37th week of 2021 patent applcation highlights part 46 |
Patent application number | Title | Published |
20210286814 | STORAGE OF GENERIC TIME SERIES DATA USING DYNAMIC SCHEMA - Techniques are provided for storing generic time series data using a dynamic schema. One method comprises receiving a request to store a data point into a time series, wherein the data point comprises a key-value pair; in response to the received request, (i) evaluating whether a current dynamic schema supports the data point, and (ii) updating the current dynamic schema to support the data point responsive to the current dynamic schema not supporting the data point, wherein the current dynamic schema supports a plurality of data types; encoding the data point using an encoding technique that depends on the data type of at least one key-value pair of the data point; and storing the data point in a time series storage buffer. | 2021-09-16 |
20210286815 | SYSTEMS AND METHODS FOR ACCESSING A DATABASE MANAGEMENT SYSTEM - Disclosed is a method of accessing a network of relationship instances and data field values of entity instances in a combined entity relationship- and relational-model database management system. The method comprises the steps of receiving a query that natively references relationship types including data fields to be accessed; parsing the query into a parse tree; converting the parse tree to a query graph; optimising the query graph by consolidating equivalent nodes in the query graph; analysing the nodes in the optimised query graph; codifying each node of the optimised query graph into a first table of state transition rules; codifying the data fields to be accessed into a second table of field rules; preparing a query that includes the first and second tables; identifying entity instances to be accessed by the prepared query by iteratively following relationship instances according to the first table; and loading data fields of the identified entity instances according to the second table. | 2021-09-16 |
20210286816 | SYSTEM AND METHOD FOR DISJUNCTIVE JOINS - Joining data using a disjunctive operator is described. An example computer-implemented method can include receiving a query that includes a first disjunctive predicate involving a first table and a second table. The method may also include determining a first set of rows from the first table and generating a filter from the first set of rows. The method may also further include applying the filter to the second table to generate a second set of rows. Additionally, the method may also include joining the first set of rows and the second set of rows using a first disjunctive operator of the first disjunctive predicate to generate a first results set. | 2021-09-16 |
20210286817 | SYSTEM AND METHOD FOR DISJUNCTIVE JOINS USING A LOOKUP TABLE - Joining data using a disjunctive operator using a lookup table is described. An example computer-implemented method can include receiving a query with a set of conjunctive predicates and a set of disjunctive predicates. The method may also include generating a lookup table for each predicate in the sets of conjunctive predicates and disjunctive predicates. The method, for each row in a probe-side table, may also further include looking up a value associated with that row in each of the lookup tables and adding the row to a results set when there is a match. Additionally, the method may also include returning the results set. | 2021-09-16 |
20210286818 | Automatic Control Loop Searching - Concepts and technologies disclosed herein are directed to automated control loop searching (“ACLS”). According to one aspect disclosed herein, an ACLS system can create a search model that provides high-level information regarding what the ACLS system should search for when a search pattern is detected within data that is output from execution of a control loop. The ACLS system can activate a control loop system that executes the control loop to yield the data as output. The ACLS system can detect the search pattern within data, and in response, the ACLS system can execute, based upon the search model, a search of the data. The ACLS system can collect search results of the search and select additional data from the search results. | 2021-09-16 |
20210286819 | Method and System for Operation Objects Discovery from Operation Data - A method and system for operation objects discovery from operation data includes performing pattern matching of operation data with patterns in a database. Fields in the operation data are identified as having matching patterns with the database as first potential objects. Data profiling is performed on unmatched fields of the operation data to generate data profiles. The data profiles are field classified and second potential objects are generated. The first potential objects and the second potential objects are de-duplicated, and operation objects are generated. | 2021-09-16 |
20210286820 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a memory storing, in an associated form, attribute information assigned to a document and information that indicates whether the attribute information is first attribute information that a user is not enabled to assign or second attribute information that the user is enabled to assign and one or multiple processors configured to perform first search on the attribute information on the document using the first attribute information in a search formula and second search on the attribute information on the document using the second attribute information in the search formula. | 2021-09-16 |
20210286821 | AUTO-GENERATING GROUND TRUTH ON CLINICAL TEXT BY LEVERAGING STRUCTURED ELECTRONIC HEALTH RECORD DATA - A method improves performance of natural language processing by automatically generating ground truth from electronic health records comprising unstructured clinical notes and structured data comprising entries each having respective values for fields. The method includes: linking a given one of the notes to a given one of the entries responsive to determining that a specified field within the given entry matches an item of metadata for the given note; determining an initial set of the notes which satisfy criteria selected such that the criteria are a proxy for the ground truth, wherein the given note is determined to satisfy the criteria based at least in part on the given entry linked thereto; and designating at least a portion of the initial set of notes which satisfy the criteria, and the entries linked to the portion of the initial set of notes which satisfy the criteria, as the ground truth. | 2021-09-16 |
20210286822 | APPLICATION PROGRAMMING INTERFACE ("APIS") FOR ACCESSING AND AMALGAMATING DATA FROM INCONGRUENT SOURCES - A system for accessing and amalgamating entity data from a plurality of inconsistent data sources may be provided. The system may include a plurality of databases. The plurality of databases may include a first database and a second database. The first database may include a first plurality of entity datasets. Each entity dataset of the first plurality of entity datasets may relate to an entity. The first database may include a first database identifier for each entity dataset. The second database may include a second plurality of entity datasets. Each entity dataset of the second plurality of entity datasets may relate to an entity. The second database may include a second database identifier for each entity dataset. One entity dataset included in the first database may relate to the same entity as an entity dataset included in the second database. The system may include an indexing system. | 2021-09-16 |
20210286823 | SYSTEMS AND METHODS FOR INTEGRATED DYNAMIC RUNTIME ETL TOOL AND SCALABLE ANALYTICS SERVER PLATFORM - One embodiment comprises a method in which an integrated multi-user analytics server platform is integrated with a dynamic runtime ETL tool to allow dataflows created or developed in a dynamic runtime environment provided by the ETL tool to be saved in a novel dataflow file container. The method includes: presenting a user interface for an analytics server platform; receiving user input via this user interface indicating an action to be performed as to a first dataflow; the analytics server platform accessing a first file container corresponding to the first dataflow, where the first file container is stored in a data store connected to the analytics server platform; in response to receiving the user input, the analytics server platform accessing APIs of the dynamic runtime ETL tool to initiate the ETL tool, which then performs the action with respect to the first dataflow. | 2021-09-16 |
20210286824 | UPGRADING REPLICATED DATABASES WITH SMALL DOWNTIME - An online system performs upgrades of replicated databases. The online system stores data in a primary site and a secondary site. The primary site comprising databases used to process client requests and a secondary site comprising databases used as standby. The online system upgrades databases of both sites by upgrading the secondary site, switching client requests to the secondary site while using the databases of primary site as standby databases. The online system then upgrades the primary site. The process allows the online system to upgrade databases with small down time. | 2021-09-16 |
20210286825 | CLONING CATALOG OBJECTS - Example systems and methods for cloning catalog objects are described. In one implementation, a method identifies an original catalog object associated with data and creates a duplicate copy of the original catalog object without copying the data itself. The method allows access to the data using the duplicate catalog object and supports modifying the data associated with the original catalog object independently of the duplicate catalog object. The duplicate catalog object can be deleted upon completion of modifying the data associated with the original catalog object. | 2021-09-16 |
