONTAINERIZED SCALABLE ENVIRONMENT - Systems and methods are disclosed for processing and executing queries in a data intake and query system. The data intake and query system receives raw machine data at an indexing system, and stores at least a portion of the raw machine data in buckets using containerized indexing nodes instantiated in a containerized environment. The data intake and query system stores the buckets in a shared storage system. | 2022-08-25 |
20220269728 | SYSTEM AUTOMATIC DESIGN DEVICE, SYSTEM AUTOMATIC DESIGN METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - A system automatic design device includes: a view generation unit configured to generate a view obtained by converting requirement data using an aspect model and to output the generated view as a pre-update view; a graph conversion unit configured to converting the requirement data or the pre-update view using a graph conversion rule; a requirement data update unit configured to reflect a content of a post-update view obtained after the pre-update view is converted on the requirement data; and a system requirement concretization unit configured to obtain system configuration data, in which the requirement data is concretized, by repeatedly performing operations of: converting the requirement data by the graph conversion unit, or converting the pre-update view into the post-update view by the graph conversion unit, and converting the requirement data by reflecting the content of the post-update view on the requirement data by the requirement data update unit. | 2022-08-25 |
20220269729 | DATA PROPAGATION AND MAPPING SYSTEM - Systems and methods for data propagation and mapping are provided. In an aspect, one or more data entries storing changed information in a first database using a first storage format are identified. The identified data entries are received by the data propagation and mapping system. The received data entries may be filtered to generate a subset of filtered data entries. The filtered data entries are transmitted to a mapping pipeline configured to map a data entry stored in the first storage format to a data entry stored in a second storage format. The mapped data entries are transmitted to a recipient second database storing data entries using the second storage format. | 2022-08-25 |
20220269730 | GRAPH PROCESSING SYSTEM - A graph comprising nodes and edges is stored by a distributed system as a collection of nodes and half-edges stored with their respective nodes. A message processor is associated with a node as needed to process messages passed between nodes, such that a given node has zero or one message processor assigned to it at a given time. Queries of the graph are resolved by processing a first portion of the query at a first node, and forwarding the results with the remaining portions of the query to a node linked by an edge to the present node. | 2022-08-25 |
20220269731 | CONCURRENT AUTOMATIC ADAPTIVE STORAGE OF DATASETS IN GRAPH DATABASES - Techniques for improving database searches are described herein. In an embodiment, a computer-implemented data processing method comprises receiving a request to store a digital data object in a non-graph data repository, the data object comprising one or more first properties, the data object conforming to a first schema of the non-graph data repository; in response to the initiating, concurrently: digitally storing the data object in the non-graph data repository; transforming the data object into one or more nodes and edges of a graph; storing the one or more nodes and edges of the graph in a graph data repository that is separate from the non-graph data repository; electronically receiving a search query that specifies a path-based search; in response to receiving the search query: transforming the search query into a graph search query; submitting the graph search query to the graph data repository; receiving a result set of nodes from the graph data repository; transforming the result set of nodes into a set of corresponding data objects in the non-graph data repository; providing the set of corresponding data objects as output in a computer display. | 2022-08-25 |
20220269732 | GENERATION OF A RECOMMENDATION FOR AUTOMATIC TRANSFORMATION OF TIMES SERIES DATA AT INGESTION - In a computer-implemented method for generating a recommendation for automatic transformation of times series data at ingestion, historical query data of a time series data monitoring system is analyzed, where the historical query data includes a plurality of queries and data associated with execution of the plurality of queries. Based on the analyzing, it is determined whether an execution cost of a query of the plurality of queries can be reduced by performing automatic transformation of at least a portion of times series data accessed responsive to the query at ingestion into the time series data monitoring system. In response to determining that the execution cost of the query can be reduced by performing automatic transformation at ingestion, a recommendation to perform the automatic transformation of the at least a portion of the times series data at ingestion is generated. | 2022-08-25 |
20220269733 | FILTER RECOMMENDATION BASED ON HISTORICAL SEARCH RESULT SELECTION - Techniques for suggesting filters for query terms based on previously selected query results are disclosed. Common characteristics of previously selected query results are presented as a filter. A system trains a machine learning model by obtaining historical data including query characteristics and selected query results. Based on the historical data, the system trains the machine learning model to associate the first filter field with the first search term. The system receives a first query for execution. The system applies the machine learning model to the first query to identify the first filter field as a suggestion. The system: recommends the first field for filtering a first set of search results corresponding to the first query. Responsive to receiving user input selecting a first value for the first filter field, the system filters using the first value to generate a set of filtered search results, and presents the filtered search results. | 2022-08-25 |
