40th week of 2021 patent applcation highlights part 49 |
Patent application number | Title | Published |
20210312040 | ENHANCING SECURITY USING ANOMALY DETECTION - Certificate usage data is generated which identifies which processes or applications use which specific certificates. A certificate-specific usage model is generated based upon the certificate usage data and is used to detect anomalous usage of a certificate, by an application or process that has not previously used the certificate to authenticate itself to the computing system. | 2021-10-07 |
20210312041 | UNSTRUCTURED TEXT CLASSIFICATION - The technology described herein identifies malicious URLs using a classifier that is both accurate and fast. Aspects of the technology are particularly well adapted for use as a real-time URL security analysis tool because the technology is able to quickly process a URL and produce a warning when a malicious URL is identified. The rapid processing speed of the technology described herein is produced, in part, by use of only a single input signal, which is the URL itself. The high accuracy produced by the technology described herein is achieved by analyzing the unstructured text on both a character-by-character level and a word-by-word level. The technology described herein uses both character-level and word-level information from the incoming URL. | 2021-10-07 |
20210312042 | Graph-Based Classification of Elements - Systems and methods are provided to determine a maliciousness level of an element using a hypergraph of neighbors. The method can include receiving the element; generating a hypergraph of neighbor target elements found in a database, the hypergraph comprising a set of nodes and a set of edges, wherein the set of nodes represents the neighbor target elements, and the set of edges represents connections between the neighbor target elements; classifying nodes and edges in the hypergraph; generating a maliciousness level profile for the element based on aggregation of nodes and edges in the hypergraph; linking information related to the element with the maliciousness level profile for the element; and performing an action based on a type of the element. | 2021-10-07 |
20210312043 | VEHICLE COMMUNICATIONS BUS DATA SECURITY - A method of real-time data security of a communications bus, the method comprising the steps of: reading at least an early portion of a message being transmitted over a communications bus, determining whether the message is suspicious, according to at least one rule applied on the read early portion of the message, and upon determining that the message is suspicious, corrupting at least a part of the message. | 2021-10-07 |
20210312044 | PLATFORM SECURITY MECHANISM - An apparatus comprising a computer platform, including a central processing unit (CPU) comprising a first security engine to perform security operations at the CPU and a chipset comprising a second security engine to perform security operations at the chipset, wherein the first security engine and the second security engine establish a secure channel session between the CPU and the chipset to secure data transmitted between the CPU and the chipset. | 2021-10-07 |
20210312045 | INTEGRATED CIRCUIT SIDE-CHANNEL MITIGATION MECHANISM - An apparatus to facilitate mitigation of side-channel attacks in a computer system platform is disclosed. The apparatus comprises a cryptographic circuitry, including a plurality of crypto functional units (CFUs) to perform cryptographic algorithms; and jammer circuitry to generate noise to protect the plurality of CFUs from side-channel attacks. | 2021-10-07 |
20210312046 | RANSOMWARE DETECTION AND PREVENTION - Embodiments are described for detecting ransomware attacks. Aspects include receiving a memory access request for a memory location. Aspects also include allowing the memory access request based on a determination that the memory location is not present in a decoy address table. Aspects further include terminating a process that made the memory access request based on a determination that the memory location is present in the decoy address table. | 2021-10-07 |
20210312047 | QUANTUM-ATTACK RESISTANT OPERATING SYSTEM FOR USE IN A KEY MANAGEMENT MECHANISM - A quantum-attack resistant operating system for use in a key management mechanism which is a full solution of cyber-security for quantum transmission via optical paths, in order to detect and bypass quantum computing attacks, or to perform quantum counterattacks, during various procedures of quantum key managements; wherein the system avoids the attacks of key tampering, destroying, detecting, and blocking, from other quantum systems in a quantum key storage phase; meanwhile, it also avoids the sniffing from other quantum systems on key entangled properties, in a quantum key clearing phase; in addition, in a quantum key recycling phase, facing quantum computing attacks, it not only can disrupt the judgement of other systems on key verification, but also consumes the computing resources on the attacker side; thereby the present invention provides a protection mechanism which cannot be achieved by a conventional PQC (Post-quantum cryptography) solution. | 2021-10-07 |
20210312048 | ANALYZING MULTIPLE CPU ARCHITECTURE MALWARE SAMPLES - A sample is received for analysis by a virtualized environment. A determination is made that the sample was compiled for a CPU architecture that is different from a host CPU architecture. The sample is executed in an emulated user space corresponding to the CPU architecture for which the sample was compiled. The emulated user space is provided by executing a user space emulation utility in a virtual machine that shares the host CPU architecture. | 2021-10-07 |
20210312049 | DETECTING MALICIOUS SOFTWARE USING SENSORS - In some implementations, a method includes retrieving data from multiple sensors in a computing device, and the multiple sensors comprise different types of sensors. The sensor data is analyzed based on a predictive model, and the predictive model is trained to detect malware. Initiation of malware is determined based on the analysis. In response to the determination, the malware is terminated. | 2021-10-07 |
20210312050 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO VERIFY APPLICATION PERMISSION SAFETY - Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety. An example apparatus to identify unsafe permissions associated with a candidate app disclosed herein includes an app classifier interface to retrieve a cluster of apps associated with the candidate app, the candidate app including a requested permission set (RPS), a white knight (WK) identifier to identify a set of WK apps within the cluster, the set of WK apps associated with a designation of trust, a safe permission set (SPS) evaluator to generate an SPS list associated with the set of WK apps within the cluster, and an RPS identifier to determine whether permissions of the RPS are listed in the SPS list, the SPS evaluator further to designate first respective ones of the permissions of the RPS as safe when the first respective ones of the permissions are listed in the SPS list, and designate second respective ones of the permissions of the RPS as unsafe when the second respective ones of the permissions are absent from the SPS list. | 2021-10-07 |
20210312051 | Secure Boot of a Processing Chip - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security (such as intrusion and/or virus/malware prevention), performance, cost, and efficiency. For example, the processing chip includes at least one CPU and circuitry enabling the at least one CPU to securely boot from an external, non-volatile memory chip containing encrypted, executable code. The circuitry comprises immutable hardware to copy the executable code from the non-volatile memory to another external memory from which the at least one CPU is able to access it. The encryption uses a key created at a manufacturing time of and unique to the processing chip that is never CPU-accessible, forming a secure hardware association between the processing chip and the non-volatile memory chip. | 2021-10-07 |
20210312052 | Secure Boot Hardware Including Hardware Serial Presence Detection - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security, performance, cost, and efficiency. For example, the processing chip includes one or more CPUs and circuitry enabling the CPUs to securely boot from an external, non-volatile memory chip containing encrypted, executable code. The circuitry comprises immutable hardware to hold the CPUs in a reset state while performing a serial presence detect on external interfaces of the processing chip and generating an address map according to results of the serial presence detect. In response to an initial instruction fetch of an initial one of the CPUs, the circuitry is able to return one or more instructions via the address map associating an address of the initial instruction fetch with one of the external memory chips. | 2021-10-07 |
20210312053 | Secure Executable Code Update for a Securely-Bootable Processing Chip - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security, performance, cost, and efficiency. The processing chip includes immutable hardware enabled to securely boot one or more CPUs of the processing chip to execute code stored in a non-volatile one of the external memory chips, and to update the code. An update to the code is written to a portion of one of the external memory chips that is not accessible to the CPUs, and the immutable hardware copies the update to the non-volatile memory chip. The update is encrypted with a public portion of a key possessed by an entity sending the update, and a private portion of the key, used to decrypt code stored in the non-volatile memory chip, is unique to and solely possessed by the processing chip. | 2021-10-07 |