20210286826 | Computer-Implemented Method and System for Attribute Discovery for Operation Objects from Operation Data - A system and method for attribute discovery for operation objects from operation data includes segmenting a name of each of a plurality of operation objects based on one or more special characters used in the name of each operation object. A similarity comparison of the operation objects is performed by extracting common subsequences from substrings in operation data in a same log as a target object, and a string similarity is computed of the extracted common subsequences. Numerical attributes are determined by calculating statistical metrics for fields in the log, and additional information of the operation objects is discovered based on the determined numerical attributes. | 2021-09-16 |
20210286827 | COLLABORATION ACTIVITY SUMMARIES - System and methods for summarizing collaboration activity events into a plurality of pages that are then scored with respect to user-specific relevance that is based on a set of comprehensibility characteristic parameters. The collaboration activity events are summarized into groups of activities based on certain common attributes that are deemed to have quantitatively measurable relevance to the user. The groups of activities are assembled into a plurality of personalized candidate pages. The candidate summary pages are then scored using a function that includes parameters that serve to quantify how interesting or readable the particular user would find the particular candidate summary page. One or more of the higher scoring candidate summary pages are selected for presentation to the user. | 2021-09-16 |
20210286828 | Method and System for Relation Discovery from Operation Data - A method and system for relation discovery from operation data includes classifying categories of extracted entities from operation data into three or more classes identified in a knowledge base. A log affiliation of the extracted entities is determined, and relations of the extracted entities are identified according to a log affiliation. The identified relations information of the extracted entities is associated with operation objects of the operation data. | 2021-09-16 |
20210286829 | APPLYING APPROXIMATE MEASURE VALUES FROM DISSIMILAR MAPS - A method including: receiving a base map that is divided into geographical base regions, each of the geographical base regions having a measure of a first parameter; receiving a plurality of secondary maps that are each divided into a plurality of geographical regions, each of the geographical regions having a measure of a secondary parameter; determining a total overlap percentage for each of the secondary maps relative to the base map, the total overlap percentage for one of the secondary maps being an average of overlap percentages of each of the geographical regions of the one of the secondary maps with the geographical base regions of the base map; receiving a selection of one of the secondary maps; and applying the secondary parameter of the selected secondary map to each of the geographical base regions of the base map. | 2021-09-16 |
20210286830 | DATA LOSS PREVENTION SYSTEM FOR CLOUD SECURITY BASED ON DOCUMENT DISCOURSE ANALYSIS - Systems, devices, and methods of the present invention are related to determining a document classification. For example, a document classification application generates a set of discourse trees, each discourse tree corresponding to a sentence of a document and including a rhetorical relationship that relates two elementary discourse units. The document classification application creates one or more communicative discourse trees from the discourse trees by matching each elementary discourse unit in a discourse tree that has a verb to a verb signature. The document classification application combines the first communicative discourse tree and the second communicative discourse tree into a parse thicket and applies a classification model to the parse thicket in order to determine whether the document is public or private. | 2021-09-16 |
20210286831 | QUERY EXPANSION IN INFORMATION RETRIEVAL SYSTEMS - The present disclosure relates to a method for query expansion. The method comprises: a) receiving a current query having at least one search term; b) inputting the at least one search term of the current query to a set of one or more query expansion modules, wherein the query expansion modules are configured to predict expansion terms of input terms; c) receiving from the set of expansion modules candidate expansion terms of the search term; d) modifying the current query using at least part of the candidate expansion terms, resulting in a modified query having at least one modified search term, The method further comprises repeating steps b) to d) using the modified query as the current query, the repeating being performed until a predefined stopping criterion is fulfilled. | 2021-09-16 |
20210286832 | UTILIZING ARTIFICIAL INTELLIGENCE MODELS TO MANAGE AND EXTRACT KNOWLEDGE FOR AN APPLICATION OR A SYSTEM - A device may receive, in near-real time, unstructured data associated with an application or a system, and may extract textual data from the unstructured data. The device may parse the textual data to generate parsed textual data, and may perform natural language processing on the parsed textual data to generate processed textual data. The device may process the processed textual data, with a clustering model, to identify topical data associated with the processed textual data, and may process the topical data, with a classification model, to group the topical data into categories. The device may generate a knowledge graph based on the categories, and may store the knowledge graph in a data structure. The knowledge graph may enable the device to provide answers to questions associated with the application or the system. | 2021-09-16 |
20210286833 | IMPROVED REQUEST HANDLING - The current invention relates to a computer-implemented method for determining a category of a request provided by a user by means of a user device; said user device comprising connection means and means for receiving a request description relating to said request from said user; the method comprising a plurality of steps among which: receiving, from said user, said request description, by means of said device; uploading said request description to a server, said server having access to a database comprising a plurality of previously categorized requests each comprising a category and a vocabulary comprising a plurality of word vector representations; identifying, by said server, a plurality of component words belonging to a natural language text string comprised in said request description; obtaining, for at least one of said plurality of component words, an associated word vector representation from said vocabulary; and determining a request vector, based on said at least one obtained word vector representation. | 2021-09-16 |
20210286834 | SYSTEM AND METHOD FOR DYNAMIC, GRAPH-BASED NOTE-TAKING - A system and method for expressing and storing information in a dynamic, graph-based form is disclosed. The method is configured for automatically organizing, summarizing, suggesting connections among, and consolidating that information. The method detects similarity between knowledge graphs and using such similarities to suggest connections, derive prototypic conceptual structures, and merge multiple knowledge graphs. The knowledge is represented as a directed graph comprising a set of labeled nodes and a set of labeled, weighted, directed edges. The conceptual objects correspond to a node or group of nodes, where relations correspond to an edge, a path, or a set of paths between one conceptual object and another. In the knowledge graph, any statement could be represented as a relation between conceptual objects. | 2021-09-16 |
20210286835 | METHOD AND DEVICE FOR MATCHING SEMANTIC TEXT DATA WITH A TAG, AND COMPUTER-READABLE STORAGE MEDIUM HAVING STORED INSTRUCTIONS - A method for matching semantic text data with tags. The method comprises: pre-processing multiple semantic text data to obtain original corpus data comprising multiple semantic independent members; determining the degree of association between any two of the multiple semantic independent members according to a reproduction relationship of the multiple semantic independent members in a natural text, determining a theme corresponding to the association according to the degree of association between any two, and thus determining a mapping probability relationship between the multiple semantic text data and the theme; selecting one of the multiple semantic independent members corresponding to the association as a tag of the theme, and mapping the multiple semantic text data to the tag according to the determined mapping probability relationship between the multiple semantic text data and the theme; and taking the determined mapping relationship between the multiple semantic text data and the tag as a supervision material, and matching the unmapped semantic text data with the tag according to the supervision material. | 2021-09-16 |
20210286836 | METHOD OF MANAGING MEDIA LIBRARIES, CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCT - In accordance with an embodiment, a method of managing an automotive infotainment media library, in which media content files sourced from a set of source devices, and the media content files are accessible via respective playback paths by at least one media player application having a plurality of configurations, includes: parsing the media content files in the media library to create at least one indexed table including a respective list of identifiers associated to media content files, wherein the media content files are parsed as a function of at least one of a source device in the set of source devices, as a function of a configuration in the plurality of configurations of the at least one media player application, or as a function of folders grouping the media content files in the media library. | 2021-09-16 |
20210286837 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC CONTENT - Systems and methods are disclosed for processing electronic content, such as text, videos, and images. According to certain embodiments, user interactions with electronic content may be tracked over a plurality of modalities, such as web pages, email, mobile applications, and social media. The tracked user interactions may include copy/paste events, explicit user highlighting, social sharing, and user voting. Key passages of electronic content may be identified based on the tracked user interactions and ranked against one another. Ranking of passages may be based, for example, on a raw or normalized score for the identified key passages. Alternatively, the ranking of a passage may be based on a ratio of user interactions with the passage to total views of the electronic text containing the passage. One or more of the identified key passages (e.g., the highest ranked passages) may be published to one or more applications. | 2021-09-16 |
