42nd week of 2021 patent applcation highlights part 49 |
Patent application number | Title | Published |
20210326359 | COMPARE PROCESSING USING REPLICATION LOG-INJECTED COMPARE RECORDS IN A REPLICATION ENVIRONMENT - Compare processing using replication log-injected compare records includes receiving compare records from a source system having a source datastore in a replication relationship with a target datastore of a target system, the compare records corresponding to selected source objects of the source datastore, and the compare records being received in compare transaction(s) to be performed by the target system for determining whether data of the target datastore is consistent with the selected source objects, and commencing compare processing to perform the compare transaction(s), the compare processing including processing a compare record of the received compare records, which includes identifying a selected source object identified by the compare record, attempting to locate and read a corresponding target object of the target datastore, and further processing the compare record based on whether the corresponding target object is located and read by the attempting. | 2021-10-21 |
20210326360 | FEEDBACK LOOP CONTENT RECOMMENDATION - Media content may be recommended based on feedback weightings. Input data describing the presentation of a media content items in association with content management accounts may be represented as data points. Each data point may identify feedback data for a media content item previously recommended for presentation in association with a content management account. The feedback data may identify a viewer reaction to the recommended media content item. A weighting factor based on the feedback data for the media content item presented in association with the content management account may be applied to produce a recommendation. | 2021-10-21 |
20210326361 | DYNAMIC CLUSTERING OF SPARSE DATA UTILIZING HASH PARTITIONS - The present disclosure describes systems, non-transitory computer-readable media, and methods for utilizing hash partitions to determine local densities and distances among users (or among other represented data points) for clustering sparse data into segments. For instance, the disclosed systems can generate hash signatures for users in a sparse dataset and can map users to hash partitions based on the hash signatures. The disclosed systems can further determine local densities and separation distances for particular users (or other represented data points) within the hash partitions. Upon determining local densities and separation distances for datapoints from the dataset, the disclosed systems can select a segment (or cluster of data points) grouped according to a hierarchy of a clustering algorithm, such as a density-peaks-clustering algorithm. | 2021-10-21 |
20210326362 | INCREMENTAL CLUSTERING - Incremental clustering of similar or related messages that otherwise requires limited use of memory for the purpose of increasing scalability. Incremental clustering includes receiving, by a machine learning (ML) engine, an incoming message from an application programming interface (API) server, and scanning, by the ML engine, a plurality of clusters for one or more messages similar to that of the incoming message. Incremental clustering also includes identifying, by a clustering engine, a cluster from the plurality of clusters. The identified cluster includes the one or more messages similar to that of the incoming message. Incremental clustering further includes assigning, by the clustering engine, the incoming message to the identified cluster. | 2021-10-21 |
20210326363 | SYSTEM AND METHOD OF MULTIPROTOCOL PUBLISHER AND SUBSCRIBER SERVICES - A system may receive, from first computer systems, data sets via a first different data encapsulations; obtain the data sets from the first different data encapsulations; produce second different data encapsulations that include the data sets; and provide the second different data encapsulations that include the data sets to second computer systems that subscribed to receive the data sets. The data sets may be included in one or more data streams. The system may store at least two of the data sets. For example, at least two of the data sets may be stored until they are requested by one or more computer systems. One of the data sets may be duplicated and provided to multiple computer systems. | 2021-10-21 |
20210326364 | DETECTION OF OUTLIERS IN TEXT RECORDS - Systems and methods are disclosed to implement an outlier detection system for text records. In embodiments, the detection system generates a fingerprint for each incoming record so that similar records map to similar fingerprints. Each record is assigned to a closest cluster in a set of clusters based computed distances between on the record's fingerprint and respective cluster fingerprints of the clusters. The cluster fingerprint is dynamically updated to maintain respective a representative fingerprint of its member records. When a new record is received that is not sufficiently close to any cluster, a new cluster is added to the set for the new record. In embodiments, the creation of the new cluster triggers an alert that the new record is a potential outlier. Advantageously, the disclosed detection system can be used to detect outliers in records in near real time, without the need to pre-specify outlier characteristics. | 2021-10-21 |
20210326365 | CONFIGURATION RUNTIME ON HOST PLATFORM - Provided is a system and method in which configuration content from central system is repackaged and distributed to applications on a host platform. In one example, the method may include receiving, via a host platform, configuration content from a central system, the configuration content comprising one or more configuration objects of a tenant, identifying an application of the tenant on the host platform which uses the one or more configuration objects based on a configuration object to application mapping, and distributing the one or more configuration objects to the identified application of the tenant on the host platform. | 2021-10-21 |
20210326366 | GENERATION OF LINEAGE DATA SUBSET BASED UPON BUSINESS ROLE - One embodiment provides a method, including: generating a plurality of ontologies wherein each ontology is generated by: monitoring interactions of a user with lineage information, wherein the monitoring comprises monitoring (i) filter interactions and (ii) access interactions; aggregating the monitored interactions of the user with monitored interactions of other users having a given business role; and generating an ontology for the given business role, wherein the subset comprises (i) event types, (ii) event constraints, (iii) event metadata, and (iv) event context; and upon a user having one of the plurality of business roles accessing lineage information on the data platform, providing a subset of the lineage information. | 2021-10-21 |
20210326367 | SYSTEMS AND METHODS FOR FACILITATING SEARCHING, LABELING, AND/OR FILTERING OF DIGITAL MEDIA ITEMS - In certain embodiments, media item search and machine learning system training may be facilitated. In some embodiments, a first set of media items may be obtained (based on performance of a query) and presented on a user interface. A user selection of a media item of the first set may be obtained, and the query may be updated based on the user-selected media item. A second set of media items may be obtained based on performance of the updated query, and media items of the second set may be assigned to a group based on their similarities with one another. A predicted name for the group may be determined via a machine learning system and presented on the user interface. A user-indicated update to the predicted name for the group may be obtained and provided to the machine learning system to train the machine learning system. | 2021-10-21 |