20210312054 | Securely Booting a Processor Complex Via a Securely Bootable Subsystem - Techniques in electronic systems, such as in systems including a processor complex having one or more system processors and one or more memories, provide improvements in one or more of system security, performance, cost, and efficiency. In some embodiments, the system includes secure boot logic (SBL) having immutable hardware enabled, in response to a reset of the system, to securely boot one or more boot processors of the SBL to execute known-good executable code. The SBL is then enabled to securely boot the one or more system processors to execute system code stored in a non-volatile one of the memories by copying the system code to another one of the memories from which at least one of the system processors is able to access the system code for a respective initial instruction fetch. The non-volatile memory is not accessible to the system processors. | 2021-10-07 |
20210312055 | Securely Booting a Processing Chip - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security (such as intrusion and/or virus/malware prevention), performance, cost, and efficiency. For example, the processing chip includes at least one CPU and circuitry enabling the at least one CPU to securely boot from an external, non-volatile memory chip containing encrypted, executable code, and does not expose un-encrypted data, including the executable code, on an external memory interface, including a DRAM interface. Further, only the specific processing chip that was used to initially write the encrypted executable code to the external non-volatile memory chip is able to decrypt the encrypted executable code. The decryption uses a key unique to the processing chip and created at manufacturing time that is never CPU-accessible, forming a secure hardware association between the two chips. | 2021-10-07 |
20210312056 | Secure Boot of a Processing Chip Via Hardware Memory Configuration - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security, performance, cost, and efficiency. In some embodiments, the processing chip includes immutable hardware that is enabled, without a use of any CPUs, to determine and/or confirm an expected configuration of one or more external memory chips (such as with a Serial Presence Detect operation), and/or to enable communication with the one or more external memory chips. The immutable hardware is further enabled to copy executable code from a non-volatile one of the one or more external memory chips to another of the one or more external memory chips so that a CPU of the processing chip is able to securely boot by fetching initial instructions from the copy of the executable code. | 2021-10-07 |
20210312057 | Securely Booting a Processing Chip to Execute Securely Updated Executable Code - Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security, performance, cost, and efficiency. In some embodiments, the processing chip includes immutable hardware enabled to securely boot one or more CPUs of the processing chip to execute code stored encrypted in a non-volatile one of the memory chips. An encrypted update to the code is written to a portion of one of the memory chips and the immutable hardware copies the update to the non-volatile memory chip. The immutable hardware is then able to securely boot the one or more CPUs to execute the encrypted update stored in the non-volatile memory chip. In further embodiments, the non-volatile memory chip and/or the portion of one of the memory chips are not accessible by the one or more CPUs. | 2021-10-07 |
20210312058 | MACHINE LEARNING SYSTEM FOR DETERMINING A SECURITY VULNERABILITY IN COMPUTER SOFTWARE - Methods, computer-readable media, software, and apparatuses may retrieve, from an industry standard setting scoring system and for a vulnerability, a temporal score based on a pre-revision version of a scoring system, and predict, based on a machine learning model and based on the temporal score for the vulnerability, an updated temporal score based on a post-revision version of the scoring system. A mitigating factor score, indicative of a mitigation applied to the vulnerability by an enterprise organization, may be determined. A risk score may be generated for each vulnerability, as a composite of the updated temporal score and the mitigating factor score. The risk scores for vulnerabilities in a collection of vulnerabilities may be aggregated to determine an enterprise risk score for the enterprise organization. In some instances, the enterprise risk score may be displayed via a graphical user interface. | 2021-10-07 |
20210312059 | EVALUATION OF POLICIES OF A SYSTEM OR PORTION THEREOF - A method for execution by an analysis unit includes obtaining a collection of data for a particular evaluation of a system aspect. The method further includes acquiring data analysis parameters regarding the particular evaluation of the system aspect. The method further includes determining one or more evaluation perspectives based on the data analysis parameters. The method further includes determining one or more evaluation modalities based on the data analysis parameters. The method further includes determining one or more evaluation metrics based on the data analysis parameters. The method further includes evaluating the collection of data in accordance with the one or more evaluation metrics, the one or more evaluation perspectives, and the one or more evaluation modalities to produce one or more evaluation outputs. | 2021-10-07 |
20210312060 | Trust Agents - Systems and techniques are provided for trust agents. Trust agents may be enabled. A state determination may be received from each of the enabled trust agents. The state determination may indicate either a trusted state or an untrusted state. The received state determinations may be combined to determine a security state. A security measure may be enabled or disabled based on the determined security state. | 2021-10-07 |
20210312061 | Systems and Methods for Controlling Data Exposure Using Artificial-Intelligence-Based Periodic Modeling - Systems and methods for periodically modifying data privacy elements are provided. The systems and methods may identify a set of data privacy elements. A data privacy element can characterizes a feature of a computing device and can be detectable by a network host. A first artificial profile can be generated by modifying a first data privacy element based on an artificial profile model that defines a relationship associated with one or more constraints between the set of data privacy elements. Subsequent to generating the first artificial profile, a second artificial profile can be generated by periodically modifying a second data privacy element in accordance with the relationship defined by the artificial profile model. The computer device can be masked from being identified by the network host by sending the second artificial profile including the second data privacy element to a requested network location. | 2021-10-07 |
20210312062 | RECORD MANAGEMENT APPARATUS - A record management apparatus includes a processor configured to, about use of an apparatus by an authorized user other than a manager of the apparatus, acquire an execution record of a process performed by the apparatus and charge information about a charge for the process, encrypt the execution record by using a specific encryption key, store the charge information and the encrypted execution record in a storage, and in response to a request from the manager, provide to the manager a password that is temporarily valid to acquire a decryption key for decryption of the encrypted execution record. | 2021-10-07 |
20210312063 | NETWORK PRINTING - A network printing system comprising a user device to encrypt a print job using a public key of a user and to transmit the encrypted print job to a print server. The system may further comprise the print server to re-encrypt the encrypted print job using the re-encryption key. The system may further comprise the printer to decrypt the re-encrypted print job using a private key of the printer and print the decrypted print job. | 2021-10-07 |
20210312064 | DEVICE AND METHOD FOR SECURE PRIVATE DATA AGGREGATION - A computing system for enabling the analysis of multiple raw data sets whilst protecting the privacy of information within the raw data sets, the system comprising a plurality of synthetic data generators and a data hub. Each synthetic data generator is configured to: access a corresponding raw data set stored in a corresponding one of a plurality of raw data stores; produce, based on the corresponding raw data set, a synthetic data generator model configured to generate a synthetic data set representative of the corresponding raw data set; and push synthetic information including at least one of the corresponding synthetic data set and the synthetic data generator model to the data hub. The data hub is configured to store the synthetic information received from the synthetic data generators for access by one or more clients for analysis. The system is configured such that the data hub cannot directly access the raw data sets and such that the synthetic data information can only be pushed from the synthetic data generators to the data hub. | 2021-10-07 |
20210312065 | UNIVERSAL ACCESS LAYER FOR ACCESSING HETEROGENEOUS DATA STORES - Methods and systems disclosed herein describe a universal access layer that allows a plurality of applications to obtain data and/or information from a plurality of heterogeneous data stores. The universal access layer may include one or more application data objects to validate requests, transform a format of the request, determine which data stores comprise the requested data and/or information, encrypt the request, combine responses into a single response, and retransform the response prior to sending it to the requesting application. By using the universal access layer, applications may improve the speed with which they access data and/or information from the plurality of heterogeneous data stores. | 2021-10-07 |