20210286838 | INFOTAINMENT BASED ON VEHICLE NAVIGATION DATA - A system for providing media content to an occupant of a vehicle may include a user interface configured to provide the media content to the occupant and a controller coupled to the user interface and to a database configured to store media content. The controller may be configured to receive vehicle navigation data, select a subset of media content from the media content stored in the database based on the vehicle navigation data, and provide the subset of media content through the user interface. | 2021-09-16 |
20210286839 | FILE SYNCHRONIZATION SYSTEM - A database system for facilitating partial synchronization of a user file list with a confidential file list and eliminating duplicative file transfer. A database stores the confidential file list; and an intermediary server receives a notice after a first computing device is used to access a file not already listed in the confidential file list and to display the file to a user of the first computing device, updating the confidential file list to include the file. In response to receiving a request for a specific number of files less than an entirety of the confidential file list to be provided from the confidential file list, the server identifies a set of files present only in the confidential file list and not in a user file list, and causes transmission of only those files, thereby ensuring that network resources are not wasted and the confidential file list is not disclosed. | 2021-09-16 |
20210286840 | MAP-BASED GRAPHICAL USER INTERFACE FOR EPHEMERAL SOCIAL MEDIA CONTENT - A social media platform provides a map-based graphical user interface (GUI) with multiple geographically anchored icons that are selectable to trigger playback of respective galleries of ephemeral messages. Each of the plurality of location-based ephemeral galleries comprises media content contributed by multiple different users. The ephemeral galleries are compiled based on geo-tag data associated with respective ephemeral messages submitted by multiple users to be publicly viewable via the map-based GUI. | 2021-09-16 |
20210286841 | MEDIA AND LOCATION BASED SOCIAL NETWORK - A method may include receiving from a first device: a media file; data comprising information identifying a location associated with the media file; storing the media file and data in a database; receiving from a second device information identifying a location of the second device; determining a geographic radius of the second device based upon user selection; determining if one or more media files stored in the database are associated with a location in the geographic radius of the second device; and sending the one or more media files to the second device. | 2021-09-16 |
20210286842 | SEMANTIC-BASED METHOD AND APPARATUS FOR RETRIEVING PERSPECTIVE IMAGE - A semantic-based method and apparatus for retrieving a perspective image, an electronic device and a computer-readable storage medium are provided. An method includes obtaining a perspective image for a space containing an inspected object therein. A semantic division on the perspective image is performed using a first method, to obtain a plurality of semantic region units. A feature extraction network is constructed using a second method. Based on the perspective image and each of the plurality of semantic region units, a feature of each semantic region unit is extracted using the feature extraction network. Based on the feature of each semantic region unit, an image most similar to the semantic region unit is retrieved from an image feature database, to assist in determining an inspected object in the semantic region unit. | 2021-09-16 |
20210286843 | GEOGRAPHIC POPULATION HEALTH INFORMATION SYSTEM - A method and system for providing a data analysis in the form of a customized geographic visualization on a graphical user interface (GUI) on a remote client computing device using only a web browser on the remote client device. The system receives a user's selected data analysis to be performed by the system for display on the remote client device. The system verifies the data access permissions of the user to render a data analysis solution customized to that particular user, and automatically prevents that user from gaining access to data analysis solutions to which that user is prohibited. The system is configured to respond to the user's data analysis request, perform the necessary computations on the server side on the fly, and send a dataset interpretable by the client device's web browser for display on the client device or on a device associated with the client device. | 2021-09-16 |
20210286844 | AUDIO BASED ENTITY-ACTION PAIR BASED SELECTION - Routing packetized actions in a voice activated data packet based computer network environment is provided. A system can receive audio signals detected by a microphone of a device. The system can parse the audio signal to identify trigger keyword and request, and generate an action data structure. The action data structure can include digital components and entity-action pairs. | 2021-09-16 |
20210286845 | METHOD AND APPARATUS FOR IMPLEMENTING AN N-DIMENSIONAL HYPERCUBE VISUALIZATION MODULE - Various methods, apparatuses/systems, and media for implementing an N-dimensional hypercube visualization module are provided. A database stores a plurality of data each including metadata describing information about the data. A processor creates taxonomies describing data concepts associated with the metadata; receives the metadata and the taxonomies from the database via a communication network; automatically generates a cube set including a set of N-dimensional hypercubes from the received metadata; for each dimension of the cube set, automatically generates a map from values in that dimension to a number range; receives input for selecting three or fewer dimensions from the cube set to be displayed onto a graphical user interface (GUI) based on the number range; and automatically build a tree-view user interface (UI) component onto the GUI based on the received input representing selected and unselected terms from a taxonomy among the created taxonomies corresponding to a dimension. | 2021-09-16 |
20210286846 | STORING AND IDENTIFYING METADATA THROUGH EXTENDED PROPERTIES IN A HISTORIZATION SYSTEM - A historian system enables the creation, storage, and retrieval of extended metadata properties. A tag metadata database module of the historian system stores tag metadata received over a network connection in a tag metadata database and retrieves tag metadata in response to requests received over the network and from within the historian system. An extended property database module creates extended properties associated with a tag metadata instance in response to requests, stores the created extended properties, and retrieves the stored extended properties in response to requests. The extended property search index module indexes extended properties as they are created, searches the indexed extended properties in response to requests, and provides the indexes of extended properties to enable location of the extended properties in the extended property database. | 2021-09-16 |
20210286847 | FLEXIBLE MULTI-MEDIA SYSTEM - A multi-media system may include a computer, and an interface connected to the computer. The system may also include a module executing on the computer that a user enters data into via the interface, the module converts each data entered into a first state and a second state, the first state visible to the user on the interface upon entry by the user, and the second state visible to the user on the interface upon call-up by the user. The system may also include a graph generated on the interface based upon the first state and the second state. The system may additionally include an object linked to the data via the graph. | 2021-09-16 |
20210286848 | QUERY LANGUAGE INTEROPERABILITY IN A GRAPH DATABASE - Methods, systems, and computer-readable media for query language interoperability in a graph database are disclosed. Data elements are inserted into a graph database using one or more of a plurality of graph database query languages. The graph database query languages comprise a first graph database query language associated with a first data model and a second graph database query language associated with a second data model. The data elements are stored in the graph database using an internal data model that differs from the first and second data models. One or more of the data elements are retrieved from the graph database based at least in part on a query. The query is expressed using a different graph database query language than the graph database query language used to insert the one or more retrieved data elements. | 2021-09-16 |
20210286849 | Graphical User Interfaces for Assessment of Digital Transformation - A database may contain a plurality of queries and sets of predefined responses for each of the queries, the predefined responses respectively associated with numeric scores. One or more processors may be configured to: (i) generate representations of graphical user interfaces(s) including the queries with their corresponding sets of predefined responses, wherein the predefined responses of each set are presented as selectable options; (ii) receive indications of selected responses for each of the queries, the selected responses obtained by way of the selectable options; (iii) from the selected responses and the numeric scores, determine intermediate scores for each of the queries and a total score; (iv) store, in the database, the intermediate scores and the total score; and (v) generate a representation of a further graphical user interface depicting the total score, the total score emphasized to represent a range of values within which the total score is disposed. | 2021-09-16 |