20210326368 | WORKFLOW-BASED DYNAMIC DATA MODEL AND APPLICATION GENERATION - In some examples, workflow-based dynamic data model and application generation may include ascertaining, for an application that is to be generated, a plurality of fields that are declared. Based on the plurality of declared fields, a data model may be generated. The data model may include a plurality of application programming interface (API) keys associated with the plurality of declared fields. Based on the data model, a mapping file may be generated to map a plurality of APIs that are to be invoked relative to the API keys. Based on the data model and the mapping file, the application may be generated. | 2021-10-21 |
20210326369 | DOCUMENT ENRICHMENT WITH CONVERSATION TEXTS, FOR ENHANCED INFORMATION RETRIEVAL - A method including: Obtaining multiple conversation texts, one text per conversation, wherein each of the multiple conversation texts comprises: multiple messages authored by multiple parties, and a reference to an electronic document that provides resolution of a problem that is common to all the conversations. Calculating an importance score for each of the multiple messages of all the conversation texts. Clustering the multiple messages of all the conversation texts into multiple bins. Calculating an aggregated importance score for each of the multiple bins, based on the importance scores of the messages contained in the respective bin. Enriching (a) the electronic document, or (b) a record of the electronic document in an index of electronic documents, with at least some of the multiple bins and their aggregated importance scores, wherein the at least some of the multiple bins are added as fields to the electronic document or to the record. | 2021-10-21 |
20210326370 | METHODS FOR IDENTIFYING PRODUCT VARIANTS - A computer-implemented method includes extracting, by one or more processors of one or more computing devices, a product family name from each of a plurality of unstructured product titles associated with a plurality of products. The method further includes determining, by the one or more processors, a degree of similarity between model numbers of the plurality of products. The method further includes determining, by the one or more processors, that at least two of the plurality of products are variants of one another by determining that the at least two of the plurality of products have a same extracted product family name and determining that the degree of similarity between the model numbers of the plurality of products is above a predetermined threshold. | 2021-10-21 |
20210326371 | MODEL-BASED SEMANTIC TEXT SEARCHING - Techniques and systems are described for performing semantic text searches. A semantic text-searching solution uses a machine learning system (such as a deep learning system) to determine associations between the semantic meanings of words. These associations are not limited by the spelling, syntax, grammar, or even definition of words. Instead, the associations can be based on the context in which characters, words, and/or phrases are used in relation to one another. In response to detecting a request to locate text within an electronic document associated with a keyword, the semantic text-searching solution can return strings within the document that have matching and/or related semantic meanings or contexts, in addition to exact matches (e.g., string matches) within the document. The semantic text-searching solution can then output an indication of the matching strings. | 2021-10-21 |
20210326372 | HUMAN CENTERED COMPUTING BASED DIGITAL PERSONA GENERATION - In some examples, human centered computing based digital persona generation may include generating, for a digital persona that is to be generated for a target person, synthetic video files and synthetic audio files that are combined to generate synthetic media files. The digital persona may be generated based on a synthetic media file. An inquiry may be received from a user of the generated digital persona. Another synthetic media file may be used by the digital persona to respond to the inquiry. A real-time emotion of the user may be analyzed based on a text sentiment associated with the inquiry, and a voice sentiment and a facial expression associated with the user. Based on the real-time emotion of the user, a further synthetic media file may be utilized by the digital persona to continue or modify a conversation between the generated digital persona and the user. | 2021-10-21 |
20210326373 | SYSTEMS AND METHODS FOR DISPLAYING MEDIA FILES - Systems and methods for displaying media files on a device are provided. The device provides a first mode that displays a subset of media files, determined by a user query, from a plurality of media files. Once activated, the first mode persists on the device prior to becoming inactive. A second mode of the device displays the plurality of media files. The second mode is active when the first mode is inactive. An instruction is received from a user. When the instruction specifies the first mode by inclusion of a user query, a corresponding subset of files is obtained from a remote system. The subset of files is sequentially displayed until the period of time has elapsed according to the first mode. When the instruction does not specify a query, the plurality of files is polled for from a remote device and sequentially displayed according to the second mode. | 2021-10-21 |
20210326374 | METHOD AND SYSTEM FOR SHARING AN ITEM OF MEDIA CONTENT - A system and method for sharing an item of media content is described. An exemplary method includes associating a first location with the item of media content at a first mobile device and sending a request to view the item of media content to a second mobile device at a second location. The method includes showing a recipient of the item of media content a simulated journey from the recipient's location to a location associated with the item of media content. The simulated journey includes zooming out from the recipient's location shown on a map, following a path between the recipient's location and the location associated with the item of media content, and zooming into the location associated with the item of media content. | 2021-10-21 |
20210326375 | METHOD, DEVICE, AND COMPUTER PROGRAM FOR PROVIDING IMAGE SEARCH INFORMATION - The present invention relates to a method, device and computer program for providing image search information. The method for an electronic device to provide image search information according to the present invention comprises: a step of generating a query by using an image if a predetermined query generation event occurs while playing the image; a step of transmitting the query to a server; and a step of receiving a search result corresponding to the query from the server and displaying same on a screen, wherein the search result is a search result of at least one object included in the image. A purpose of the invention is to provide a method, device and program for providing image search information, allowing the search of a product similar to a product exposed in an image, without an additional input of a search word. | 2021-10-21 |