20210312066 | METHODS AND SYSTEMS FOR DETECTING RANSOMWARE ATTACK IN INCREMENTAL BACKUP - Ransomware attack (RWA) detection is performed during an incremental or differential backup of a system of folders or directories of a computer or network of computers via an electronic network. The RWA detection includes processing incremental or differential backup metadata acquired during the incremental or differential backup to determine whether a RWA alert is issued. RWA remediation is performed at least in part on the RWA alert being issued. The RWA alert may be issued based on processing of the incremental or differential backup metadata to identify candidate new files and candidate deleted files in which the candidate new files are candidates for being encrypted copies of the candidate deleted files. RWA alert criterion may be based on counts of new versus deleted files in a folder or directory, and comparison of file sizes of the new versus deleted files. | 2021-10-07 |
20210312067 | ENRICHMENT OF DATABASE LOGS - A method by a network device to enrich database logs. The method includes detecting that a process executing on the network device has created a database connection to a database server, determining contextual information of the process in response to detecting that the process has created the database connection, generating a key associated with the database connection based on information that is known to be included in a database log of the database, and providing the key and the contextual information to a correlator component. | 2021-10-07 |
20210312068 | DETECTING BEHAVIORAL ANOMALIES IN USER-DATA ACCESS LOGS - A method by one or more computing devices for detecting application user anomalies in audit logs of database operations performed on one or more databases. The method includes obtaining a first audit log of database operations, wherein the first audit log indicates (1) which application users of an application caused which of the database operations to be performed and (2) which functions of the application caused which of the database operations to be performed, generating, for each of the application users indicated in the first audit log, a profile of that application user that indicates which of the functions that application user is expected to touch, and detecting an anomaly in response to a determination that a second audit log indicates that an application user touched a function that is not one of the functions indicated in the profile of the application user. | 2021-10-07 |
20210312069 | SECURE DIGITAL FINGERPRINT KEY OBJECT DATABASE - A data store to store and access digital records is provided, and a key object record is initialized in the data store to store data associated with a physical key object. A digital fingerprint of the physical key object is stored in the key object record. Another digital record is created in the data store that is not the key object record. The digital record is linked to the digital fingerprint of the physical key object The linking is arranged to provide secure control access to the linked digital record. A tendered access key is received via a programmatic interface or user interface, and the data store is queried based on the tendered access key to identify a matching digital fingerprint of a key object. In a case that the querying identifies the matching digital fingerprint of the key object within a prescribed level of confidence, access to the linked digital record secured by the key object is granted. | 2021-10-07 |
20210312070 | DATA SHARING USING ALIAS OBJECTS - A method of sharing data in a multi-tenant database includes generating a share object in a first account comprising a share role. The method includes associating one or more access rights with the share role, wherein the one or more access rights indicate which objects in the first account are accessible based on the share object. The method includes granting, to a second account, cross-account access rights to the share role or share object in the first account. The method includes receiving a request from the second account to access data or services of the first account. The method further includes providing a response to the second account based on the data or services of the first account. | 2021-10-07 |
20210312071 | Method and apparatus for securing data in multiple independent channels - Designs of integrated modules for securing data are described. According to one aspect of the present invention, a data set is distributed among a plurality of data channels, each of the data channels including an encrypting/decrypting module designed to process a data stream or set. Modules in the data channels work independently from each other. A next data stream is timely provided to a data channel when a current data stream is about to finish, resulting in increased efficiency when encrypting data from a source or decrypting encrypted data for a source. | 2021-10-07 |
20210312072 | EFFICIENT TRAVERSAL OF HIERARCHICAL DATASETS - In one embodiment, a method comprises receiving a request for a particular user identification (ID) to perform a particular operation on a particular data object. An entitlement cache associates each operation that the particular user ID is entitled to perform with a first encoding of a tuple of a plurality of tuples. An object mapping cache associates each tuple of the plurality of tuples with a second encoding of each tuple of the plurality of tuples. An object mapping is used to determine a first tuple. The object mapping cache is used to determine a first vector of one of more left values based on the first tuple. The entitlement cache is used to determine a second vector of one or more value pairs. In response to identifying a match between the first vector and the second vector, the particular user ID is granted access to the particular data object. | 2021-10-07 |
20210312073 | DATA PROCESSING METHODS, APPARATUSES, AND DEVICES - Embodiments of the present specification disclose data processing methods, apparatuses, and devices. One method comprises: obtaining an acquisition request for target data of a data owner; determining a trusted application (TAPP) for generating the target data based on decentralized identifier document (DID Doc) information of the data owner in response to the acquisition request; sending, to the TAPP, a target data generation request to use the TAPP to process data of the data owner obtained from a trusted institution; and receiving a processing result from the TAPP in response to the target data generation request. | 2021-10-07 |
20210312074 | Electronic Devices, Methods, and Systems for Temporarily Precluding Sharing of Media Content to Protect User Privacy - An electronic device includes one or more sensors capturing media content from an environment of the electronic device. A location detector determines whether the environment of the electronic device is situated at a location of residence of an authorized user of the electronic device. A user interface receives user input requesting transmission of the media content to another electronic device located outside the location of residence of the authorized user of the electronic device. One or more processors preclude transmission of the media content to the other electronic device in response to the user input when the location detector determines that one or more sensors captured the media content at the location of residence of the authorized user of the electronic device. | 2021-10-07 |
20210312075 | Electronic Devices, Methods, and Systems for Temporarily Precluding Sharing of Media Content to Protect User Privacy - An electronic device comprises one or more sensors capturing media content while the electronic device is situated at a media content capture location. A user interface receives user input requesting transmission of the media content to another electronic device situated at another electronic device location. One or more processors determine whether the media content capture location and the another electronic device location are substantially different locations, and at least temporarily preclude, in response to the user input, the transmission of the media content to the other electronic device when the media content capture location and the another electronic device location are substantially different locations. | 2021-10-07 |
20210312076 | METHOD AND SYSTEM FOR ACCESSING AND PROVIDING MARKET DATA - A system and method that provide information about one or more clients to a service provider, such as a contractor. The system may also provide competitive information to the service provider. The system comprises a hardware processor configured to obtain client rating information from another service provider. The client rating information is based on actual experience between the other service provider and the one or more clients for which the rating is made. The system further comprises a memory device in communication with the hardware processor and configured to store the client rating information for later retrieval by the hardware processor. The hardware processor is further configured to authenticate the service provider based on credentials provided by the service provider and, if the hardware processor determines that the credentials are valid, permit access by the service provider to the client rating information. | 2021-10-07 |
20210312077 | SECURING SENSITIVE USER DATA STORED LOCALLY BY AN APPLICATION - An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify sensitive user data stored in the memory by a first application, determine a risk exposure score for the sensitive user data, apply, based on a determination that the risk exposure score is above a threshold, a security policy to restrict access to the sensitive user data, receive a request from a second application to access the sensitive user data, determine whether the first application and the second application are similar applications, and allow access based on a determination that the first application and the second application are similar applications. | 2021-10-07 |
20210312078 | METHODS AND SYSTEMS FOR CRYPTOGRAPHICALLY SECURED DECENTRALIZED TESTING - A method of cryptographically secured decentralized testing includes receiving, by a computing device and from a secure test apparatus, an output of a cryptographic function of a secret test result identifier, authenticating the output, and recording, in a data repository, an indication of a test result as a function of the output. | 2021-10-07 |