20220269734 | INTELLIGENT NATURAL LANGUAGE DIALOGUE SYSTEMS AND METHODS FOR CREATING INTELLIGENT NATURAL LANGUAGE DIALOGUES FOR EFFICIENT RETRIEVAL OF ITEMS IN ONE OR MORE LARGE DATABASES - Intelligent natural language dialogue systems and methods are described for creating intelligent natural language dialogues for efficient retrieval of items in one or more large databases. An intelligent dialogue model is trained with feature-value pair(s) corresponding to natural language phrase(s) defining respective feature-specific intents. The intelligent dialogue model interprets the audible utterance of a user to determine user-specific feature-value pair(s), where the audible utterance comprises a natural language phrase corresponding to a feature-specific intent. An item is identified based on a matching score determined from the user-specific feature-value pair(s) compared with one or more item definitions defined in a database. | 2022-08-25 |
20220269735 | METHODS AND SYSTEMS FOR DYNAMIC MULTI SOURCE SEARCH AND MATCH SCORING OF SOFTWARE COMPONENTS - Systems and methods for retrieving and automatically ranking software component search results are provided. An exemplary method includes parsing a search query to extract search entities, assigning each of the search entities a weight value, identifying software component sources based on the search entities, searching the software component sources for software components, retrieving software components, comparing each of the software components with each of the search entities and generating similarity scores based on each comparison, generating match scores by proportionally combining each of the similarity scores with a weight value, mapping the match scores to the software components, generating a combined match score for each of the software components by combining one or more mapped match scores associated with each of the software components, and generating a ranking of the software components based on the combined match scores. | 2022-08-25 |
20220269736 | IDENTIFYING WEB ELEMENTS BASED ON USER BROWSING ACTIVITY AND MACHINE LEARNING - A computer-implemented method includes tracking, by a computing device, user browsing activity of a first page having known elements; mapping, by the computing device, the user browsing activity to the known elements; storing, by the computing device, mapping information that maps the user browsing activity to the known elements; tracking, by the computing device, user browsing activity of a second page having unknown elements; identifying, by the computing device, the unknown elements based on the mapping information and the user browsing activity of the second page; and executing, by the computing device, one or more computer-based instructions based on the determining the unknown elements that were identified. | 2022-08-25 |
20220269737 | SYSTEMS AND METHODS FOR HOST NAME BASED NETWORK DEVICE PRE-RECOGNITION AND DISCOVERY - Various approaches for identifying possible unsecured devices on a network as set forth. In some cases, approaches discussed relate to systems and methods for identifying possible unsecured devices based upon a host name for each of the discovered devices. | 2022-08-25 |
20220269738 | AGGREGATE COMPONENT FOR PARALLEL BROWSER-INITIATED ACTIONS - Database systems and methods are provided for visual design and customization of processes for web applications. A method involves identifying a plurality of configured actions added to an aggregate action component region on a graphical user interface (GUI) display, automatically generating configured code for each of the configured actions in accordance with a respective user configuration of the respective configured action, identifying a user configuration associated with the aggregate action component, automatically generating aggregate action component code configurable to cause a browser application to initiate the configured code for each of the configured actions in parallel in accordance with the user configuration, and automatically generating process flow code including a reference to the aggregate action component code in accordance with a sequence defined for a web page. | 2022-08-25 |
20220269739 | SEARCH AND RETRIEVAL OF KEYED DATA MAINTAINED USING A KEYED DATABASE - This document describes a digital component deduplication system for generating packetized data with encryption tokens for transmittal over one or more packetized networks. A packetized data search determines that an encryption token is included with the packetized data. The encryption token includes keyed data representing a first digital component. The packetized data search engine searches the keyed database to identify contents, in the keyed database, of one or more entries that includes the keyed data representing the first digital component. A list of candidate digital components is generated. For candidate digital components associated with a data interface for requesting an eligibility value from a second client device associated with the candidate digital component, a security server generates, using the data interface, additional packetized data comprising i) a request for the eligibility value from the second client device, and ii) the encryption token. | 2022-08-25 |
20220269740 | CONTEXTUAL EDITING IN A PAGE RENDERING SYSTEM - Exemplary embodiments allow contextual editing to proceed in real time while the editor views the actual web page (or other page) being edited. The editing may change the underlying content without changing the look and feel of the web page. Example embodiments enable an editor or web page developer to make changes to already published content by changing cached or locally stored content without changing the original content stored in databases. | 2022-08-25 |
20220269741 | GENERATING SEQUENTIAL SEGMENTS WITH PRE-SEQUENCE OR POST-SEQUENCE ANALYTICS DATA - This disclosure generally covers systems and methods that create sequential segments from analytics data to enable investigation of events that occurred before or after a certain sequence of events—that is, pre-sequence or post-sequence events. In particular, certain embodiments of the disclosed systems and methods receive a segment query of certain analytics data to identify events that occurred before or after a defined sequence of events within a network and—in response to the segment query—provide a query result that identifies pre-sequence events or post-sequence events. By providing such query results, the disclosed systems and methods enable users to examine correlations between a sequence of events and any pre-sequence or post-sequence events, including any data associated with those events at a granular level. | 2022-08-25 |