20210286850 | SYSTEMS AND METHODS FOR GENERATING A SEARCH QUERY USING FLEXIBLE AUTOCOMPLETE MENUS - Systems and methods are described herein for generating a search query using flexible autocomplete suggestions. A text input is received, and a plurality of portions of the text input, each corresponding to a different search parameter, are identified. For each of the identified portions, at least one suggested alternate text is retrieved based on the corresponding attribute, and a user interface element is generated for display in which the original text of the respective portion is displayed, along with the suggested alternate texts for that portion, which are selectable by the user. Upon receiving selection of a suggested alternate text in at least one user interface element, a search query is generated based on each portion for which no alternate has been selected, and each selected alternate text. Search request are retrieved in response to the search query, and the results are generated for display to the user. | 2021-09-16 |
20210286851 | GUIDED QUERY RECOMMENDATIONS - Disclosed are systems, methods, and non-transitory computer-readable media for guided query recommendations. A search system generates search query recommendations for a user based on activity data associated with the user. In one technique, the search system generates a search query recommendation based on a search query sequence identified from the activity data of the user. For example, the search query sequence is used as input into a machine learning model, such as a sequence to sequence model trained on historical search query sequences that resulted in a targeted action. In another technique, the search system generates a search query recommendation based on multi-session query data of the user. For example, the search system generates a multi-session embedding vector representing the multiple activity sessions of the user. The multi-session embedding vector is used as input in a classification model that assigns probability values to candidate search terms. | 2021-09-16 |
20210286852 | User Interfaces for a Document Search Engine - A method includes receiving a search query, identifying a document based on the search query, and providing a search result based on the document. The search result includes, for example, an image associated with the document, an excerpt from the document that is associated with the search query, and links to other excerpts in the document that are associated with the search query. The method may also include providing other information associated with the document. | 2021-09-16 |
20210286853 | PLATFORM, METHOD, AND SYSTEM FOR A SEARCH EN-GINE OF TIME SERIES DATA - A system, method, and computer program product provide a search engine which may use time series of data relevant to a search query to generate relevant results that may be used for predictions of events related to the query. Embodiments determine the underlying driving factors that most influenced the search query topic. In one aspect, the predictive ability of time series may be used to determine the driving factors. In another aspect, the system and method may employ a neural network to run a prediction model for determining conditional distribution of future values of the search query topic. The information may be displayed in a user interface where the driving factors and other information may be user edited to observe the effects source data has on the search query topic. | 2021-09-16 |
20210286854 | INFORMATION PROCESSING APPARATUS, COATING MATERIAL GENERATOR, AND COMPUTER PROGRAM - An information processing apparatus includes a means for storing coating material information on coating material, and tactile sensation information in which the tactile sensation when each coating material is applied to the skin is recorded, the coating material information and the tactile sensation information is associated with each other, a means for acquiring search criteria for at least one of tactile sensations and textures, identifying at least one tactile sensation information corresponding to the acquired search criteria, and a means for presenting the coating material information associated with the identified tactile sensation information. | 2021-09-16 |
20210286855 | METHODS, SYSTEMS, AND MEDIA FOR PRESENTING RECOMMENDED MEDIA CONTENT ITEMS - In accordance with some implementations of the disclosed subject matter, mechanisms for presenting recommended media content items are provided. In some implementations, a method for providing media guidance is provided, the method comprising: receiving a query from a user; determining search terms from the received query; determining location information corresponding to the user and popularity information associated with a plurality of media content items and a plurality of content sources; selecting a media content item from the plurality of media content items based at least in part on the popularity information associated with each of the plurality of media content items and the search terms from the received query, wherein the selected media content item is available from the plurality of content sources; selecting at least one content source from the plurality of content sources based at least in part on the location information associated with the user and the popularity information associated with each of the plurality of content sources; and causing a recommendation interface to be presented to the user, wherein the recommendation interface includes the selected media content item that is provided from the at least one selected content source. | 2021-09-16 |
20210286856 | SYSTEM AND METHOD OF PRESENTATION OF ONLINE FINANCIAL REPORT - The present disclosure relates to a statement presentation system. The statement presentation system may include a computer-readable storage medium that may be configured to store executable modules. The computer-readable storage medium may include a statement browser that may be configured to receive a statement file and present a statement. The computer-readable storage medium may also include a statement generation engine that may be configured to modify the statement file, and generate a modified statement file. The statement generation engine may extract data from a data source based on the modified statement file, and operate the extracted data. The operation may be conducted by loadable operation code, a loadable operation library file, or a loadable operation tool. The statement generation engine may render the operated data and display the rendered data on the statement browser in the form of a statement. | 2021-09-16 |
20210286857 | SYSTEM AND METHOD FOR BROWSER-BASED TARGET DATA EXTRACTION - A method of browser-based target data extraction includes: storing a browser application and a browser extension, the browser extension containing a predefined network identifier of a server; at a controller of the client computing device interconnected with the memory, executing the browser application to retrieve a web page containing target data; at the controller, responsive to retrieving the web page, executing the browser extension simultaneously with the browser application for: capturing a portion of the web page containing the target data; responsive to capturing the portion, automatically generating an overlay interface including the target data; controlling a display of the client computing device to present the overlay with the web page; receiving an operator command at the overlay via an input assembly of the client computing device; and when the operator command is a confirmation command, transmitting the target data to the server using the predefined network identifier. | 2021-09-16 |
20210286858 | SYSTEMS AND METHODS FOR IMPROVED WEB-BASED DOCUMENT RETRIEVAL AND OBJECT MANIPULATION - Systems and methods are provided for improving web-based document retrieval and object manipulation. In an implementation, objects within web documents (e.g., a web page) are manipulated when the objects are visible through a viewport of a user's web browser. According to a method, an object selected from a web document is manipulated when that selected object is displayed within the viewport of the user's browser. The manipulation may include downloading content associated with the stored object and additionally, or alternatively, executing a script associated with the stored object. Additionally, or independently, methods may be provided for blocking the download of an object in a retrieved web document until that object is displayed or visible in the user's browser viewport. | 2021-09-16 |
20210286859 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR SENSITIVITY OF DYNAMICAL SYSTEMS TO INTERACTION NETWORK TOPOLOGY - Embodiments disclose a system for determining a sensitivity of a networked system. The system identifies a vertex (V) that represents a constituent and a state of the constituent, and an interaction (E) between at least two Vs. An interaction-dependent function provides a probability that, when a perturbation occurs, a V will be in a certain state given that it is currently in a determined state and its neighbors are currently in determined states. A network reliability is used to determine a probability that a V's state holds when a perturbation occurs. The system evaluates only a certain amount of terms in a Taylor series from a sample, and identifies interpolating polynomials between the Taylor series. A cost function optimizes a property of the networked system for a fixed cost. The system perturbs the networked system until reliability is zero to estimate a sensitivity of the networked system. | 2021-09-16 |
20210286860 | METHOD AND DEVICE FOR MATRIX MULTIPLICATION OPTIMIZATION USING VECTOR REGISTERS - Methods and devices, the method including receiving a matrix of a neural network model; classifying at least a portion of the matrix as a first section based on a first distribution pattern of non-zero elements of the portion of the matrix; and identifying memory addresses of the non-zero elements in the first section of the matrix for loading, according to a first order determined based on the first distribution pattern, the non-zero elements in the first section into one or more vector registers. | 2021-09-16 |