20210312079 | Display Device, Information Terminal, Personal Information Protection Method, Program, and Recording Medium Whereon Program is Recorded - Provided are a program and personal information protection method which are executed by a system which is operated by a medical practitioner, said program and method comprising: a display process of causing a monitor part | 2021-10-07 |
20210312080 | METHODOLOGY TO OBFUSCATE SENSITIVE INFORMATION IN MOBILE APPLICATION BACKGROUND SNAPSHOT - Techniques described herein are directed to a system which prevents unintended data leakage by intelligently masking/obfuscating sensitive data by carefully listening for application lifecycle events and acting upon those events. The system may manipulate the data which will be displayed just before the creation of a snapshot by the OS. The system may identify all data fields from the last-seen screen for the software application which are marked as sensitive and then obfuscate those data fields. Thus, the system can mask the sensitive data that appears in the last-seen screen, such that any snapshot taken during this time, all the sensitive fields will be obfuscated. Once the application enters to the foreground state completely, reverse logic can be applied for removing the masking to present actual data. Thus, the system maintains the security of sensitive data while minimizing any impact on the user experience. | 2021-10-07 |
20210312081 | Interoperable Digital Social Recorder of Multi-Threaded Smart Routed Media and Crypto Asset Compliance and Payment Systems and Methods - Blockchain-enabled crypto asset systems and a Digital Social Recorder system are operable within a computer network environment for allowing a user to control how advertisers access the user's personal data; allowing crypto asset compensation in exchange for social amplification; and tracking asset allocation. Payments made via blockchain tracking, and the distribution of any revenues derived from cost savings provided to terrestrial, satellite or digital radio broadcasters back to music rights holders and other related groups are provided. These rights holders typically like to incentivize consumers, and by using the crypto assets or tokens created by the present invention, a reward for listening/consuming may be provided. Further, payments for industry services to the rights holder are contemplated to include, but not be limited to any Performance Rights Organizations (PROs), Record Labels, Publishing Companies/Administrators, Managers, Agents or any fractional rights holders or owners who would hold claim against any such revenues. | 2021-10-07 |
20210312082 | SYSTEM AND METHOD FOR CODE-BASED PROTECTION OF SENSITIVE DATA - A system and method for monitoring and protecting sensitive data that includes identifying sensitive data and statically tracking sensitive data using data flow analysis across a code base, monitoring flow of the data during application runtime, and responding to vulnerabilities according to a sensitive data characterization of the data. Identifying sensitive data includes processing a semantic description of the data in the application code and characterizing the sensitive data. Monitoring flow of the data includes: identifying and characterizing sensitive data through data usage, updating the characterization for the sensitive data through data usage, and enforcing security measures on the data according to the sensitive data characterization of the data. | 2021-10-07 |
20210312083 | DATA PROCESSING SYSTEMS FOR PROCESSING AND MANAGING DATA SUBJECT ACCESS IN A DISTRIBUTED ENVIRONMENT - In particular embodiments, a data subject request processing system may be configured to utilize one or more local storage nodes in order to process a data subject access request on behalf of a data subject. In particular embodiments, the one or more local storage nodes may be local to the data subject making the request (e.g., in the same country as the data subject, in the same jurisdiction, in the same geographic area, etc.). The system may, for example, be configured to: (1) receive a data subject access request from a data subject (e.g., via a web form); (2) identify a suitable local storage node based at least in part on the request and/or the data subject; (3) route the data subject access request to the identified local storage node; and (4) process the data subject access request at the identified local storage node. | 2021-10-07 |
20210312084 | SYSTEMS AND METHODS FOR MANAGING DIGITAL MEDIA ITEMS ACCESS - A server causes a social media application to be implemented on a client device. The social media application is configured to receive a request from a first user to restrict a plurality of users from identifying the first user in the digital media. The social media application requests the server to scan a plurality of digital media items uploaded to the server to identify a set of digital media items featuring the first user. The server identifies a set of digital media items related to the first user and modifies a portion of the identified set of digital media items to obfuscate the identity of the first user prior to transmitting the identified set of digital media items to a plurality of client devices having the social media application installed thereon. | 2021-10-07 |
20210312085 | Electronic Devices, Methods, and Systems for Temporarily Precluding Sharing of Media Content to Protect User Privacy - An electronic device includes one or more sensors capturing media content while the electronic device is situated at a media content capture location. A user interface receives user input requesting transmission of the media content to another electronic device at a user input reception location. A location detector determines whether the media content capture location and the user input reception location are substantially different locations. One or more processors at least temporarily preclude, in response to the user input, the transmission of the media content to the other electronic device when the location detector determines that the media content capture location and the user input reception location are substantially different locations. | 2021-10-07 |
20210312086 | APPARATUS AND METHOD FOR RECOMMENDING USER PRIVACY CONTROL - Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user. | 2021-10-07 |
20210312087 | METHOD FOR MONITORING THE INTEGRITY OF A PHYSICAL OBJECT - A method is provided for monitoring the integrity of a physical object, wherein the object receives a request of a server via a communication network. The request includes a digital character string, and in response to the received request, an electronic system of the object ascertains the digital fingerprint of the object and combines the ascertained digital fingerprint with a digital secret, which is known to the server and is stored in a memory device, and with the received character string (C) in order to form a response. The object transmits the response to the server via the communication network for analysis. | 2021-10-07 |
20210312088 | METHOD FOR SHARING AND VERIFYING BLOCKS AND ELECTRONIC DOCUMENTS BETWEEN NODES IN BLOCKCHAIN - Various embodiments of the present disclosure relate to a method for sharing and verifying blocks between specific nodes in a blockchain. In addition, various embodiments of the present disclosure relate to a method for distributing an electronic document using a smart contract in a blockchain. | 2021-10-07 |
20210312089 | DATA AUTHORIZATION INFORMATION ACQUISITION METHODS, APPARATUSES, AND DEVICES - Embodiments of the present specification disclose data authorization information acquisition methods, apparatuses, and devices. One method comprises: receiving, from a data requestor and for data, a data use permission application; determining, based on the data use permission application, an approver, wherein the approver is an owner of the data; sending the data use permission application to the approver; receiving acknowledgement information of the approver for receiving the data use permission application; generating data authorization information based on the acknowledgement information; and sending the data authorization information to the data requestor. | 2021-10-07 |
20210312090 | INFORMATION PROCESSING SYSTEM, STORAGE MEDIUM, AND CONTROL METHOD - Provided is an information processing system including a setting unit that automatically sets a privacy level depending on a user of a communication destination device, a communication unit that transmits a picture of a user of a communication source device to the communication destination device, and a controller that performs control to mask the picture of the user of the communication source device depending on the automatically set privacy level. | 2021-10-07 |
20210312091 | MULTI-MASTER SECURITY CIRCUIT - A System on Chip includes at least two hardware masters, a security circuit, and a communication infrastructure for communication between the hardware masters and the security circuit, the communication infrastructure being based on a given interface communication protocol. Each hardware master is configured to send a request to the security circuit for execution of the request by the security circuit through the communication infrastructure, each request comprising at least one service identifier identifying a service. The security circuit may comprise a Secure Mailbox comprising a filter configured to filter the requests received from the hardware masters, the filter being configured to determine at least one indicator bit, in response to the receipt of a request from a hardware master, using at least a part of an identifier associated with the master, the indicator bit indicating whether the master is allowed access to the Security circuit, the identifier being an hardware identifier received with the request through the communication protocol, the filter filtering the requests based on the bit indicators determined for each request. The security circuit is further configured to execute the filtered requests. | 2021-10-07 |