20220269742 | MICROAPP SUBSCRIPTION RECOMMENDATIONS - A system that comprises a microapp server includes a memory and at least one processor coupled to the memory. The microapp server is configured to generate a recommendation to modify a set of one or more subscribed microapps. The microapp server is configured to gather observational data that characterizes interactions of a user with an endpoint. The user is associated with the set of one or more subscribed microapps. The microapp server is further configured to identify, based on the observational data, a modification to the set of one or more subscribed microapps. The microapp server is further configured to send, to an administration console, the recommendation to modify the set of one or more subscribed microapps in accordance with the identified modification. | 2022-08-25 |
20220269743 | METHODS AND SYSTEMS FOR DYNAMIC SEARCH LISTING RANKING OF SOFTWARE COMPONENTS - Systems and methods for automatically generating search list rankings of software components are provided. An exemplary method includes generating a list of software components in response to a request, generating ranking parameters, determining first weight values correlating with each of the ranking parameters, generating an index correlating each of the software components with each of the ranking parameters, parsing web data to populate the index, determining, via the ranking parameters, scores for each of the software components, storing the scores on the index, applying the first weight values to the scores on the index, and generating, for each of the software components, a combined score, wherein the combined score is a combination of each of the scores that are associated with each of the software components. | 2022-08-25 |
20220269744 | METHODS AND SYSTEMS FOR ENABLING DYNAMIC FILTERS FOR SOFTWARE SEARCH OPTIMIZATION - Methods and systems for enabling dynamic filters for software search optimization are disclosed. In one aspect, a method includes receiving a search request, user requirements, and the user preferences from the search system, computing one or more filters from a list comprising a programming language filter, a software component license filter, a software component sources filter, a software component support provided filter, a software component type filter, an industry domain filter choices, and a software component security filter, generating a filter widget based on the one or more computed filters, and applying the filter widget crawling internet sources to provide search results. | 2022-08-25 |
20220269745 | System and Methods for Scrubbing Social Media Content - The disclosed embodiments provide a system for collecting and analyzing data on individual social media for the purpose of detecting and deleting harmful posts. In certain embodiments, the system relies on application programmable interfaces to fetch user posts and local servers to perform profanity and toxicity checks on aforementioned user posts. | 2022-08-25 |
20220269746 | System and Methods for Standardizing Scoring of Individual Social Media Content - The disclosed embodiments provide systems and methods analyzing social media content using artificial intelligence/machine learning algorithms. In certain embodiments, the system collects social media data from one or more third-party social media networks associated with the user, where the social media data is comprised of two or more of post reactions, post comments, posting frequency, profile picture, public posting setting, grammar, and predetermined keywords. The system then analyzes, using a machine learning algorithm, the social media data of the user to calculate a social impact score for the user, and transmits the social impact score to the user. In some embodiments, the social impact score is calculated relative to other social impact scores. | 2022-08-25 |
20220269747 | QR CODE ACCESS RESTRICTION WITHOUT GEOLOCATION KNOWLEDGE - Provided herein are system, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for controlling access to a website. In some embodiments, a user scans a machine-readable indicia with their mobile device to access a backend redirect page. The backend redirect page receives the access request, generates a unique session identifier, and configures a dynamic address based on the unique session identifier. The backend redirect page redirects the mobile device to an intake page of a website using the dynamic address for that page. Whenever the user attempts to load a page in the website using the corresponding dynamic address, an intake backend for frontend verifies the validity of the unique session identifier associated with the dynamic address. A session monitor tracks the amount of time since the unique session identifier was generated and invalidates the unique session identifier after a predetermined amount of time has passed. | 2022-08-25 |
20220269748 | ASSIGNING VARIANTS OF CONTENT TO USERS WHILE MAINTAINING A STABLE EXPERIMENTAL POPULATION - A variation testing system environment for performing variation testing of web pages and applications is disclosed. The variation testing system applies a weighted consistent hash function to user attributes of users to assign the users to a variant of a web page that is undergoing experimentation. The usage of the weighted consistent hash function allows for a stable experimental population. | 2022-08-25 |
20220269749 | Web Browser Communication Validation Extension - A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are installed on the computing device. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTP request to a known service via the web browser. The secure browser extension receives a response to the HTTP request via the web browser. The secure browser extension determines whether the received response is an HTTP response (e.g., from an unauthorized application) or a non-HTTP response (e.g., from the known service). Based on determining the received response is an HTTP response, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised. | 2022-08-25 |