20210286861 | User Experience Container Level Identity Federation and Content Security - Systems and methods are provided for controlling display of a workspace. The system includes logic to establish a first level authorization at a display client enabling access to a workspace data set. The workspace data set can have a plurality of entries identifying respective digital assets and locations in the workspace for graphical objects representing the respective digital assets. The plurality of entries can include a particular entry identifying a particular digital asset requiring a second level authorization. The system includes logic to render, for the particular entry, a placeholder graphical object and a prompt. The system includes logic to detect user input indicating selection of the prompt, and in response executing a protocol to establish the second level authorization. Upon establishment of the second level authorization the placeholder graphical object is replaced with a second graphical object to reveal content of the particular digital asset. | 2021-09-16 |
20210286862 | AUTHORITY REVOKING METHOD AND DEVICE - An authorizing party determines an authorization record set that needs to be revoked, where an authorization record included in the authorization record set corresponds to a token that is issued to an authorized party after the authorizing party grants access to the authorized party, and where each authorization record includes an authorization validation moment for a corresponding token. A time validity attribute of the authorization record set is configured. For a specific point-in-time, a value associated with the time validity attribute is set. A determination is performed as to whether the authorization record is revoked based on the authorization validation moment and the value associated with the time validity attribute. | 2021-09-16 |
20210286863 | DATA PROCESSING TERMINALS AND RELATED METHODS IN LOCK, INTERMEDIATE, AND UNLOCK MODES - The disclosure relates to various data processing terminals capable of operating in different modes each of which is granted with different authorities to access hardware or software elements of the terminals. More particularly, a terminal includes a lock system operating in a lock mode and a main system operating in an unlock mode, and erases an entire or a selected portion of results obtained by running operations in the lock mode, when a terminal switches from a lock mode to an unlock mode with greater access authority. Because potentially malicious computer codes which may be impregnated into such results are erased before switching to an unlock mode, the terminal enhances an integrity and a security of a terminal, and improves privacy of a user by preventing loss or unintended disclosure of private data stored in a terminal. | 2021-09-16 |
20210286864 | DUAL-MODE BIOMETRIC CONFIGURATION FOR USER VALIDATION AND USER HEALTH CHECK TO DETERMINE ACCESS TO PRODUCTS AND/OR SERVICES - A process receives, at a mobile computing device, a biometric identification input from a user. Furthermore, the process compares, with a processor at the mobile computing device, the biometric identification input with a previously-stored biometric identification input to validate an identity of the user. Moreover, the process measures, at the mobile computing device, one or more health parameters of the user. Finally, the process sends, based upon the validation of the identity of the user, the one or more health measurements to an access device that grants access to the user to a product or service based upon the one or more health measurements complying with one or more health criteria to validate a health check of the user. | 2021-09-16 |
20210286865 | BIOMETRIC AUTHENTICATION TECHNIQUES - Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments. | 2021-09-16 |
20210286866 | METHOD FOR PERFORMING BIOMETRIC INFORMATION-RELATED AUTHENTICATION ON BASIS OF STATE OF IMAGE INCLUDING BIOMETRIC INFORMATION ACQUIRED USING BIOMETRIC SENSOR, AND ELECTRONIC DEVICE IMPLEMENTING SAME - An electronic device includes a display, a fingerprint sensor positioned under a specified area of the display, and a processor. The processor is configured to obtain a first image based on a first input, perform authentication associated with biometric information, when a state of the first image meets a first condition, obtain a second image using the fingerprint sensor, when the state of the first image meets a second condition, adjust a setting of the fingerprint sensor, obtain a third image using the fingerprint sensor adjusted from the first value to a second value, and perform authentication associated with the biometric information based on the second image and the third image. | 2021-09-16 |
20210286867 | VOICE USER INTERFACE DISPLAY METHOD AND CONFERENCE TERMINAL - A voice user interface display method and a conference terminal are provided. The method includes: when voice information input by a user into the conference terminal is received, a voice of the user is collected. A user voice instruction may be obtained based on the voice information input by the user. Identity information of the user may be obtained in real time based on the voice of the user. Further, user interface information that matches the user may be displayed based on the identity information of the user, the user voice instruction, and a current conference status of the conference terminal. The method improves diversity of display of the user interface information and improves user experience in using the conference system. | 2021-09-16 |
20210286868 | Method For Providing An Authenticated Digital Identity - A method for verifying and validating identifiable attributes of a user includes electronically receiving the attributes of a user and verifying their authenticity. The attributes are also validated by confirming each matches a corresponding evidenced based attribute. An internal identifier is assigned to each of the validated attributes and an external identifier is assigned to those attributes that were not validated. Access to the identifiable attributes having an internal identifier is only permitted by the user or a designee of the user. A level of confidence is established from a ranking of the attributes where the attributes having the internal identifiers provide a greater level of confidence than the attributes having the external identifiers. An authenticated digital identity is then formed from the identifiable attributes, and a level of confidence for the authenticated digital identity is established from the ranking. | 2021-09-16 |
20210286869 | Obtaining A User Input - There are described computer-implemented methods of obtaining a user input. A first such method comprises: (a) providing access to video content, the video content representing a user interface including a plurality of elements for selection by a user; (b) playing a first portion of the video content to the user; (c) detecting a first user interaction occurring in response to the played first portion of the video content; and (d) determining a first element selected by the user based on one or more properties of the detected first user interaction. A second such method comprises: (a) providing access to one or more frames of pre-generated video content encoded in compressed video format; (b) displaying to a user initial video content encoded in compressed video format, the initial video content being based on one or more frames of the pre-generated video content, and the initial video content representing a plurality of graphical elements for selection by a user; (c) detecting a first user interaction occurring in response to the displayed initial video content; (d) determining a first graphical element selected by the user based on one or more properties of the detected first user interaction; (e) in response to the first user interaction, generating new video content encoded in compressed video format based on one or more frames of the pre-generated video content and the one or more properties of the first user interaction; and (f) displaying the new video content to the user. | 2021-09-16 |
20210286870 | Step-Up Authentication - A method for identifying and/or authenticating a user on a device, the method comprising: requesting identification or authentication of the user for a first task; determining a first threshold in dependence on the first task; selecting a first authentication process from a plurality of authentication processes; determining a confidence score in dependence on a performance of the selected first authentication process, wherein the confidence score indicates a level of confidence in the user's identity; determining whether the confidence score is above or below the first threshold; and if the confidence score is below the first threshold, selecting a second authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the first task. | 2021-09-16 |
20210286871 | Validation of Software Residing on Remote Computing Devices - A remote computing device is provided including one or more processors, and a memory device including one or more computer-readable instructions. When executed by the one or more processors, the instructions cause the system to perform operations including receiving a validation request comprising a random data string from a secure computing device, in response to the validation request, generating a first check value based on the random data string and software installed on the remote computing device, and transmitting the first check value to the secure computing device. The secure computing device is configured to compare the first check value to a second check value that is generated using the random data string and an authentic copy of the software. | 2021-09-16 |
20210286872 | Dynamically Generating Activity Prompts to Build and Refine Machine Learning Authentication Models - Aspects of the disclosure relate to dynamically generating activity prompts to build and refine machine learning authentication models. A computing platform may process a first set of login events associated with a first user account and may build a first user-specific authentication model for the first user account. Then, the computing platform may process a second set of login events associated with a second user account and may build a second user-specific authentication model for the second user account. The computing platform also may build a population-level authentication model for a plurality of user accounts. Thereafter, the computing platform may identify one or more activity parameters associated with at least one authentication model for refinement. Subsequently, the computing platform may generate and send one or more activity prompts to one or more client computing devices to request at least one user response. | 2021-09-16 |