20210326376 | NAVIGATING THROUGH A SET OF IMAGES - Information relating to a subset of images within a set of images is received. The information includes metadata of each image. The subset of images are selected from the set of images based upon each image in the subset of images being acquired within a bounding area surrounding a geographical position of a current image. Weight information is received. The weight information controls weights to be given to a plurality of different measures of similarities. A plurality of combined measures of similarity for pairs of images in the subset of images are calculated. | 2021-10-21 |
20210326377 | MULTI-STAGE IMAGE QUERYING - In some examples, a computing device refines feature information of query text. The device repeatedly determines attention information based at least in part on feature information of the image and the feature information of the query text, and modifies the feature information of the query text based at least in part on the attention information. The device selects at least one of a predetermined plurality of outputs based at least in part on the refined feature information of the query text. In some examples, the device operates a convolutional computational model to determine feature information of the image. The device network computational models (NCMs) to determine feature information of the query and to determine attention information based at least in part on the feature information of the image and the feature information of the query. Examples include a microphone to detect audio corresponding to the query text. | 2021-10-21 |
20210326378 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - The present disclosure relates to an information processing apparatus and an information processing method that enable easy reproduction of audio data of a predetermined kind, of audio data of a plurality of kinds. A file generation device generates an audio file in which audio streams of a plurality of groups is divided into tracks for each one or more of the groups and arranged, and information related to the plurality of groups is arranged. The present disclosure can be applied to an information processing system configured from the file generation device that generates a file, a web server that records the file generated by the file generation device, and a moving image reproduction terminal that reproduces the file, for example. | 2021-10-21 |
20210326379 | METHOD AND DEVICE FOR DETECTING DUPLICATE CONTENT - Provided is a method for detecting duplicate audio content in an electronic device. The method includes receiving, by the electronic device, a plurality of audio content, decoding, by the electronic device, each of the audio content to extract a plurality of byte streams of each of the audio content and audio feature information, generating, by the electronic device, a unique signature for each of the audio content based on the plurality of byte streams of each of the audio content, and storing, by the electronic device, the unique signature of each of the audio content in the electronic device to identify duplicate audio content. | 2021-10-21 |
20210326380 | APPARATUS, SERVER, AND METHOD FOR PROVIDING CONVERSATION TOPIC - A conversation topic providing method includes: converting voice data, of a conversation of a user who is on a phone, into text; selecting a keyword, indicating an intention of the user, from the text; obtaining information of interest with respect to the keyword; and determining topics relating to the keyword based on user information. | 2021-10-21 |
20210326381 | SYSTEMS AND METHODS FOR EFFICIENTLY SENDING VIDEO METADATA - A video management system may send time-stamped metadata corresponding to a video stream across a communication path having a limited bandwidth. Time-stamped metadata for a first reference video frame which identifies objects in the reference frame may be generated, and sent across the communication path. Time-stamped metadata for each of a plurality of first delta video frames following the first reference video frame may be generated, the time-stamped metadata for each of the plurality of first delta video frames may identify changes in detected objects relative to the objects identified in the time-stamped metadata for the first reference video frame. The time-stamped metadata for each of the plurality of first delta video frames may be sent across the communication path. | 2021-10-21 |
20210326382 | PLAY CONTROL OF CONTENT ON A DISPLAY DEVICE - A system for presenting and controlling content on a display device includes a network, a server system coupled to the network and comprising one or more servers, a display device coupled to the network and having a display, and a personal computing device operable to transmit a first message according to a specified format over the network to the server system. The server system stores an association between the personal computing device and the display device. The first message identifies user-selected content and a media player to play the content. The server system is operable, in response to receiving the first message from the personal computing device, to provide to the display device a second message identifying the user-selected content and the media player to play the content. In response to receiving the second message, the display device is operable to obtain a first media player needed to play the content, to load the media player and to present the content on the display. | 2021-10-21 |
20210326383 | SEARCH METHOD AND DEVICE, AND STORAGE MEDIUM - A search method, a search device, a storage medium and a computer program. The search method includes: determining a first similarity between text and at least one video, the text being used for representing a search condition; determining a first character interaction graph of the text and a second character interaction graph of the at least one video; determining a second similarity between the first character interaction graph and the second character interaction graph; and according to the first similarity and the second similarity, determining a video matching the search condition from the at least one video. | 2021-10-21 |
20210326384 | COLLATION DEVICE, COLLATION METHOD, AND COLLATION PROGRAM - An index generation unit ( | 2021-10-21 |
20210326385 | COMPUTERIZED DATA CLASSIFICATION BY STATISTICS AND NEIGHBORS. - A computer-based system and method for classifying examined data in a computerized database may include: calculating statistics of the examined data; comparing the statistics of the examined data with known statistics of a first data category to provide a statistics score; and determining a probability that the category of the examined data matches the first data category based on the statistics score. | 2021-10-21 |