20220269750 | COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING DEVICE - An information processing device of solving of a shortest vector problem using an annealing computer that performs a single-spin flip, the information processing device including: a memory; and a processor coupled to the memory, the processor being configured to perform processing, the processing including: dividing the shortest vector problem including a basis vector into a predetermined number of ranges, the basis vector being a multidimensional integer vector; generating, for each of the predetermined number of ranges, a specific term that causes a transition of a linear sum of specific variables among respective variables included in the basis vector; and generating, for each of the predetermined number of ranges, a Hamiltonian of a pseudo-multi-spin flip in which the specific term is added to the Hamiltonian of the single-spin flip. | 2022-08-25 |
20220269751 | METHODS AND DEVICES FOR OPTIMIZING PROCESSES AND CONFIGURATIONS OF APPARATUSES AND SYSTEMS - A computer-implemented method is provided whereby an equation with a cost function for minimization is solved by a tensor network. Coefficients of tensors of the tensor network are modified so as to reduce a value of the cost function in an iterative process until convergence is reached, at which point the concerned Unconstrained Optimization problem is solved and the values of the variables of the cost function are provided. | 2022-08-25 |
20220269752 | EXECUTION METHOD FOR CONVOLUTION COMPUTATION - An execution method for convolution computation is disclosed, which includes: dividing an input image of N channels into a first tile to an X-th tile according to a feature tile; sequentially performing convolution computations on the data in the first tile to the X-th tile of the input image of the N channels, and storing the computation results as output data; mapping the data in each of the tiles by a kernel, and performing multiply-accumulate operations on the mapped data in each of the tiles, wherein each time the multiply-accumulate operation performed on the data mapped by the kernel is complete, the kernel is shifted to change the mapped data in said tile, and multiply-accumulate operation is performed on the changed mapped data until the multiply-accumulate operations performed on all of the data in said tile are complete, thereby finishing the convolution computation of said tile. | 2022-08-25 |
20220269753 | Floating Point Dot Product Multiplier-Accumulator - A vector dot product multiplier receives a row vector and a column vector as floating point numbers in a format of sign plus exponent bits plus mantissa bits. The dot product multiplier generates a single dot product value by separately processing the sign bits, exponent bits, and mantissa bits in a few pipelined stages. A first pipeline stage generates a sign bit, a normalized mantissa formed by multiplying pairs multiplicand elements, and exponent information. A second pipeline stage receives the multiplied pairs of normalized mantissas, performs an adjustment, performs a padding, complement, and shift, and sums the results in an adder stage. The resulting integer is normalized to generate a sign bit, exponent, and mantissa of the floating point result. | 2022-08-25 |
20220269754 | DECENTRALIZED SYSTEM AND METHOD FOR ASSET REGISTRY AND AUTHENTICATION - The present disclosure provides a decentralized system and method for Asset registry and authentication in a public blockchain. Each Asset represented by a Non-Fungible Token (NFT) as the unique, immutable, and irrefutable fingerprint, which upon creation is recorded in a block of a public blockchain architecture. The data can include authorship, ownership, transfer history and the date of creation of the Asset for operations such as priority decisions with respect to other Assets or infringement cases. Once registered the owner will be granted a right to use an official symbol or logo alongside the Asset as proof of the registration and validity of the Asset to warn/inform any individual that the asset has been registered in a public blockchain. | 2022-08-25 |
20220269755 | Graphical User Interface and Console Management, Modeling, and Analysis System - One or more graphical user interfaces (GUIs) and/or a console management, modeling, and analysis system is described. In some embodiments, the GUI and/or management system can be used to analyze investment purchases and/or sales. In some embodiments, users may be allowed to enter data used to produce dynamic models. In some embodiments, data may be aggregated from various users and/or sources to provide adaptive, dynamic models and/or projections. | 2022-08-25 |
20220269756 | Graphical User Interface and Console Management, Modeling, and Analysis System - One or more graphical user interfaces (GUIs) and/or a console management, modeling, and analysis system is described. In some embodiments, the GUI and/or management system can be used to analyze investment purchases and/or sales. In some embodiments, users may be allowed to enter data used to produce dynamic models. In some embodiments, data may be aggregated from various users and/or sources to provide adaptive, dynamic models and/or projections. | 2022-08-25 |
20220269757 | Graphical User Interface and Console Management, Modeling, and Analysis System - One or more graphical user interfaces (GUIs) and/or a console management, modeling, and analysis system is described. In some embodiments, the GUI and/or management system can be used to analyze investment purchases and/or sales. In some embodiments, users may be allowed to enter data used to produce dynamic models. In some embodiments, data may be aggregated from various users and/or sources to provide adaptive, dynamic models and/or projections. | 2022-08-25 |
20220269758 | SMART LOTO METHOD AND SYSTEM - This invention of Smart LOTO solves frequent safety violation of “Lock Out Tag Out” practice. While the violations often caused by poor human behavior of forgetting or ignoring the LOTO practice during maintenance, the Smart LOTO equipped with the following method and system to eliminate the human error: S | 2022-08-25 |