20210312092 | INTEGRATED CIRCUIT(S) WITH ANTI-GLITCH CANARY CIRCUIT(S) - An IC comprising functional circuit to perform primary functions of the IC is provided. The functional circuit is to enable electrical signals to propagate through it within a timing constraint of the functional circuit. The IC comprises at least one canary circuit used for detecting glitch attacks on the circuit. Electrical signals are to propagate through the canary circuit(s) within a defined timing constraint of the canary circuit(s). The canary circuit is to provide a signal path designed such that in the event of a timing constraint of the functional circuit(s) is violated due to a glitch attack, also the timing constraint of the canary circuit(s) is violated. | 2021-10-07 |
20210312093 | ANOMALOUS CACHE COHERENCE TRANSACTION DETECTION IN A HETEROGENEOUS SYSTEM - Embodiments for mitigating security vulnerabilities in a heterogeneous computing system are provided. Anomalous cache coherence behavior may be dynamically detected between a host and one or more accelerators using a cache controller at a shared last level cache based upon a pair-based coherence messages functioning as a proxy for indicating one or more security attack protocols. | 2021-10-07 |
20210312094 | System to Prevent Visual Hacking - The proposed technology enables new levels of privacy while using electronics in open or public settings via the modification and censorship of a device's displayed content in response to the presence of spectators within a visible range of content displayed. In an open or public environment, users of electronic devices with any form of display can have their privacy and security compromised by any unauthorized spectators within the aforementioned visible range. To combat this problem, the proposed technology monitors the presence of users and spectators within predetermined regions and changes the content displayed appropriately such that the spectators are deterred or prevented from viewing the user's (or users) content. The system provides an added layer of security which is advantageous to users who prefer to use their devices in public locations but are afraid of being visually hacked. The proposed technology would also prove useful on devices which are permanently situated in public locations (ATM's, public computers, etc.) | 2021-10-07 |
20210312095 | PHYSICAL BARRIER TO INHIBIT A PENETRATION ATTACK - An apparatus that includes a substrate and a first plurality of circuit components mounted on the substrate, which is associated with a protected area. The apparatus includes a connector formed on the substrate to at least partially circumscribe the protected area and a second plurality of circuit components mounted on the substrate to at least partially circumscribe the connector to form a security barrier to physically inhibit a penetration attack into the protected area. | 2021-10-07 |
20210312096 | COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS - A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system using a file that includes location, rotation, and/or scale data. | 2021-10-07 |
20210312097 | GENERATING PERSONALIZED EXOSUIT DESIGNS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating personalized exosuits. In some implementations, sensor data indicating a three-dimensional shape of stretchable template garment while the template garment is worn by a person and has been stretched to align with the person's anatomy is obtained. The template garment can include indicators corresponding to positions for components of an exosuit, and can correspond to an exosuit design. The sensor data is analyzed to determine locations of the indicators of the template garment. A personalized exosuit design is generated for the person by adjusting a computer model for the exosuit design to locate components of the exosuit at regions corresponding to the identified locations of the indicators of the template garment. The personalized exosuit design is provided to one or more manufacturing devices. | 2021-10-07 |
20210312098 | ENHANCED SELECTION FILTERING WITHIN COMPUTER-AIDED DESIGN - Examples can include a system for filtering selections made within a computer-aided design (“CAD”) application. A plugin can generate a filter designer window that is displayed on a graphical user interface (“GUI”). The plugin can receive criteria for a first filter based on an edit tab that allows the user to select a parameter, operator, and operand. The user can categorize and edit the filters and apply them to the selection. The plugin can loop through elements within a selection box and automatically deselect elements that do not meet the criteria of the first filter. Remaining selected elements can be visually indicated as specified by the first filter. | 2021-10-07 |
20210312099 | 3D-LINK - A computer-aided design (CAD) system and corresponding method enable users to manage and share information related to a three-dimensional (3D) context of a 3D CAD model with ease. The method creates a 3D-link targeting the 3D context. The 3D-link includes a static link and a variable link. The static link re-directs to the variable link in response to a user opening the 3D-link. The variable link enables (i) the 3D CAD model to be located and opened and (ii) the 3D context to be displayed within the 3D CAD model. The method stores the 3D-link in a database. The 3D-link enables the 3D context to be shared between or among users via sharing of the 3D-link from the database. The 3D-link plays an important role in helping design engineers collaborate by eliminating the need to create pictures or copies of 3D models that may become outdated. | 2021-10-07 |
20210312100 | QR CODED CONSTRUCTION DRAWINGS - A system, method and program product for generating and processing 2D barcodes on construction drawings. One embodiment of the method includes generating a plurality of 2D barcodes related to a construction project. Selecting a canvas that includes a plurality of regions to populate with the 2D barcodes, and populating the canvas with each barcode in a respective region. Outputting a print-ready image of the canvas containing the 2D barcodes. Executing a remote data processing system in response to a user scanning one of the 2D barcodes on the canvas with a mobile device to load a web application to facilitate a construction project task. | 2021-10-07 |
20210312101 | METHOD FOR DETERMINING A WIND TURBINE LAYOUT - The invention provides a method for determining a wind turbine layout in a wind power plant comprising a plurality of wind turbines. The method comprises the steps of generating a plurality of random layout candidates fulfilling a set of basic requirements, and then performing a pre screening process on each of the plurality of random layout candidates. Based on the pre-screening process, a subset of layout candidates is selected and detailed optimization is performed on the layout candidates of the selected subset of layout candidates. Based on the detailed optimization, an optimized layout for the wind power plant is selected among the optimized layout candidates of the subset of layout candidates. | 2021-10-07 |
20210312102 | Method for Simulating Combustion in Digital Imagery - A combustion simulation system is provided. The combustion simulation system can be performed using a computing device operated by a computer user or artist. The computer-implemented method of simulating a combustion process includes receiving a set of data representing a fluid flow. The fluid flow can include combustion precursors. The method includes simulating a chemical reaction representing simulated combustion of these precursors generating combustion byproducts. The method can include determining a change in temperature of the combustion byproducts due to the chemical reaction, determining a change in molar mass of the combustion byproducts due to the chemical reaction, determining a divergence of the combustion byproducts based on a combination of the change in the temperature and the change in molar mass, and generating data structures of the simulated combustion based on values of the fluid flow. | 2021-10-07 |
20210312103 | Method for Simulating Combustion in Digital Imagery with Real or Artist-Specified Components - A combustion simulation system is provided. The combustion simulation system can be performed using a computing device operated by a computer user or artist. The computer-implemented method of simulating a combustion process includes receiving a set of data representing a fluid flow. The fluid flow can include combustion precursors comprising at least one arbitrary combustion precursor. The method includes simulating a chemical reaction representing simulated combustion involving the at least one arbitrary combustion precursor and generating combustion byproducts. The method can include determining a change in temperature of the combustion byproducts due to the chemical reaction, determining a change in molar mass of the combustion byproducts due to the chemical reaction, determining a divergence of the combustion byproducts based on a combination of the change in the temperature and the change in molar mass, and generating data structures of the simulated combustion based on values of the fluid flow. | 2021-10-07 |
20210312104 | Method for Simulating Combustion in Digital Imagery with Real or Artist-Specified Components - A combustion simulation system is provided. The combustion simulation system can be performed using a computing device operated by a computer user or artist. The system may include a computer-readable medium storing instructions, which when executed by at least one processor, cause the system to receive data representing a fluid flow. The data includes a plurality of combustion precursors, including at least one arbitrary combustion precursor that may not correspond to a physically realizable material. The system simulates a chemical combustion reaction involving the plurality of combustion precursors and generating combustion byproducts. The system determines a change in temperature and a molar mass of the combustion byproducts due to the chemical reaction, and determines a divergence of the combustion byproducts based on a combination of the change in the temperature and the change in molar mass. The system then generates one or more data structures of the simulated combustion based on at least a portion of the fluid flow. | 2021-10-07 |