20210326386 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING PROGRAM - A system configured to manage information in a plurality of directories in a distributed manner, wherein the system is configured to perform processing by a first computers that is one of a plurality of computers, the processing including: obtaining, in response to an occurrence of a communication targeting a directory managed by a respective communication destination computer, a weight corresponding to the directory targeted by the communication, wherein each directory managed by the plurality of computers is associated with a respective weight determined based on a tree structure of the plurality of directories; determining, based on the obtained weight, a priority of a connection used for the communication, wherein each connection established with the respective communication destination computer is associated with a respective priority; and selecting, based on the determined priority, a connection from among each connection established with the plurality of computers to terminate the selected connection. | 2021-10-21 |
20210326387 | STABLE GRAPH LAYOUT DETERMINATION - Some embodiments are directed towards a graph layout device for determining a layout of a graph. The graph being induced by a set of paths through a set of nodes. The nodes of the graph are comprised in the set of nodes. The set of paths is a subset of a global set of paths through the set of nodes. The layout comprises a position of each node of the graph. The graph layout device computes a global rank assignment, filters the global set of paths to obtain the set of paths, and computes the layout of the graph based on the global rank assignment. | 2021-10-21 |
20210326388 | ELECTRONIC DEVICE FOR PROVIDING INFOGRAPHICS, AND METHOD THEREOF - Disclosed is an electronic device. The electronic device may: receive first data including content from an external electronic device; identify whether a first infographic is included in the first data; transmit, to a server, a message requesting analysis of the first infographic when the first infographic is included in the first data; receive, from the server, second data including a second infographic corrected from the first infographic; and display content including the second infographic. | 2021-10-21 |
20210326389 | DYNAMIC GRAPH REPRESENTATION LEARNING VIA ATTENTION NETWORKS - A method includes extracting, by an analysis computer, a plurality of first datasets from a plurality of graph snapshots using a structural self-attention module. The analysis computer can then extract at least a second dataset from the plurality of first datasets using a temporal self-attention module across the plurality of graph snapshots. The analysis computer can then perform graph context prediction with at least the second dataset. | 2021-10-21 |
20210326390 | SYSTEMS AND METHODS FOR PROCESSING EMOJIS IN A SEARCH AND RECOMMENDATION ENVIRONMENT - Systems and methods are described herein to search for content recommendations, and in particular, for generating emoji-based metadata for content and processing an emoji-based query using the emoji-based metadata. A system may receive a query comprising a text portion and an emoji portion. A system may search a database to identify content items associated with the query based on the text portion and the emoji portion, wherein the searching based on the emoji portion is based at least in part on matching emojis associated with a content item. A system may retrieve, for each of the content items, an emoji match score based on the emoji portion and a textual match score based on the text portion. A system generates, for each of the content items, a respective aggregate score based on the respective emoji match score and textual match score. A system may generate for display representations of the content items ordered according to the respective aggregate scores. | 2021-10-21 |
20210326391 | Execution Engine for Compositional Entity Resolution for Assistant Systems - In one embodiment, a method includes receiving, from a client system of a user, a user input comprising a plurality of n-grams, parsing the user input to identify one or more overall intents, hidden intents, and slots associated with the one or more n-grams, wherein at least one of the hidden intents is non-resolvable for being associated with partial slot information corresponding to an n-gram that has not been resolved to a particular entity identifier, wherein the partial slot information is associated with two more entity identifiers of two or more entities, respectively, sending, to the client system, instructions for prompting the user to select one of the entities to be associated with the non-resolvable hidden intent, resolving the non-resolvable hidden intent based on the entity identifier of the entity selected by the user, and generating a response to the user input based on the resolved hidden intent. | 2021-10-21 |
20210326392 | ALGORITHMIC ATTRIBUTION - Introduced is a technique for assigning attribution values associated with a metric to dimensions in a set of data. An attribution model can be implemented to process data to assign attribution values to the dimensions in the data. The attribution model can be configured accordingly to game theoretic properties such as Shapley value. For example, each of the dimensions in the data may correspond to a different player in a cooperative game based on a specified value function. Using the specified value function, attribution values associated with a metric can be assigned to the dimensions in the data. The introduced technique can be implemented to assign attribution value associated with various types of metric to various types of dimensions. Further, the introduced technique is highly scalable and can be implemented to process data at query time without requiring any offline models to be run. | 2021-10-21 |
20210326393 | UNIFIED FRAMEWORK FOR MULTI-MODAL SIMILARITY SEARCH - Technology is disclosed herein for enhanced similarity search. In an implementation, a search environment includes one or more computing hardware, software, and/or firmware components in support of enhanced similarity search. The one or more components identify a modality for a similarity search with respect to a query object. The components generate an embedding for the query object based on the modality and based on connections between the query object and neighboring nodes in a graph. The embedding for the query object provides the basis for the search for similar objects | 2021-10-21 |
20210326394 | MACHINE FOR EXCEPTION HANDLING IN A PROCESSING NETWORK - An exception handling machine is configured to receive a first document from a source document processing system and provide a first revised document to a destination document processing system. The exception handling machine is configured to detect an exception flag in at least one data field of the first document and determine at least one exception handling rule for the first document based on at least one other data field in the first document and the exception flag, determine an exception code corresponding to the exception handling rule, insert the exception code into the first document to generate the first revised document, and provide the first revised document to the destination document processing system. The destination document processing system is programmed to respond to the exception code inserted in the revised first document by providing the first revised document to a client device connected to the destination document processing system. | 2021-10-21 |