20220269759 | DEVICES AND METHODS FOR SMARTPHONE IMPOSTOR DETECTION USING BEHAVIORAL AND ENVIRONMENTAL DATA - Devices and methods for smartphone impostor detection using behavioral and environmental data are provided. Impostors are attackers who take control of an electronic device (e.g., a smartphone) and gain access to confidential and private information of a legitimate user. Embodiments described herein propose a defense-in-depth mechanism to detect impostors quickly with simple deep learning algorithms, which can achieve better detection accuracy than previous works. Embodiments then consider protecting the privacy of the behavioral and/or environmental data (e.g., collected by one or more sensors) of a user by not exposing it outside the protected device. A recurrent neural network (RNN)-based deep learning algorithm is proposed which uses only sensor data of the legitimate user to learn their normal behavior. Prediction error distribution (PED) is used to enhance the detection accuracy. In some embodiments, a minimalist hardware module, dubbed smartphone impostor detector (SID), is integrated into smartphones for self-contained impostor detection. | 2022-08-25 |
20220269760 | VEHICLE AND FINGERPRINT AUTHENTICATION METHOD OF THE VEHICLE - The disclosure relates to a vehicle and a fingerprint authentication method of the vehicle, and is aimed to enable a user to more conveniently perform user authentication through concretization of a fingerprint authentication process. The vehicle according to the disclosure includes a start button configured to start an engine; and a fingerprint recognition module including a fingerprint sensor provided in a portion of the start button and configured to recognize a user's fingerprint for fingerprint authentication, the fingerprint recognition module configured to perform service interworking authentication for using a service provided in the vehicle and fingerprint recognition starting authentication for starting the engine, and process the service interworking authentication when a request for the service interworking authentication and a request for the fingerprint recognition starting authentication are issued at the same time. | 2022-08-25 |
20220269761 | COGNITIVE MULTI-FACTOR AUTHENTICATION - User authentication is an extremely important process in many applications and industries. Because of its importance, most security-sensitive user authentication processes employ an automatic multi-factor authentication process that involves confirming a SMS message, answering a security question, entering a PIN, etc. However, even these auto multi-factor authentication processes are vulnerable to attack and hack. For example, some facial recognition authentication processes can be defeated using a picture. Voice print can also be duplicated using a previous recording of the user's voice. As such, most financial institutions employ some form of human involvement (on top of multi-factor authentication) to authenticate a user for high security sensitive situations. The cost for performing authentication with human involvement can be very expensive. Accordingly, what is needed is an automatic multi-factor authentication process that is less prone to hack and workaround such as using a picture to defeat facial recognition processes. | 2022-08-25 |
20220269762 | VOICE CONTROL METHOD AND RELATED APPARATUS - A voice control method is provided, including: when an electronic device is in a screen-locked state, detecting a first operation (S | 2022-08-25 |
20220269763 | TAILORING ADMINISTRATION OF AEROSOLIZED BIOACTIVE MATERIAL - The present invention extends to methods, systems, and computer program products for tailoring administration of aerosolized bioactive material. Aspects include communicating biological and subjective information to support formulation of personalized bioactive material compositions. Aerosolized bioactive materials can be administered to humans, via inhalation, using a vaporizer device which is engineered for real time data capture, and communication, with a software application and backend computational system. Smart vaporizer cartridges can be identified and their contents recalled. Based at least on contents, appropriate (e.g., precision) doses of bioactive material can be aerosolized and administered. Users have the ability to electronically exchange and communicate in real time with the provisioning organization and medical practitioners via telemedicine and can directly participate in clinical trials pertaining to the bioactive material(s) in formulations within the smart vaporizer cartridge and elsewhere. | 2022-08-25 |
20220269764 | MOBILE OPTICAL VIEW ENVIRONMENT - Techniques are disclosed for managing a device. The techniques include determining whether a user is detected based on one or more authentication devices or one or more persistent presence monitors; and based on the result of the detection, allowing or denying access to the device. | 2022-08-25 |
20220269765 | BIOMETRIC AUTHENTICATION DEVICE, BIOMETRIC AUTHENTICATION METHOD, AND COMPUTER READABLE MEDIUM - A measurement unit ( | 2022-08-25 |
20220269766 | VALET KEY DISTRIBUTION SYSTEM - A valet key distribution system distributes key information of a vehicle among the vehicle, an owner terminal, and a guest terminal. The vehicle includes a vehicle-side storage storing a vehicle-side owner private key, a vehicle-side distribution key, a vehicle-side variable value, and a vehicle-side one-time password; and a vehicle-side controller controlling running of the vehicle and performing information processing. The owner terminal includes an owner-terminal input unit receiving an operation instruction from a utilization manager of the vehicle; an owner-side storage storing a terminal-side owner private key, a terminal-side distribution key, a terminal-side variable value, and a terminal-side one-time password; and an owner-side controller performing information processing. The guest terminal includes a guest-terminal input unit receiving an operation instruction from a temporary user of the vehicle; a guest-side storage storing the terminal-side distribution key and the terminal-side one-time password received; and a guest-side controller performing information processing. | 2022-08-25 |