20210312105 | CONSTRUCTION MANAGEMENT DOCUMENT CREATION DEVICE, CONSTRUCTION MANAGEMENT DOCUMENT CREATION METHOD, PIPELINE CONSTRUCTION DRAWING CREATION DEVICE, AND PIPELINE CONSTRUCTION DRAWING CREATION METHOD - A construction management document creation device includes: a first input processing unit configured to repeat a process of assigning a unique pipe number and a unique joint number in association with pipe attribute information, and thereby generate pipe connection information from which connection relationship between laying pipes is identifiable based on the pipe number and the joint number, and pipe laying information from which a type and a laying position of each laying pipe are identifiable based on the pipe attribute information; a second input processing unit configured to generate assembled condition management information based on assembling procedure confirmation information and assembled condition evaluation information input for each pipe assembling section identified by the joint number; and a document generation processing unit configured to generate a construction management document including a daily construction report based on the pipe connection information, the pipe laying information, and the assembled condition management information. | 2021-10-07 |
20210312106 | METHOD FOR SIMULATING VERTICALLY ORIENTED CURRENT IN A STRUCTURE - A computer-implemented method of simulating a vertically-oriented current distribution of current flowing through a plurality of layers of one or more three-dimensional conductors embedded in a shielded multi-layered dielectric includes the steps of dividing portions of the circuit into subsections, the portions containing z-directed current into rectangular prisms; independently modeling a current distribution within each subsection, and, specifically, within the rectangular prisms, independently modeling a basis function of linearly changing or uniform current along the z-axis; independently determining the fields resulting from such assumed basis functions; determining a voltage induced by such determined fields, corresponding to a transfer impedance or transfer admittance of the subsection; and calculating a current distribution in one or more conductors according to the transfer impedance or transfer admittance of each subsection and an assumed voltage across each subsection. | 2021-10-07 |
20210312107 | OPTIMIZATION OF CONFIGURABLE DISTRIBUTED COMPUTING SYSTEMS - The subject matter of this specification can be implemented in, among other things, a method that includes accessing a plurality of target tasks for a computing system, the computing system comprising a plurality of resources, wherein the plurality of resources comprises a first server and a second server, accessing a plurality of configurations of the computing system, wherein each of the plurality of configurations identifies one or more resources of the plurality of resources to perform the respective target task of the plurality of target tasks, and performing, for each of the plurality of configurations, a simulation to determine a plurality of performance metrics, wherein each of the plurality of performance metrics predicts performance of at least one of the plurality of resources executing the plurality of target tasks on the computing system. | 2021-10-07 |
20210312108 | OPTIMIZER, OPTIMIZATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - An optimization apparatus includes a processor. The processor configured to change a state of any one of a plurality of state variables included in an evaluation function, calculate a change amount of an energy represented by the evaluation function, and obtain a first total change amount by adding a second total change amount and the calculated change amount, repeat a process for speculatively selecting the state variable to be changed and obtaining the first total change amount, stochastically determine whether or not to adopt a state transition in which a predetermined number of the state variables are changed according to a correlation relationship between a threshold and the first total amount, calculate transited energy after performed the state transition, and specify the transited energy as a minimum energy when the transited energy is less than a previously specified minimum energy. | 2021-10-07 |
20210312109 | SIMULATING A CABLE DRIVEN SYSTEM REPRESENTATIVE OF A ROBOT - A cable driving a large system such as cable driven machines, cable cars or tendons in a human or robot is typically modeled as a large number of small segments that are connected via joints. The two main difficulties with this model are satisfying the inextensibility constraint and handling the typically large mass ratio between the segments and the objects they connect. This disclosure introduces an effective approach to solving these problems. The introduced approach simulates the effect of a cable using a new type of distance constraint called ‘cable joint’ that changes both its attachment points and its rest length dynamically. The introduced approach models a cable connecting a series of objects, e.g., components of a robot, as a sequence of cable joints, reducing the complexity of the simulation from the order of the number of segments in the cable to the number of connected objects. | 2021-10-07 |
20210312110 | SYSTEMS AND METHODS FOR AUTOMATICALLY REALIZING MODELS FOR CO-SIMULATION - Systems and methods automatically construct a realization of a model from an available set of alternative co-simulation components, where the realization meets one or more objectives, such as fidelity, execution speed, or memory usage, among others. The systems and methods may construct the realization model by setting up and solving a constrained optimization problem, which may select particular ones of the alternative co-simulation components to meet the objectives. The systems and methods may configure the realization, and execute the realized model through co-simulation. The systems and methods may employ and manage different execution engines and/or different solvers to run the realization of the model. | 2021-10-07 |
20210312111 | MULTISCALE MODELING WORKFLOW OF ADVANCED WATERFLOODING - Disclosed are methods, systems, and computer-readable medium to perform operations including performing, using a nanoscale model, a simulation of fluid-fluid and fluid-rock interactions in the subterranean formation. The operations also include upscaling first results of the simulation of fluid-fluid and fluid-rock interactions to a microscale level. The operations further include performing, using a microscale model and the upscaled first results, a simulation of fluid flow inside rocks of the subterranean formation. Additionally, the operations include upscaling second results of the simulation of fluid flow inside rocks to a macroscale level. Further, the operations include performing, using a core-scale model and the upscaled second results, a simulation of fluid flow across the subterranean formation. | 2021-10-07 |
20210312112 | METHOD FOR SIMULATING A FLOW IN WHICH A STRUCTURE IS SUBMERGED - A method for simulating a flow in which a structure is submerged, the method being implemented by computer, and the behavior of the structure in the flow being modeled by radial and rotational sources generating a velocity field representing the flow around the structure. | 2021-10-07 |
20210312113 | METHOD FOR FINDING EQUIVALENT CLASSES OF HARD DEFECTS IN STACKED MOSFET ARRAYS - In modern VLSI technology, often, stacked arrays of smaller sized MOSFETs are used to achieve the desired width and length of a design MOSFET. In analog defect simulation, each physical transistor can contribute to the circuit's defect universe and this can directly lead to tremendous increase in defect simulation time. Here we propose a method of finding equivalent defects in the context of stacked MOSFET arrays that can lead to significant reduction in defect simulation effort and yet provide accurate defect coverage results. | 2021-10-07 |
20210312114 | LOGIC DRIVE BASED ON STANDARD COMMODITY FPGA IC CHIPS - A chip package used as a logic drive, includes: multiple semiconductor chips, a polymer layer horizontally between the semiconductor chips; multiple metal layers over the semiconductor chips and polymer layer, wherein the metal layers are connected to the semiconductor chips and extend across edges of the semiconductor chips, wherein one of the metal layers has a thickness between 0.5 and 5 micrometers and a trace width between 0.5 and 5 micrometers; multiple dielectric layers each between neighboring two of the metal layers and over the semiconductor chips and polymer layer, wherein the dielectric layers extend across the edges of the semiconductor chips, wherein one of the dielectric layers has a thickness between 0.5 and 5 micrometers; and multiple metal bumps on a top one of the metal layers, wherein one of the semiconductor chips is a FPGA IC chip, and another one of the semiconductor chips is a NVMIC chip. | 2021-10-07 |
20210312115 | SYSTEM FOR FACILITATING SECURE COMMUNICATION IN SYSTEM-ON-CHIPS - A system to facilitate communication of a critical signal between functional circuitries of a system-on-chip utilizes a dynamic pattern to securely communicate the critical signal. The system includes selection and comparison circuits. The selection circuit is configured to select and output a set of dynamic pattern bits or a set of fixed reference bits, based on a logic state of the critical signal that is received from one functional circuitry. The comparison circuit is configured to output an output signal based on the set of dynamic pattern bits, and a set of intermediate bits that is derived from the set of dynamic pattern bits or the set of fixed reference bits. The output signal is provided to the other functional circuitry when a logic state of the output signal matches the logic state of the critical signal, thereby securely communicating the critical signal to the other functional circuitry. | 2021-10-07 |