20210326395 | EFFICIENT UNIQUES QUERYING - Efficient uniques querying is disclosed, including: receiving a search query for a number of unique audience members across a plurality of groups of audience members; obtaining a plurality of sets of representations corresponding to respective ones of the plurality of groups of audience members; selecting at least a subset from each of the plurality of sets of representations; merging the selected at least subsets of the plurality of sets of representations into a merged set of representations; determining the number of unique audience members across the plurality of groups of audience members based at least in part on the merged set of representations; and outputting the number of unique audience members across the plurality of groups of audience members. | 2021-10-21 |
20210326396 | SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT - Methods, systems, and computer-readable medium are disclosed for presenting web application content. For example, a computer-readable medium may include instructions executable by one or more processors to perform operations including: executing a parent application using a web browser, the parent application being a single page application configured to display a web page element in the web browser; identifying a child application requested by a user action; obtaining, from a server system, child application code of the identified child application, the child application code defining a micro-frontend in a first programming language; transpiling the child application code from the first programming language to a second programming language executable by the web browser, to obtain a transpiled child application code renderable by the web browser; and rendering the transpiled child application code so that the micro-frontend is displayed in the web browser. | 2021-10-21 |
20210326397 | Systems and Methods for Hosted Applications - In one embodiment, a computing device configured to execute a hosted application includes a processor and storage, where an operating system is installed on the computing device, an application platform application including a rendering engine process including a virtual machine and an integration process, at least one hosted application comprising a background page file, wherein the virtual machine is configured to parse instructions in the background page file to download at least one remotely hosted file for rendering a web page, build a document object model (DOM), and modify the DOM in accordance with a predetermined DOM modification rule to create a modified DOM based on the computing environment, and wherein the rendering engine process is configured to render a user interface page integrated into the computing environment of the operating system of the computing device based on the DOM generated by the execution of the background page. | 2021-10-21 |
20210326398 | SYSTEMS AND METHODS FOR PROCESSING EMOJIS IN A SEARCH AND RECOMMENDATION ENVIRONMENT - Systems and methods are described herein to search for content recommendations, and in particular, for generating emoji-based metadata for content and processing an emoji-based query using the emoji-based metadata. A system identifies a content item posted via one or more social platforms. A system may retrieve a quantity of instances of a reaction to the content item. The reaction may correspond to an emoji. A system may retrieve a comment posted in association with the content item via the one or more social platforms. A system may map the comment to the emoji based on a rule. The system may generate a factor associated with the content item and the emoji based on the quantity of instances of the reaction and based on the mapping of the comment to the emoji. The system stores the factor in a database in association with an identifier of the content item to facilitate processing of an emoji-based query. | 2021-10-21 |
20210326399 | System and Method for Search Engine Results Page Ranking with Artificial Neural Networks - A system and method for ranking search results. The system receives search results and uses an artificial neural network (ANN) to rank the results, wherein at least one of the inputs to the ANN is derived from a search query, and wherein the search query is processed as a visual image. An input to the ANN can include a user's profile and a search engine results page (SERF) produced by a search engine and presented to a user for review. An output of the ANN can include a re-ranking of an input SERF. The ANN can be trained and used in batch mode, periodically after saving results from multiple search sessions conducted by a plurality of users. | 2021-10-21 |
20210326400 | METHOD AND APPARATUS FOR PROCESSING WEB CONTENT, DEVICE, AND COMPUTER STORAGE MEDIUM - A method and an apparatus for processing web content, a device, and a computer storage medium are provided. A long-term feature group and a short-term feature group are determined from historical browsing data of a user according to generation time points of elements in the historical browsing data. A long-term encoding vector corresponding to the long-term feature group is determined according to similarities between elements in the long-term feature group, a user embedding vector corresponding to the short-term feature group is determined according to the long-term encoding vector and similarities between elements in the short-term feature group, and at least one web content is determined as a recommendation candidate and provided to the user. | 2021-10-21 |
20210326401 | SCALING WORKLOADS USING STAGING AND COMPUTATION PUSHDOWN - In some embodiments, a computer system generates offline a viewer embedding for a user of an online service based on a viewer portion of a scoring model using viewer features stored in a data source in association with a profile of the user, generates offline candidate embeddings for recommendation candidates by a key-value store based on a recommendation portion of the scoring model using features of the recommendation candidate stored in the key-value store, pushes the viewer embedding to the key-value store, generates online pairwise scores for recommendation candidates by the key-value store based on a pairwise portion of the scoring model using the viewer embedding and candidate embeddings, generates ranking scores for the recommendation candidates based on the scoring model using the embeddings and the pairwise scores, and causes recommendation candidates to be displayed on a device of the user based on the corresponding ranking scores. | 2021-10-21 |
20210326402 | Personalized Translation of Content Identifiers - In some implementations, a user device can perform personalized translation of content identifiers. For example, the user device can request a content identifier mapping file from a server device that defines how to translate a human readable content identifier into a content server content identifier. The server device can select a mapping file from among a collection of mapping files based on various criteria associated with the user device and send the selected mapping file to the user device. When the user device receives a human readable content identifier, the user device can compare the human readable content identifier to the mapping file to determine how to translate the human readable content identifier into the content server content identifier. Once the content server content identifier corresponding to the human readable content identifier is determined, the client device can use the content server content identifier to obtain corresponding content. | 2021-10-21 |