20210286873 | MITIGATING SECURITY ATTACKS IN VIRTUALIZED COMPUTING ENVIRONMENTS - A computer implemented method to mitigate a security attack against a target virtual machine (VM) in a virtualized computing environment, the target VM having a target VM configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed. | 2021-09-16 |
20210286874 | FREQUENT PATTERN BASED ANOMALY EVENT DETECTION - A method is disclosed that includes receiving, at a computing device, an event log including multiple events, where the events are derived from machine data, determining a first score associated with a first granularity level by comparing an event from the event log with a first frequent patterns generated for the first granularity level, and determining a second score associated with a second granularity level by comparing the event with a second frequent patterns generated for the second granularity level. The method further includes determining an aggregate score for the event based on the first score and the second score, and comparing the aggregate score for the event with an anomaly score threshold. Further, the method includes issuing an alert identifying the event as an anomaly based on the aggregate score exceeding the anomaly score threshold. | 2021-09-16 |
20210286875 | MALWARE DETECTION USING A MACHINE LEARNING MODEL - An information handling system may receive a plurality of rules and a file for malware testing. The information handling system may apply two or more of the plurality of rules to the received file to determine a plurality of outcomes of application of the rules to the file. The information handling system may determine whether to classify the received file as malware or not malware by applying a machine learning model to the plurality of outcomes. | 2021-09-16 |
20210286876 | METHOD FOR PREVENTING COMPUTER ATTACKS IN TWO-PHASE FILTERING AND APPARATUSES USING THE SAME - The invention introduces a method for preventing computer attacks in two-phase filtering, performed by a processing unit of an apparatus, which contains at least the following steps: receiving service requests from a client system, wherein each service request requests for executing a service in a protected computer-asset in a network; performing a phase one filtering including a white-list judgment, a black-list judgment, and a custom-rule judgment on each service request; and performing a phase two filtering including a base-rule judgement on each service request that has undergone the phase one filtering completely, hasn't been forwarded to the protected computer-asset in the phase one filtering, and hasn't been undergone the attack prevention operation in the phase one filtering. Each custom-rule pattern defines a specific attack to an individual system or vulnerability. Each base-rule pattern defines a common attack. The base-rule patterns cover more types of computer-assets than the custom-rule patterns. | 2021-09-16 |
20210286877 | CLOUD-BASED METHOD TO INCREASE INTEGRITY OF A NEXT GENERATION ANTIVIRUS (NGAV) SECURITY SOLUTION IN A VIRTUALIZED COMPUTING ENVIRONMENT - A next generation antivirus (NGAV) security solution in a virtualized computing environment includes a security sensor at a virtual machine that runs on a host and a security engine remote from the host. The integrity of the NGAV security solution is increased, by providing a verification as to whether a verdict issued by the security engine has been successfully enforced by the security sensor to prevent execution of malicious code at the virtual machine. | 2021-09-16 |
20210286878 | METHOD AND SYSTEM FOR STAKE-BASED EVENT MANAGEMENT WITH LEDGERS - A trust-less system for sharing event information among autonomous nodes may include: a plurality of autonomous nodes, each of which creates an event related to a condition, a first ledger configured to collect and store a record of each event; a second ledger configured to store reputation information for the plurality of autonomous nodes; and a bookmaker module operable to determine a reward and a penalty for each event. The bookmaker module may be operable to modify the reputation information based on a status of the condition determined by subsequent events created by autonomous nodes where the subsequent events either validate or invalidate the condition. | 2021-09-16 |
20210286879 | Displaying Cyber Threat Data in a Narrative - A mechanism is provided in a data processing system for displaying cyber threat data in a narrative format. The mechanism receives a cyber threat information file that comprises cyber threat data in a serialized format. The mechanism generates a user interface presenting the cyber threat data in a narrative format. The user interface presents objects in the cyber threat data in a hierarchical format indicative of relationships between parent objects and child objects and presents context information for each object. The mechanism presents the user interface to an analyst. | 2021-09-16 |
20210286880 | APPLICATION SELECTION BASED ON CUMULATIVE VULNERABILITY RISK ASSESSMENT - Using a processor and a memory of a testing system, a set of vulnerability testing instructions is executed relative to an application, causing an output of a set of vulnerabilities from the testing system. By executing a probability model, a first probability of adverse impact corresponding to a first vulnerability in the set of vulnerabilities is computed. The first vulnerability and the first probability of adverse impact are added to a vulnerability repository. Using the first probability of adverse impact and a second probability of adverse impact, a first cumulative probability of adverse impact is calculated. Using the first cumulative probability and a first level of organizational impact corresponding to the application, a first risk category is assigned to the application. Responsive to the first risk category being lower than a second risk category, a system management application is caused to install the application in the computer system. | 2021-09-16 |
20210286881 | Graph-Based Approach Towards Hardware Trojan Vulnerability Analysis - The present disclosure describes various embodiments of hardware trojan triggering (HTT) signal analysis. As such, an exemplary method comprises capturing switching activity of nodes for a design of an integrated circuit during a simulation of an application of a test pattern to the design; identifying one or more nodes in a graphical representation of the design that do not toggle within an individual window of time across multiple windows of time; determining unique paths that can be formed by the identified nodes within each of the multiple windows of time; determining one or more unique paths that occur across consecutive windows of time; appending the one or more unique paths that occur across consecutive windows of time in a set; and outputting the one or more unique paths in the set as rare trojan horse triggering paths for the design. Other systems and methods are also presented. | 2021-09-16 |
20210286882 | COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATION - Provided are mechanisms and processes for computational risk analysis and intermediation. Security practices information characterizing security measures in place at a first computing system may be received from the first computing system via a network. Computing services interaction information characterizing data transmitted from a second computing system to the first computing system may be received from the second computing system via the network. A processor may determine a risk profile for the first computing system based on the security practices information. Based on the risk profile and the computing services interaction information, the processor may then determine an estimate of the information security risk associated with transmitting the data from the second computing system to the first computing system. A risk assessment message including the estimate of the information security risk may be transmitted to the second computing system. | 2021-09-16 |
20210286883 | SYSTEMS AND METHODS FOR PERFORMING SECURE COMPUTING WHILE MAINTAINING DATA CONFIDENTIALITY - Disclosed herein are systems and method for performing secure computing while maintaining data confidentiality. In one exemplary aspect, a method receives, via an application, both data and a request to perform a secure operation on the data, wherein the secure operation is to be performed using a secure compute engine on a cloud platform such that the data is not viewable to a provider of the cloud platform. The method applies transformations to the data so that the data is not viewable to the provider. The method transmits the transformed data to the secure compute engine on the cloud platform to perform the secure operation on the transformed data, receives a result of the secure operation from the secure compute engine, and transmits the result to the application. | 2021-09-16 |
20210286884 | SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK - A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user. | 2021-09-16 |
20210286885 | METHOD AND SYSTEM FOR ENHANCING DATA PRIVACY OF AN INDUSTRIAL SYSTEM OR ELECTRIC POWER SYSTEM - Techniques for configuring data protection settings for data of an industrial system or an electric power system ( | 2021-09-16 |
20210286886 | HIGH PERFORMANCE TOKENIZATION PLATFORM FOR SENSITIVE DATA - Disclosed herein are system, method, and computer program product embodiments for processing tokenization requests in-memory of an application server. Reliance on remote devices, such as hardware security modules, is reduced because functions associated with processing tokenization requests is performed at the application server instead of the remote devices. Applicant server includes a multi-level cache for storing and accessing data for generating, hashing, and encrypting tokens in response to tokenization requests received from client devices. | 2021-09-16 |