20210312116 | INTEGRATED CIRCUIT INCLUDING LOGIC CIRCUITRY - An integrated circuit includes at least one first area including logic circuitry. The logic circuitry includes library blocks selected from a logic circuit library. A first one of the library blocks is provided with at least two symmetry mirror edges perpendicular to a height of the library blocks. Two adjacent ones of the library blocks are joined at a common symmetry mirror edge. | 2021-10-07 |
20210312117 | SYSTEMS AND METHODS FOR MANAGING DIGITAL DESIGN FORMATS ACROSS A PLURALITY OF ONLINE SERVICES - Systems and methods for managing formats for a digital design are disclosed. According to certain aspects, an electronic device may support a design application that may enable a user to create and edit a digital design across multiple formats associated with multiple online services. The design applications enables the effective and efficient editing of the formats such that the digital design maintains a similar look and feel for each format. In embodiments, the design application may interface with the multiple online services to access formatting parameters and upload the respective formats for the digital design. | 2021-10-07 |
20210312118 | SYSTEM AND METHOD FOR SERVING INTERACTIVE ADVERTISING CONTENT WITH RESPONSIVE ANIMATIONS - One variation of a method for serving interactive advertisement content includes, at a visual element rendered within a window of a computing device: loading an interactive advertisement, including a digital advertisement and a mask overlaid the digital advertisement, into the visual element, the mask including a base layer and an aperture defining a second opacity less than a first opacity of the base layer; in response to a scroll event that moves the visual element a first position within the window, rendering the interactive advertisement within the visual element; and, in response to a scroll event that moves the visual element to a second position within the window, transforming the mask according to a sequence of transformations at a rate proportional to a scroll rate of the scroll event, the sequence of transformations corresponding to a sequence of vertical positions of the visual element within the window. | 2021-10-07 |
20210312119 | SYSTEM AND METHOD FOR CONVERGENT DOCUMENT COLLABORATION - In various implementations, a computing device: displays the document outline on the user interface; maintains, in a non-transitory computer-readable medium, a causal graph data structure representing the document outline, wherein the causal graph data structure includes a plurality of structure nodes, each structure node representing a level of the document outline; receives, via the user interface, an insertion of a new level to the document outline; in response to the insertion, defines a structure node that represents the inserted level; inserts a transition node in the causal graph data structure, wherein the transition node represents a relationship between the structure node and at least one other node of the causal graph data structure; inserts the structure node into the causal graph data structure as a child of the transition node; and updating the user interface to display the inserted level. | 2021-10-07 |
20210312120 | AUTOMATED GENERATION OF A TEMPLATE FOR A SHOPPABLE ELECTRONIC MESSAGE - A method for generating a template for a shoppable electronic message has been described. One example method includes receiving at a processor a static template that references item information; with the processor, identifying a first portion of code included in the static template that is associated with causing the item information to be displayed when the first portion of code is interpreted by a client application, and with the processor, generating a dynamic template by adding a second portion of code to the static template, wherein the second portion of code, when interpreted by the client application, enables an interaction functionality of the shoppable electronic message that is associated with the item information and includes an ability to receive a user input. | 2021-10-07 |
20210312121 | ANNOTATION TOOL GENERATION METHOD, ANNOTATION METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM - An annotation tool generation method, an annotation method, an electronic device and a storage medium, related to the technical field of artificial intelligence such as automatic driving, intelligent transportation, computer vision, deep learning and the like, are provided. The method includes: acquiring a first function module generated based on a first language, wherein the first function module is configured for acquiring a file to be annotated; acquiring a second function module generated based on a second language; converting the second function module into a third function module in a webpage-oriented binary format, wherein the third function module is configured for presenting the file to be annotated on an annotation page and displaying an annotation result corresponding to the file to be annotated on the annotation page; and generating an annotation tool based on the first function module and the third function module. | 2021-10-07 |
20210312122 | METHODS AND SYSTEMS FOR GENERATING DOCUMENTS WITH A TARGETED STYLE - Embodiments for generating text with a target style are provided. A target corpus is analyzed to determine a style representation associated with the target corpus. A source text is analyzed to determine a meaning representation associated with the source text. A target text is generated utilizing the target style representation associated with the target corpus and the meaning representation associated with the source text. | 2021-10-07 |
20210312123 | Systems and Methods For Cloud-Based Productivity Tools - A computer-implemented, cloud-based productivity tool incorporates a user interface configured to: (a) prompt the user to input a set of unstructured text strings; (b) allow the user to categorize the set of unstructured text strings in accordance with a set of categories provided by the user; (c) sequence the categorized text strings; (d) summarize the categorized text strings; and (e) produce an output based on the foregoing. In this way—by using a form of “reverse mind-mapping”—a user can quickly enter his or her thoughts in a free-form way and then subsequently organize that information in accordance with emergent categories that become apparent to the user through the process provided by the tool. A social aspect is provided to allow shared thinking between subscribers through text communication. In addition, a journaling module is provided for extracting insights from writing that accumulates over time. | 2021-10-07 |
20210312124 | METHOD AND SYSTEM FOR DETERMINING SENTIMENT OF NATURAL LANGUAGE TEXT CONTENT - A system and method for determining sentiment of natural language text content in a domain independent manner is provided. The method comprises providing an adjective-polarity database having stored therein a list of adjectives and corresponding polarity values. The method further comprises receiving natural language text content related to a first domain with information about corresponding sentiment. The method further comprises identifying nouns and adjectives in the received tagged natural language text content. The method further comprises associating the polarity value to each of the adjectives identified in the received tagged natural language text content. The method further comprises masking the identified nouns and adjectives in the received tagged natural language text content with part-of-speech tags. The method further comprises utilizing the masked natural language text content for training of a model for determining a sentiment score for natural language text content related to a second domain. | 2021-10-07 |
20210312125 | METHOD, DEVICE, AND STORAGE MEDIUM FOR PARSING DOCUMENT - The disclosure provides a method and an apparatus for parsing a document, a device and a storage medium, and relates to a field of document parsing. The implementing solution includes: receiving a request for parsing the document; downloading the document based on the request; converting the document into an extensible markup language (XML) file; parsing the XML file to extract document content from the XML file; and storing the document content in a JavaScript Object Notation (JSON) format into a database. With the method for parsing the document according to embodiments of the disclosure, an efficiency of parsing the document may be improved. | 2021-10-07 |
20210312126 | GENERATING DIVERSE SMART REPLIES USING SYNONYM HIERARCHY - Techniques for generating diverse smart replies using a synonym hierarchy are disclosed herein. A computer system may detect that a first set of one or more messages having first content has been transmitted from a first computing device of a first user to a second computing device of a second user, determine a plurality of candidate replies based on the first content of the first set of one or more messages, and then select a plurality of smart replies from the plurality of candidate replies using a hierarchical graph data structure and at least one diversity rule. The selecting of the plurality of smart replies comprises omitting at least one of the plurality of candidate replies from selection based on the at least one diversity rule, which limits a number of the plurality of smart replies that have a common parent node. | 2021-10-07 |
20210312127 | INTELLIGENT AUGMENTATION OF WORD REPRESENTATION VIA CHARACTER SHAPE EMBEDDINGS IN A NEURAL NETWORK - Embodiments are provided for intelligent augmentation of word representations in a computing system by a processor. One or more character shape embeddings may be created in an artificial neural network (ANN) by augmenting one or more word representations based on a set of natural language processing (NLP) data, a set of word embedding vectors, and one or more clustering operations. A shape, a category, and a contextual identify of the one or more word representations may be analyzed used in creating the one or more character shape embeddings. | 2021-10-07 |