20210326403 | WEBSITE CREATION FROM MOBILE DEVICE DATA - Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive, from an app running on a mobile device determined to be operating in a business mode, an incoming data; display, on the mobile device, a request for, and a confirmation that the incoming data comprises a website content and its description; generate a metadata from the description defining at least one detail of the website content; define, within a data record storing the incoming data, the website content and the metadata defining one or more details of the website content; determine that a quantity of the website content is above a required threshold to generate the website; and generate the website comprising the website content. | 2021-10-21 |
20210326404 | FOURIER TRANSFORM DEVICE AND FOURIER TRANSFORM METHOD - Among K×M pieces of data (“K” is an integer greater than or equal to 3, and “M” is an integer greater than or equal to 2), ((k−1)M+1)th data (k=1, . . . , K) in order starting from the first data is head data in each of the K data strings, and the K data strings each contain M pieces of data each at every M pieces of data in order starting from each head data among the K×M pieces of data. The Fourier transform device includes: an adder for calculating each sum of K pieces of data that are m-th data (m=1, . . . , M) in the order starting from each of the head data in the respective M pieces of data contained in the K data strings; and a transformer for performing an M-point Fourier transform on the sums calculated by the adder or an M-point inverse Fourier transform on the sums. | 2021-10-21 |
20210326405 | METHOD AND APPARATUS FOR DISTRIBUTED AND COOPERATIVE COMPUTATION IN ARTIFICIAL NEURAL NETWORKS - An apparatus and method are described for distributed and cooperative computation in artificial neural networks. For example, one embodiment of an apparatus comprises: an input/output (I/O) interface; a plurality of processing units communicatively coupled to the I/O interface to receive data for input neurons and synaptic weights associated with each of the input neurons, each of the plurality of processing units to process at least a portion of the data for the input neurons and synaptic weights to generate partial results; and an interconnect communicatively coupling the plurality of processing units, each of the processing units to share the partial results with one or more other processing units over the interconnect, the other processing units using the partial results to generate additional partial results or final results. The processing units may share data including input neurons and weights over the shared input bus. | 2021-10-21 |
20210326406 | Data Padding Method and Data Padding System Thereof - A data padding method includes outputting a second data matrix according to a first data matrix and a padding data. A second number of columns or a second number of rows of the second data matrix is proportional to a first number of columns or a first number of rows of the first data matrix. | 2021-10-21 |
20210326407 | OPTIMIZATION PROBLEM SOLVING CALCULATION APPARATUS - A calculation apparatus according to an embodiment includes matrix multiplication circuitry, time evolution circuitry, management circuitry, and output circuitry. The matrix multiplication circuitry calculates N second intermediate variables at a first time point by matrix multiplication between N (N>=2) first intermediate variables at the first time point and a preset coefficient matrix in N rows and N columns. The time evolution circuitry calculates N first variables at a second time point and N first intermediate variables at the second time point, the second time point being a time point following one sampling period after the first time point. The management circuitry increments time point from a start time point for each sampling period and controls the above circuitry to perform a process for each time point. The output circuitry outputs N first variables at a preset end time point. | 2021-10-21 |
20210326408 | ECOLOGICAL FLOW DETERMINATION METHOD FOR CONSIDERING LIFTING AMOUNT - An ecological flow determination method for considering a lifting amount a belongs to a technical field of environmental engineering and includes the following steps: collecting, by a collecting device, data needed to calculate an ecological flow; determining, by a calculating device, an ecological base flow; selecting an upper limit and a lower limit of the ecological base flow so as to determine a range of the ecological base flow; verifying the lower limit of the ecological base flow; calculating water demands of landscape wetland, sediment discharge and dilution self purification of three service objects; comparing the water demands of the three service objects so as to determine the lifting amount, and finding out a minimum value and a maximum value to determine a lower limit and an upper limit of the lifting amount in the range; combining the ecological base flow and the lifting amount to determine the ecological flow. | 2021-10-21 |
20210326409 | PUBLICATION OF COLLABORATIVE FlLE TO LlBRARY - Disclosed are examples of systems, apparatus, methods and computer program products for sharing and publishing files. In one aspect, the database system can maintain a user database, a file database and a library. The database system can receive a first request initiated by a first user to share a first file with one or more second users and, responsive to the first request, enable a second set of one or more permissions for each of the second users. The database system also can receive a second request initiated by the first user to publish the first file to the library and, responsive to the second request, publish the first file to the library. The database system additionally can restrict access to the published file based on permissions associated with the library. | 2021-10-21 |
20210326410 | METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATION - A secure communication system is disclosed for communication between first and second party devices. An input interface is provided for receiving from an external host a unique host factor in addition to a user input interface for receiving from a user a unique PIN for a user and a selection input for selecting one of the plurality of stored entropy stores as a user selected entropy store A first private key generator is operable for generating a private key using a key generation algorithm requiring the selected entropy store, the host factor and the unique user PIN. The second party device includes a second storage device for storing a plurality of entropy stores. An input interface is provided for receiving the same unique host factor as received by the first party device. A communication interface facilitates communication with the first party device to receive from the first party device a user PIN and an indication of the user selected entropy store. A second private key generator is operable for generating a private key using the predetermined key generation algorithm with the received user PIN, the received host factor, and an extracted entropy store corresponding to user selected entropy store, wherein the private key generated by both the first and second private key generators are identical. The session is initiated to cause the generation of the identical private keys at both of the first and second private key generators and allow secure communication between the first and second devices. The private key at at least one of the first and second devices is deleted at the end of the session. | 2021-10-21 |