20220269767 | USER INTERFACE FOR MANAGING ACCESS TO CREDENTIALS FOR USE IN AN OPERATION - The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element. | 2022-08-25 |
20220269768 | FACIAL RECOGNITION BY A SECURITY / AUTOMATION SYSTEM CONTROL PANEL - Example implementations include a method, apparatus, and computer-readable medium comprising determining, by a processor of a control panel, that a security event has happened, wherein the security event is associated with a user identification or authentication; capturing one or more still images or videos by at least one camera in the control panel subsequent and in response to determining that the security event has happened; and using the one or more still images or videos to perform facial recognition. | 2022-08-25 |
20220269769 | DELEGATING MULTI-FACTOR AUTHENTICATION IN LEGACY DATABASES - Embodiments of the present disclosure relate to utilizing an existing login process of a data repository to enable the data repository to delegate MFA functionality to an external MFA system. When a purported user attempts to log in to the data repository, a delegation module within the login process may insert a record into a table associated with the login process. A program executing on a security device external to the data repository may periodically poll the table for new records and upon detecting the new record, may call the external MFA system to verify the login attempt. The external MFA system may indicate to the program whether the login attempt was verified and the program may update the table with the indication. Upon detecting the indication, the delegation module may complete or terminate the login attempt based on the indication. | 2022-08-25 |
20220269770 | INFORMATION PROCESSING SYSTEM, SERVER APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an information processing system includes a first activation key storage unit that stores an activation key that validates a device key used, an activation key identifier that identifies the activation key, a maximum activation number indicating a number of the device keys that the activation key is capable of validating, and a current activation number indicating a current number of device keys validated with the activation key; and a processing unit that stores a first device key in a first device key storage unit in a case where a first current activation number of a first activation key identified by a first activation key identifier is less than a first maximum activation number, when the processing unit receives an activation request including the first device key and the first activation key identifier from the device. | 2022-08-25 |
20220269771 | Systems and Methods for Generating and Using Anthropomorphic Signatures to Authenticate Users - The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold. | 2022-08-25 |
20220269772 | SECURE PRECONFIGURED PROFILE FOR ROLE-BASED ACCESS CONTROL SETUP - Described are techniques for a secure roles-based access control (RBAC) setup during boot of a connected computational system. The techniques include a method comprising deploying a preconfigured default user profile during booting of a computational system. The techniques further include creating, using the preconfigured default user profile, a plurality of user profiles having administrator and/or root authorities, where each of the plurality of user profiles is associated with a respective custom password. The techniques further include completing booting of the computational system using the plurality of user profiles having the administrator and/or root authorities. | 2022-08-25 |
20220269773 | EXECUTION CODE PROVISION METHOD AND SOFTWARE DEVELOPMENT SYSTEM - A solution can ensure the security of an application program. An execution code provision method includes: a step of generating a source code according to a user operation; a step of generating an intermediate representation from the source code; a step of verifying whether or not the intermediate representation satisfies a predetermined rule or regulation; and a step of realizing execution of an execution code generated from the intermediate representation when the intermediate representation satisfies the predetermined rule or regulation. | 2022-08-25 |
20220269774 | METHODS, MEDIA, AND SYSTEMS FOR SCREENING MALICIOUS CONTENT FROM A WEB BROWSER - Methods, media and systems for screening content for malicious content in a web browser are disclosed. Document object model (DOM) elements are retrieved from the content displayed in the web browser. A link to visit a web site included in the DOM elements is identified. The identified link is compared to a list of permitted sources. Information is scanned to determine whether the information matches records of content transmitted by a primary source among the permitted sources. An alert is generated after determining a mismatch between the information in the DOM elements and records of content transmitted by the primary source. | 2022-08-25 |
20220269775 | FUNCTION POINTER PROTECTION - A system includes a memory and a processor in communication with the memory. The processor is configured to supply a library with a list of safe callback values, protect the list of safe callback values, invoke a callback, and validate the callback against the list of safe callback values to determine a status of the callback. The status of the callback is one of safe and unsafe. Additionally, the processor is configured to execute the callback responsive to determining the status of the callback is safe. The processor is also configured to abort the callback responsive to determining the status of the callback is unsafe. | 2022-08-25 |
20220269776 | METHODS AND APPARATUS FOR COMPREHENSIVE USER-CENTRIC PROTECTION OF DIGITAL ASSETS - Methods, apparatus, systems, and articles of manufacture for comprehensive user-centric protection of digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to identify digital assets associated with a protection threat surface, detect protection events corresponding to threats associated with the digital assets, and determine protection vectors associated with the digital assets based on the protection events, the protection vectors corresponding to protection capabilities associated with the digital assets. | 2022-08-25 |