20210312128 | EXTRACTING CLINICAL FOLLOW-UPS FROM DISCHARGE SUMMARIES - Medical records may be analyzed to identify important items in the text of the medical record. Actionable content may be identified and may be emphasized or extracted from the medical record. Actionable content may be categorized into one or more categories. Identification may include processing using trained models that use contextual information and position information to determine sentence labels. | 2021-10-07 |
20210312129 | GENERATING SUMMARY CONTENT TUNED TO A TARGET CHARACTERISTIC USING A WORD GENERATION MODEL - Certain embodiments involve tuning summaries of input text to a target characteristic using a word generation model. For example, a method for generating a tuned summary using a word generation model includes generating a learned subspace representation of input text and a target characteristic token associated with the input text by applying an encoder to the input text and the target characteristic token. The method also includes generating, by a decoder, each word of a tuned summary of the input text from the learned subspace representation and from a feedback about preceding words of the tuned summary. The tuned summary is tuned to target characteristics represented by the target characteristic token. | 2021-10-07 |
20210312130 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According an embodiment, an information processing device includes a memory and one or more processors coupled to the memory. The one or more processors are configured to: cluster key phrases extracted from a document group to generate clusters each including items; extract a sub-document group corresponding to a specified key phrase from the document group; calculate a score for each of the clusters, the score indicating usefulness of information displayed in a graph image that indicates an amount of information for each of the items in the sub-document group; select clusters to be displayed whose scores are from a highest ranking to a predetermined ranking, among the clusters; and generate the graph image of each of the clusters to be displayed. | 2021-10-07 |
20210312131 | TECHNICAL DOCUMENT ISSUES SCANNER - A technical document scanner disclosed herein determines and categorizes various common issues among a large number of documents. An implementation of the technical document scanner is implemented using various computer process instructions including scanning a technical document to extract content, applying named entity recognition on the extracted content from the technical document to extract named entities, applying relation extraction on the named entities to extract relations between the named entities, and analyzing the relations between the entities to compose lists of high relevance entities for issue checking. | 2021-10-07 |
20210312132 | CODING INFORMATION EXTRACTOR - A coding information extractor disclosed herein uses machine learning approach to extract coding information from documents. An implementation of the coding information extractor is implemented using various computer process instructions including scanning a document to generate a plurality of tokens, determining one or more features of the plurality of tokens using term frequency (TF), inverse document frequency (IDF), and code type similarity features, and determining field type, field name, and field value of the one or more of the tokens using named entity recognition (NER). | 2021-10-07 |
20210312133 | WORD VECTOR-BASED EVENT-DRIVEN SERVICE MATCHING METHOD - Disclosed in the invention is a word vector-based event-driven service matching method, including: implementing a mixed word vector training algorithm and an event-driven service matching model. In the mixed word vector training algorithm, in consideration of an influence of a word frequency on word vector training, according to an adjacency relationship between words in a corpus and a semantic relationship between words in a dictionary, high-frequency word processing, low-frequency word processing and joint processing, are used for training to obtain word vectors. The event-driven service matching model defines two event-related services: an event recognition service and an event handling service, a matching degree of the two services is calculated by the word vectors, and when the matching degree is higher than a given threshold, the matching is successful. The invention is able to improve a quality of the word vectors and further improve the accuracy and efficiency of service matching. | 2021-10-07 |
20210312134 | HIERARCHICAL RELATIONSHIP EXTRACTION - Methods, apparatus, system and computer-implemented method are provided for embedding a portion of text describing one or more entities of interest and a relationship. The portion of text describes a relationship for the one or more entity(ies) of interest, where the portion of text includes multiple separable entities describing the relationship and the entity(ies). The multiple separable entities including the one or more entity(ies) of interest and one or more relationship entity(ies). A set of embeddings for each of the separable entities is generated, where the set of embeddings for a separable entity includes an embedding for the separable entity and an embedding for at least one entity associated with the separable entity. One or more composite embeddings may be formed based on at least one embedding from each of the sets of embeddings. The composite embedding(s) may be sent for input to a machine learning model or classifier. | 2021-10-07 |
20210312135 | INFORMATION PROCESSING METHOD AND APPARATUS, AND STROAGE MEDIUM - Embodiments of the disclosure provide an information processing method, an information processing apparatus, and a storage medium. The method includes: obtaining source data; encoding sub-data in the source data based on a target word feature vector to obtain hidden feature vectors corresponding to the sub-data, the target word feature vector representing a sentiment feature standard; obtaining a word feature vector corresponding to the source data based on the hidden feature vectors corresponding to the sub-data; and inputting the word feature vector into a preset sentiment classification network to obtain a result of sentiment polarity prediction of the source data. According to the embodiments of the disclosure, the accuracy of sentiment polarity prediction may be improved. | 2021-10-07 |
20210312136 | Machine Learning System for Optimizing Projects - A system for optimizing project and/or task completion through the use of machine learning is disclosed. The system receives attributes for a project and participants to participate in the project. The attributes are provided to a natural language processing engine to determine content related to the attributes. Once the content is determined, the system receives a selection of a portion of the content and attributes to be searched via a search engine of the system. The search engine may then determine potential combinations of participants, such as individuals, devices, programs, and/or robots, which are suited to participate in the project. A selected combination of participants may perform the project. Feedback relating to the project may be utilized to adjust search algorithm variable weights and parameters utilized by the search engine to optimize the relevance of potential combinations of participants generated in response to a future search for a future project. | 2021-10-07 |
20210312137 | ENCODING METHOD, APPARATUS, AND STORAGE MEDIUM - Embodiments of this disclosure include an encoding method and apparatus. The encoding may include obtaining a target paragraph and a context sentence of the target paragraph, and inputting the target paragraph and the context sentence into a memory encoding model. The encoding may further include obtaining an original vector set and a memory vector set in the input layer and obtaining a first target sentence matrix of the original vector set in the memory layer according to the original vector set and the memory vector set. The encoding may further include obtaining a paragraph vector of the target paragraph in the output layer according to the first target sentence matrix and performing processing based on the paragraph vector. | 2021-10-07 |
20210312138 | SYSTEM AND METHOD FOR HANDLING OUT OF SCOPE OR OUT OF DOMAIN USER INQUIRIES - Disclosed is a system and method for processing out of scope or out of domain user inquiries with a first virtual assistant, which may include the steps of receiving a user request at a user device and converting the user request into a user inquiry, interpreting the user inquiry with an anomaly detection system to generate an interpretation of the user inquiry, forming a question from the interpretation using a textual composition module, accessing a dataset of text-based descriptions of a scope of the first virtual assistant using a textual composition module and a scope of an external source using a textual composition module, querying the dataset for an answer to the question, and when the answer is found in the description of the scope of an external source, transmitting the user inquiry to the external source for processing to generate a response to the user inquiry. | 2021-10-07 |
20210312139 | METHOD AND APPARATUS OF GENERATING SEMANTIC FEATURE, METHOD AND APPARATUS OF TRAINING MODEL, ELECTRONIC DEVICE, AND STORAGE MEDIUM - A method and apparatus of generating a semantic feature, a method and apparatus of training a model, an electronic device, and a storage medium are provided. The method of generating the semantic feature includes: segmenting a target document to obtain a segment sequence of the target document; generating a semantic feature of each document segment in the segment sequence of the target document by using a pre-trained bidirectional semantic encoding model; and acquiring the semantic feature of the target document based on the semantic feature of the each document segment in the segment sequence of the target document. The present disclosure further provides a method of training a bidirectional semantic encoding model. | 2021-10-07 |