20210326411 | SYSTEMS AND METHODS FOR A GOVERNANCE ENGINE - A governance engine is provided that receives changes identified in dependencies in an enterprise and compares those changes to rule triggers, executing an output of a rule if a trigger is implicated. Related agents may examine the identified changes for new, potentially vulnerable or otherwise disallowed dependencies. | 2021-10-21 |
20210326412 | SECURE AUTOMATED ISSUE DETECTION - In one example, a server obtains a plurality of code modules configured to identify issues in one or more network devices of a target network. Based on the plurality of code modules, the server generates a fingerprinting process configured to produce a fingerprint that includes a plurality of key-value pairs. Each key of the plurality of key-value pairs is a unique key that corresponds to select data associated with raw data obtained from the one or more network devices. Each value of the plurality of key-value pairs represents information regarding the select data. Based further on the plurality of code modules, the server generates an analysis model that is uniquely compatible with the fingerprinting process. The analysis model is configured to identify the issues in the one or more network devices based on the key-value pairs. | 2021-10-21 |
20210326413 | COMPILER DEVICE WITH MASKING FUNCTION - Some embodiments are directed to a compiler device ( | 2021-10-21 |
20210326414 | Salting Text in Database Tables, Text Files, and Data Feeds - A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field, with the value of the Key Character identifying the position within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file. | 2021-10-21 |
20210326415 | ENHANCED CONTENT TRACKING SYSTEM AND METHOD - The invention, as shown by the system in FIG. | 2021-10-21 |
20210326416 | Security Enabled False Desktop Computing Environment - A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system. | 2021-10-21 |
20210326417 | Systems and Methods for Providing Multiple Functionalities Associated with a QR Code - In one embodiment, a method includes receiving a request from a client computing device to access an electronic GUI associated with a particular QR code scanned by the client computing device. The particular QR code is associated with at least a default GUI and a secure GUI corresponding to the particular QR code. The method includes determining whether a user associated with the requesting client computing device is authenticated to access the secure GUI corresponding to the particular QR code. When that user is authenticated to access the secure GUI, then the method includes selecting the secure GUI for presentation by the requesting client computing device. When the user associated with the requesting client computing device is not authenticated to access the secure GUI corresponding to the particular QR code, then the method includes selecting the default GUI for presentation by the requesting client computing device. | 2021-10-21 |
20210326418 | SECURE DEVICE SHARING - A computing device and method of controlling access to a computing device. An application to be used when the computing device is in a locked state is selected, wherein in the locked state, only use of the selected application is permitted. The computing device enters the locked state. Use of the selected application without unlocking the computing device is allowed. | 2021-10-21 |
20210326419 | AUDIBLY PROVIDING INFORMATION DURING TELEPHONE CALL - In one aspect, a first device may include at least one processor, a touch-enabled display accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to facilitate, at the first device, a telephone call with a second device. The instructions may also be executable to, during facilitation of the telephone call, present a graphical user interface (GUI) on the touch-enabled display. The GUI may include a selector that is selectable to command the first device to audibly provide, from the first device to the second device, information as part of the telephone call. The instructions may also be executable to receive user input selecting the selector and to, responsive to receipt of the user input selecting the selector, audibly provide the information to the second device as part of the telephone call. | 2021-10-21 |
20210326420 | IDENTITY USE SERVER - An identity use server receives, from each of a plurality of identity owner devices i) identification information and ii) identity attributes specifying conditions under which an identity use request corresponding to the identification information shall be determined. Each device is associated with a separate identity owner. The identity use server receives, from one of a plurality of requesting computer systems over the network, each requesting computer system associated with a separate requesting entity, an identity use request. The server determines whether to allow or deny, in whole or in part, the request based on the attributes. The server notifies the requesting computer system of the determination. | 2021-10-21 |
20210326421 | PASSIVE AND CONTINUOUS MULTI-SPEAKER VOICE BIOMETRICS - Embodiments described herein provide for a voice biometrics system execute machine-learning architectures capable of passive, active, continuous, or static operations, or a combination thereof. Systems passively and/or continuously, in some cases in addition to actively and/or statically, enrolling speakers as the speakers speak into or around an edge device (e.g., car, television, radio, phone). The system identifies users on the fly without requiring a new speaker to mirror prompted utterances for reconfiguring operations. The system manages speaker profiles as speakers provide utterances to the system. Machine-learning architectures implement a passive and continuous voice biometrics system, possibly without knowledge of speaker identities. The system creates identities in an unsupervised manner, sometimes passively enrolling and recognizing known or unknown speakers. The system offers personalization and security across a wide range of applications, including media content for over-the-top services and IoT devices (e.g., personal assistants, vehicles), and call centers. | 2021-10-21 |
20210326422 | Systems and Methods for Generating and using Anthropomorphic Signatures to Authenticate Users - The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold. | 2021-10-21 |
20210326423 | SYSTEM AND METHOD FOR ONLINE VERIFICATION OF THE IDENTITY OF A SUBJECT - It is disclosed an electronic system for online verification of the identity of a subject including a user electronic device, a network element and a non-volatile memory. The memory is configured to store data representative of a reference biometric profile of the subject. The user electronic device comprises a camera configured to acquire an image representative of a portion of the body of a subject, and comprises a processing unit configured to generate a sample biometric profile, as a function of at least one image acquired in real time representative of at least one portion of the body of the subject. The system uses a strong authentication based on the combination of two factors, wherein the first factor is a biometric recognition of the subject to be identified and the second factor is the use of an access code valid only once for a defined time interval. | 2021-10-21 |