20210286887 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a processor configured to receive, from a user, entry of an access right granting request to grant another user a right to access data included in managed data; where the other user is an unregistered user who hasn't been registered yet in a database, receive entry of information on the other user, receive entry of approval of the other user by an administrator who manages the managed data, register the other user in the database on a basis of the approval, and permit the other user to access the data, and in a case where the other user has been already registered in the database on a basis of past approval by the administrator, permit the other user to access the data without entry of the approval by the administrator received after the receipt of the entry of the access right granting request. | 2021-09-16 |
20210286888 | SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY - A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user. | 2021-09-16 |
20210286889 | MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS - Devices, systems, and methods for allowing parents to view and track smart phone activities of their children can include one or more child software modules. The module can be installed on each child's smart phone. The module can access and extract data from or about more than one of the smart phone's other software applications, including at least two of the following: a texting application, a social media application, an image application that facilitates transmission or reception of images, and a web browser application. The module can further send the extracted data to an analysis server. The module can also monitor location data. Moreover, the system can include an analysis server that can identify potentially harmful language, images, and websites. Further, the system can include a parent portal. The parent portal can receive results from the analysis server. | 2021-09-16 |
20210286890 | SYSTEMS AND METHODS FOR DYNAMICALLY APPLYING INFORMATION RIGHTS MANAGEMENT POLICIES TO DOCUMENTS - Systems and methods are disclosed herein for dynamically applying information rights management (“IRM”) policies to documents. An example system for dynamically applying IRM policies to documents can include a document repository, a proxy server, and a dynamic IRM wrapping service (also referred to herein as an IRM engine). A user can request a document on the document repository by, for example, attempting to access the document from a user device. The user device can be managed by a management server that enrolls the user device and enforces compliance rules and other policies at the user device. The user's request for the document can be received at the proxy server, and the proxy server can then request the document from the document repository. | 2021-09-16 |
20210286891 | SECURELY PROCESSING SHAREABLE DATA IN A DATA COMMUNICATION NETWORK - A method includes a data processing system creating a virtual machine for use with a data owner system in accordance with a temporary credential protocol between the data processing system and the data owner system. The method continues with by the virtual machine accessing memory of the data owner system regarding a set of data records having common data criteria. The method continues by the virtual machine modifying the set of data records to produce a set of shareable data records. The method continues with the data processing system executing a data analysis function on the set of shareable data records to produce an analytical result. The method continues with the data processing system sending the analytical result to a data consumer computing entity. | 2021-09-16 |
20210286892 | DATA SHARING USING SECURE VIEWS - Systems, methods, and devices for secure view-based data sharing are disclosed. A method in accordance with embodiments disclosed herein comprises associating, by one or more processors, view privileges of a secure view with one or more of a plurality of underlying details of a share object of a first account such that each of the one or more underlying details of the share object comprises a definition of the secure view. The method further comprises: in response to receiving a request from a second account to access any underlying details of the share object, using a secure projection that does not match any rewrite rule preconditions to rewrite a query plan of the request to prevent expressions that do not originate from the secure view from being pushed down below a boundary of the secure view. | 2021-09-16 |
20210286893 | SECURE DATA SHARING IN A MULTI-TENANT DATABASE SYSTEM - Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. A method includes granting, to one or more cross-accounts, access to a share object comprising a secure view and usage functionality associated with a user-defined function (UDF) to underlying data without providing a view of the procedural logic associated with the UDF. | 2021-09-16 |
20210286894 | DYNAMIC SHARED DATA OBJECT MASKING - A shared database platform implements dynamic masking on data shared between users where specific data is masked, transformed, or otherwise modified based on preconfigured functions that are associated with user roles. The shared database platform can implement the masking at runtime dynamically in response to users requesting access to a database object that is associated with one or more masking policies. | 2021-09-16 |
20210286895 | QUARANTINED CODE SCANNING - In an approach to quarantining source code to prevent confidential information exposure, one or more computer processors store a pushed codebase associated with a user to an isolated quarantine area, wherein access to the quarantine area is restricted to the user through user interface code visibility enforcement and protocol code visibility enforcement. The one or more computer processors dynamically adjust a timeout period based on codebase complexity, user preferences, associated dependencies, codebase size, minimum execution temporal period for one or more scans, and system specifications. The one or more computer processors responsive to identifying one or more instances of confidential information, perform one or more remedial actions. | 2021-09-16 |
20210286896 | METHODS AND SYSTEMS FOR DATA MANAGEMENT IN COMMUNICATION NETWORK - Methods and systems for data management in communication networks. An aspect provides a system including a first network function and a second network functions. The first network function is configured for collecting data and storing the collected data. The second network function is configured for removing private information from the collected data and producing privatized data. The first and the second network functions are separately controlled and operated by different providers. The first network function is operated by a first provider via a first controller. The second network function is operated by a second provider via a second controller. The separately controlled feature of such a network architecture enhances data privacy by ensuring different entities control the collection of data and the privatization of the collected data. | 2021-09-16 |
20210286897 | DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS - Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request. | 2021-09-16 |
20210286898 | DATASET ORIGIN ANONYMIZATION AND FILTRATION - Embodiments also include a method for filtering and securing content of datasets in computer readable form designated for release to reduce discernable inferences therein. The method includes receiving a first dataset having first records associated with a quasi-identifier. The first records have respective first data values associated with the quasi-identifier. The method includes receiving a second dataset having second records associated with the quasi-identifier. The second records have respective second data values associated with the quasi-identifier. The method includes defining a first cluster having a first boundary based on a combination of the first dataset and the second dataset. The method includes replacing a first one of the first data values with the first boundary and a second one of the second data values with the first boundary. | 2021-09-16 |
20210286899 | Embedded Device for Control of Data Exposure - Systems and methods for managing data exposure are provided and include a data protection device embedded or otherwise coupled to a computing device. The data protection device receives communications from the computing device and intended for a network resource over a secured connection between the data protection device and the computing device (e.g., a communications interface of the computing device). The data protection device identifies data privacy elements associated with the communication and generates corresponding modified data privacy elements. The data protection device establishes access to the network resource using the modified data privacy elements, thereby causing network hosts attempting to detect the data privacy elements to detect the modified data privacy elements instead. | 2021-09-16 |
20210286900 | METHOD FOR DISPLAYING BLOCKCHAIN DATA, BLOCKCHAIN BROWSER, USER NODE, AND MEDIUM - Aspects of the disclosure provide a method for displaying blockchain data, a blockchain browser, a user node, and a medium. The method can include transmitting a blockchain data query request, and receiving blockchain data obtained through query in response to the blockchain data query request. Further, the method can include obtaining filtered blockchain data, the filtered blockchain data being generated after illegal content in the blockchain data is filtered out based on a filtering rule, and displaying the filtered blockchain data. In embodiments of this disclosure, the display of the illegal content in the blockchain data can be automatically skipped. | 2021-09-16 |