20220269777 | APPARATUS AND METHOD FOR DETECTING VIOLATION OF CONTROL FLOW INTEGRITY - Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers. | 2022-08-25 |
20220269778 | SECURE COMPUTER ARCHITECTURE USING STATE MACHINES - A computing architecture using at least one state machine to apply security rules to an execution pipeline of a computing device (e.g., microprocessor) and generate error notifications (e.g., hardware exceptions) when content within the execution pipeline impacts computer security. | 2022-08-25 |
20220269779 | TRAINING DEVICE, DETECTION SYSTEM, TRAINING METHOD, AND TRAINING PROGRAM - A learning apparatus includes: a first estimation unit—configured to learn normal communication data, estimate probability density of the normal communication data, and update a parameter of a model; a clustering unit configured to cluster the normal communication data according to the probability density estimated by the first estimation unit; a second estimation unit configured to perform learning for each of clusters resulting from the clustering by the clustering unit, and estimate the probability density of the normal communication data of the cluster and update a parameter of a model representing characteristics of the probability density of the normal communication data of the cluster by using, as an initial value of the parameter, a parameter having already been learned in the first estimation unit; and an integration unit configured to integrate the estimated probability density of the clusters. | 2022-08-25 |
20220269780 | SYSTEMS AND METHODS FOR CYBER SECURITY THREAT DETECTION AND EXPEDITED GENERATION OF INVESTIGATION STORYBOARDS USING INTELLIGENT CYBER SECURITY AUTOMATIONS - A system and method for generating a digital cybersecurity artifact includes selectively executing an automated cybersecurity investigation workflow based on a probable cybersecurity threat type of a cybersecurity event, wherein an output of the automated cybersecurity investigation workflow includes one or more corpora of investigation findings data in response to executing the automated cybersecurity investigation workflow; selectively instantiating a digital cybersecurity artifact of a plurality of digital cybersecurity artifacts based on the probable cybersecurity threat type of the cybersecurity event, wherein the digital cybersecurity artifact includes a plurality of distinct regions electronically mapped to one or more threat type-specific content automations that, when executed, install investigation findings data into the plurality of distinct regions of the plurality of distinct regions of the digital cybersecurity artifact with selective subsets of investigation findings data of the one or more corpora of investigation findings data. | 2022-08-25 |
20220269781 | Intelligent Friction for Authentication Methods and Systems - A system and a method for providing intelligent friction by receiving user information based on an interaction of a user with a user interface; and providing intelligent friction through the user interface using an intelligent system. This may comprise changing the user interface relative to a baseline based on the user information. Intelligent friction may provide changes to the user interface. The system may increase security and prevent unauthorized access by bad actors. The system may be less susceptible to hacking by altering how verification or authentication is performed. Systems using intelligent friction may be easily implemented because they may be less reliant on user devices. Rather than requiring multiple communication channels as may be the case in multi-factor authentication, intelligent friction may be advantageously carried out with the user using mobile devices of low complexity. | 2022-08-25 |
20220269782 | DETECTION OF MALICIOUS CODE THAT IS OBFUSCATED WITHIN A DOCUMENT FILE - The technology disclosed relates to cybersecurity attacks and cloud-based security, and specifically to the detection of malicious code that is obfuscated within document files. Such malicious code can be delivered in the form of malicious macros and/or malicious OLE objects stored within document files. The technology disclosed detects obfuscated and malicious code using a trained machine learning model to predict which documents include malicious code, despite such malicious not having a known signature. The technology disclosed can thus predict which documents include malicious code lacking a known signature. Safe documents are allowed into the network. Suspicious documents are subjected to additional processing, including quarantining or sandboxing methods. Malicious documents are rejected from the network. In a further aspect, the disclosed technology combines machine learning with other network security methods, to further increase the capability of a network security system to detect malicious macros and malicious OLE files. | 2022-08-25 |
20220269783 | DIGITAL PROTECTION THAT TRAVELS WITH DATA - The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device. | 2022-08-25 |
20220269784 | N-DIMENSIONAL MODEL TECHNIQUES AND ARCHITECTURES FOR DATA PROTECTION - Techniques and architectures include representing data with one or more n-dimensional representations and using one or more analysis models to identify target properties associated with the one or more n-dimensional representations. For example, data can be represented as a plurality of points in a coordinate system. A set of points in the plurality of points can be identified and an n-dimensional model can be generated for the set of points. The n-dimensional model can be compared to a plurality of n-dimensional models that are tagged as including a target property associated with malicious behavior, benign behavior, and/or a vulnerability. Based on the comparison, a likelihood can be determined that the data includes the target property. | 2022-08-25 |