20210286901 | Batch Cryptography For Hardware Security Modules - Methods, systems, and apparatuses, including computer storage media and hardware security modules, for performing batch cryptography on hardware security modules. A hardware security module can receive a request to perform one or more cryptographic operations. The request can include a batch data structure storing a plurality of data elements. The hardware security module can unbatch the plurality of data elements, perform one or more cryptographic operations on the plurality of data elements to generate a plurality of outputs, generate an output batch data structure storing the plurality of outputs, and transmit the output batch data structure in response to the request. The request and the batch data structure can be formed in accordance with a batch hardware security module application program interface (API) implemented by the hardware security module. | 2021-09-16 |
20210286902 | FAULT DETECTION - The present disclosure relates to a method of fault detection in an application, by an electronic circuit, of a first function to a message, including the steps of generating, from the message, a non-zero even number N of different first sets, each including P shares; applying, to the P shares of each first set, one or a plurality of second functions delivering, for each first set, a second set including Q images; and cumulating all the images, starting with at most Q-1 images selected from among the Q images of a same second set. | 2021-09-16 |
20210286903 | SYNCHRONIZATION CIRCUIT FOR THRESHOLD IMPLEMENTATION OF S-BOX - This application relates to a synchronization circuit for synchronizing signals used in a threshold implementation operation process performing in an S-box of an encryption circuit. In one aspect, the synchronization circuit includes an enable signal generator configured to generate an enable signal. The synchronization circuit may also include a synchronization unit included in an encryption circuit and located inside an S-box that performs a threshold implementation operation that calculates by dividing bits of an input signal into bits equal to or greater than the number of bits of the input signal. The synchronization unit may be configured to synchronize signals used in a threshold implementation operation process based on the generated enable signal. | 2021-09-16 |
20210286904 | MEMORY ACCESS GATE - Methods, systems, and devices for a memory access gate are described. A memory device may include a controller, memory dice, and a pad for receiving an externally provided control signal, such as a chip enable signal. The memory device may include a switching component for selecting the externally provided control signal or an internally generated control signal. The controller may provide the selected control signal to a memory die. The memory device may determine whether it is operating in a first mode or a second mode, and select the externally provided control signal or the internally generated control signal based on the determination. The first mode may be a diagnostic mode in some cases. The controller may include a secure register whose value may impact or control the switching. An authenticated host device may direct the controller to write the value to the secure register. | 2021-09-16 |
20210286905 | SYSTEMS AND METHODS FOR LASER PROBING FOR HARDWARE TROJAN DETECTION - A method includes in part, generating an electro-optical frequency map (EOFM) of an active layer of an integrated circuit (IC), retrieving a reference map of the IC, comparing the EOFM of the IC with the reference map to determine whether there is a match between an intensity of an identified region in the EOFM map and an intensity of a corresponding region of the reference map, and detecting one or more hardware trojans in the IC if there is no match. The reference map may be associated with a layout of an IC known not to include hardware trojans. The reference map also may be a second EOFM associated with the IC. Alternatively, the reference map may be generated by applying power to the IC, and applying a clock signal to the IC. | 2021-09-16 |
20210286906 | MEMORY DEVICE, DATA TRANSFER DEVICE AND METHOD FOR TRANSFERRING DATA - Provided is a memory device for transmitting data between at least two computer devices, which are assigned to different network zones, which memory device contains at least one memory unit for storing data, at least two interfaces which lead towards the exterior and to which a respective one of the external computer devices can be connected for reading and/or writing data, and at least one control unit which is designed in such a way as to establish access rights to the data of the memory unit as a function of at least two of interfaces which lead towards the exterior. Thus, for example a data transmission can be established exclusively from a first computer device to a second computer device. | 2021-09-16 |
20210286907 | Protection Systems for Portable Devices - A protection system for portable electronic devices may include a first impact absorbing panel, a second impact absorbing panel, and multiple spacers adapted to hold the panels apart to accommodate the thickness of a portable electronic device inserted between the panels. The system may include a first rigid shell having multiple attachment slots around its periphery, a first impact absorbing material on the inner side of the first shell, a second rigid shell having multiple attachment slots around its periphery, a second impact absorbing material on the inner side of the second shell, multiple spacers adapted to attach to the shells at the attachment slots, wherein the spacers hold the panels apart with their inner sides facing each other, thereby forming a protected space for the portable electronic devices between the shells and spacers. | 2021-09-16 |
20210286908 | METHOD AND DEVICE FOR OPERATING A BUS SYSTEM - A method for operating a bus system, in which a message of the bus system is received and its validity is ascertained, wherein, if it was ascertained that the message is “malicious”, a new message is sent to the designated receiver of this “non-malicious” message, the content of the new message having been previously rated as “non-malicious.” | 2021-09-16 |
20210286909 | METHOD FOR MAKING PRESTRESSED SHELLS HAVING TUNABLE BISTABILITY - In a method for manufacturing prestressed shells having tunable bistability, in order to determine the appropriate prestress to be applied to the bistable structure/shell, it provides: clamping a shell by applying a predetermined curvature on a portion of its edge; defining a discrete shell model dependent on a small number of configuration parameters q_i, (i<5), by projecting the non-linear shell model of Marguerre-von Kármán onto an appropriate finite dimensional space so that the projection does not significantly alter the strain elastic energy; tracing the stability maps in the space of the design parameters by minimizing the discrete representation of the strain elastic energy E(q_i;p_i) thus obtained; and choosing the design parameters providing the prestress needed to obtain the desired response in terms of project requirements. | 2021-09-16 |
20210286910 | SPATIAL FIELD OPTIMIZATION WITH REDUCED PARAMETERS - A method for producing a design includes receiving a set of design constraints. A spatial field is created based on the design constraints. The spatial field is represented with a linear combination of one or more bases. A number of the one or more bases is less than a number of elements in the spatial field. Respective weights are optimized for each of the one or more bases. A design is produced based on the spatial field and the weights. | 2021-09-16 |
20210286911 | PAINT DESIGN TEMPLATE PRODUCTION AND ASSOCIATED SYSTEMS AND METHODS - Disclosed herein are a system and method for producing paint templates for painting a design on a target surface. The system includes a processor configured to generate a geo-file of paint template designs. The processor includes a design module configured to parse the design into a set of paint sub-designs and a template design module configured to generate the geo-file of paint template designs based on the set of paint sub-designs. The generated geo-file of paint template designs includes a paint template design that corresponds to a paint sub-design. The system further includes a plotter configured to produce a set of paint templates based on the geo-file of paint template designs. Each paint template design includes a set of alignment marks and each paint template is produced with a set of alignment apertures corresponding to the set of alignment marks. | 2021-09-16 |
20210286912 | Method and Arrangement for Creating a Digital Building Model - A method and arrangement for dynamically updating and expanding a digital building model (BIM, digital twin) with respect to furniture information for rooms, wherein the recording of the seating configuration of a room takes place by means of a correspondingly configured recording device (e.g. mapping apparatus, NavVis apparatus, smartphone camera); wherein a mapping of the seating configuration of the room into a digital building model (BIM) takes place, wherein the recording of the seating configuration of the room and the mapping of the seating configuration of the room into the digital building model (BIM) takes place in a time-controlled or event-controlled manner. | 2021-09-16 |
20210286913 | TECHNOLOGIES FOR COLLECTING AND VIRTUALLY SIMULATING CIRCADIAN LIGHTING DATA ASSOCIATED WITH A PHYSICAL SPACE - Systems and methods for collecting and analyzing lighting conditions associated with a physical space in order to effect circadian-effective design. According to certain aspects, a data capture machine may include various sensors and components, such as at least one image sensor that captures digital images of a set of luminaires, at least one laser that detects physical objects as well as the location of the data capture machine in the physical space, a detector that collects a set of spectral power distribution (SPD) measurements, and a video capture device that collects images at a set of locations of the physical space. The data capture machine may aggregate the captured information and generate an electronic file that a computing device may use to present a visual representation of the lighting conditions of the physical space. This representation may then enable a lighting designer to evaluate the non-visual impact of illumination, and offer tools to improve the design. | 2021-09-16 |