20220269785 | ENHANCED CYBERSECURITY ANALYSIS FOR MALICIOUS FILES DETECTED AT THE ENDPOINT LEVEL - Embodiments herein relate to identifying, by an electronic device based on a signature that identifies a file, a first parameter of the file. The electronic device can further identify, based on a behavior of the file that is to occur if the file is executed, a second parameter of the file. The electronic device can further identify a first value based on the first parameter and a second value based on the second parameter. The electronic device can further identify, based on the first value and the second value, a probability that the file is malware. The electronic device can further output an indication of the probability. Other embodiments may be described or claimed. | 2022-08-25 |
20220269786 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUM - An information processing apparatus ( | 2022-08-25 |
20220269787 | A SYSTEM AND METHOD FOR SECURING ELECTRONIC DEVICES - The present invention discloses a system for authenticating and securing message/instruction transmission, including a hardware processing unit for testing the validity of original message or derivative of the original message by running specific firmware code resulting first test results, a software processing unit, for testing the validity of the original message or derivative of the original message by running specific software code, for resulting a second test result, and a logic comparison module, for comparing between the first and the second test results, wherein the comparison authenticates the message. The testing is performed simultaneously at the hardware processing unit and the software processing unit. According to some embodiments of the present invention the logic comparison module is implemented as a hardware module including a gates array including at least one logic gate | 2022-08-25 |
20220269788 | Remote Attestation Method, Apparatus, System, and Computer Storage Medium - A remote attestation method implemented by a network device where the network device obtains an integrity measurement value of a measurement object in the network device, and sends the integrity measurement value of the measurement object to at least one of a plurality of remote attestation (RA) servers to enable the at least one RA server to perform remote attestation on integrity of the measurement object in the network device. | 2022-08-25 |
20220269789 | COMPUTER SYSTEM SECURITY SCAN AND RESPONSE - A testing computer system communicates with a client computer system coupled to one or more target computer systems. The testing computer system sends test payloads to the client computer system, which are forwarded to the target computer systems. Based on the test results generated by the target computer system, the testing computer system generates a runtime payload that is executable to perform a response to a security breach identified using the test results and sends the runtime payload to the client computer platform for execution. The testing computer system receives from the client computer platform an indication of the execution of the runtime payload. | 2022-08-25 |
20220269790 | REAL-TIME AUTOMATED COMPLIANCE DEVIATION MONITORING AND REMEDIATION - Real-time automated remediation for compliance and deviation monitoring and remediation is provided. A compliance and security monitoring container pods orchestration environment may be configured to monitor an asset of a project or any project update to the project's configuration, asset, or assets hosted by a cloud computing environment, vulnerability of software hosted by the project and security of authorized end point devices accessing project resources. Upon triggering the compliance monitoring container pods orchestration environment to evaluate the asset for compliance, a compliance monitoring verification is performed to evaluate the asset to determine whether the asset is in a compliant state or a violation state. If the asset is in the violation state, then automated remediation is performed for the asset, wherein the automated remediation comprises at least one of performing a real-time automated remediation action for the asset or generating a real-time notification of a security compliance violation or deviation. | 2022-08-25 |
20220269791 | SYSTEM AND METHOD FOR AUTOMATICALLY IDENTIFYING SOFTWARE VULNERABILITIES USING NAMED ENTITY RECOGNITION - An apparatus includes a memory and a processor. The memory stores descriptions of known vulnerabilities and information generated by a monitoring subsystem. Each description of a known vulnerability identifies software components that are associated with the known vulnerability. The monitoring subsystem monitors software programs that are installed within a computer system. The information includes descriptions of issues that are associated with the software programs. The processor generates a set of mappings, based on a comparison between the text describing the known software vulnerabilities and the text describing the issues. Each mapping associates a software program that is associated with an issue with a known software vulnerability. The processor also uses a machine learning algorithm to predict that a given software program is associated with a particular software vulnerability. In response to predicting that the given software program is associated with the particular software vulnerability, the processor generates an alert. | 2022-08-25 |
20220269792 | IMPLEMENTING A MULTI-DIMENSIONAL UNIFIED SECURITY AND PRIVACY POLICY WITH SUMMARIZED ACCESS GRAPHS - A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions. | 2022-08-25 |
20220269793 | FILE VULNERABILITY DETECTION SYSTEM AND DETECTION METHOD THEREOF - A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vulnerability. | 2022-08-25 |
20220269794 | CONTENT MATCHING AND VULNERABILITY REMEDIATION - An example method matches content, such as files and file snippets, using one or more scalable knowledge bases. The example method includes the following operations: receiving input content through a user interface; generating a whole file signature representing an entirety of the input content, where the whole file signature is based on a hash of the input content; searching a first knowledge base for a file having a whole file signature that matches the generated whole file signature; processing the input content to identify a snippet of content in a second knowledge base based on signature vector corresponding to the input content; generating a report based on at least one of the file or the snippet of content; and displaying the report on a user interface | 2022-08-25 |