20210326424 | DETERMINING A MATCHING LIST FOR BIOMETRIC MATCHING - It is provided a method for selectively granting access to a physical space secured by a barrier. The method is performed in a credential evaluator and comprises the steps of: determining a matching list containing a strict subset of credential identifiers of credentials within range of an antenna provided in a proximity of the barrier, wherein the matching list is based on how long each credential has been within range of the antenna; obtaining a set of biometric templates, consisting of biometric templates respectively associated with the credential identifiers of the matching list; obtaining biometric data of a person being closest to the barrier; and wherein a positive match between biometric data and one of the biometric templates is a necessary condition for granting access to the physical space. | 2021-10-21 |
20210326425 | Radar-Based Behaviometric User Authentication - A first behaviometric user profile for a first user is generated and stored, by detecting a position and velocity of the first user relative to the mobile device based on a received response from a radar transmission while the first user uses the mobile device, the received response over time indicating a position and velocity of the first user. Based on further received responses of additional radar transmissions an additional behavioral pattern of an unknown user is determined. The additional behavioral pattern is then compared to the first behaviometric user profile, and based on the comparison, a measure of similarity between the first behaviometric user profile and the additional behavioral pattern, measuring if the first user and the unknown user are a same user is heuristically determined. As a result of the comparison, operation or access to at least some data stored on the mobile device is prevented. | 2021-10-21 |
20210326426 | System and Method for Identity Management - A computer-implemented method includes: receiving a request for associating a first index of privileges and permissions with an identity token, the first index specifically encoding the privileges and permissions of a first subscriber in accessing transactional data of the requester, the request including the identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to determining that the identity token is valid and verifying that the requester is the person identified by the identity token, associating the first index of privileges and permissions of the first subscriber with the identity token; and providing the identity token associated with the first index of privileges and permissions of the first subscriber, the identity token enabling the first subscriber to access transactional data of the requester in accordance with the first index of privileges and permissions. | 2021-10-21 |
20210326427 | CONTENT AUTHENTICATION AND VALIDATION VIA MULTI-FACTOR DIGITAL TOKENS, SYSTEMS, AND METHODS - Authentication tokens, systems, and methods are described. An illustrative method is disclosed to include receiving an electronic file including a digital image, receiving biometric information that is associated with a person, modifying the electronic file with the biometric information such that one or more pixels in the digital image are replaced with the biometric information, and storing the modified electronic file as a digital authentication token to be used in connection with authorized publications of original digital work. | 2021-10-21 |
20210326428 | SYSTEMS AND METHODS FOR AUTHENTICATING USERS - Systems and methods for knowledge-based authentication are disclosed. The systems and methods can include an authentication system. The authentication system can generate authentication questions using object data received from an augmented reality system associated with a user. The authentication system can authenticate the user using the authentication questions. The augmented reality system may acquire image data, detect and validate objects in the image data, and provide object data for the objects to the authentication system. The augmented reality system may provide an indication to the user when an object is detected and may receive, in response, a user-acknowledgement of detection. | 2021-10-21 |
20210326429 | ACCESS CONTROL METHOD AND DEVICE, ELECTRONIC DEVICE AND STORAGE MEDIUM - Provided are an access control method and device, and a storage medium. The method includes that: a collected image to be recognized is recognized to obtain a recognition result, where the image to be recognized includes a present graphic code; in condition that the recognition result indicates that the present graphic code is a target graphic code, the present graphic code is parsed to obtain user information and generation time contained in the present graphic code; and an access control device is controlled to be opened according to the user information and generation time in the present graphic code. | 2021-10-21 |
20210326430 | SECURE DIGITAL ASSISTANT INTEGRATION IN WEB PAGES - Secure digital assistant integration with web pages is provided. The system receives an intent manifest data structure that maps actions of a digital assistant with link templates of an electronic resource developed by a third-party developer device. The system validates the electronic resource based on the intent manifest data structure. The system receives, from a data exchange component of an iframe of the electronic resource loaded by a client computing device, an identifier of the client computing device. The system receives a foreground state of the electronic resource from an onsite state sharing API. The system selects a data value for a parameter based on the foreground state and the intent manifest data structure. The system provides the data value. An authorization component generates an authorization prompt, receives input, and transmits the data value to an onsite intent execution API of the electronic resource to execute an action. | 2021-10-21 |
20210326431 | METHOD, APPARATUS AND DEVICE FOR SHARING PASSWORD BETWEEN BIOS AND OPERATING SYSTEM - A method, an apparatus and a device for sharing a password between a BIOS and an operating system are provided, which are applied to a boot mode based on UEFI. In the method, a password of the BIOS inputted by a logon user is received if it is detected in a process of power-on self-test that a password is set for the BIOS. The password of the BIOS is stored in a predetermined target memory and an EFI Configuration Table is created if the password is correct. A pointer in the EFI Configuration Table points to an address of the target memory. Memory contents are acquired based on the created EFI Configuration Table if a password is set for the operating system. The logon user is permitted to log on the operating system if the acquired memory contents are verified as correct. | 2021-10-21 |
20210326432 | USER SPECIFIC ERROR DETECTION FOR ACCEPTING AUTHENTICATION CREDENTIAL ERRORS - There are provided systems and methods for user specific error detection for accepting authentication credential errors. A service provider, such as an authentication server and/or transaction processor, may require credentials for a user to utilize a specific service, such as an account and account services. The user may establish an authentication credential, such as a password or other secret, that allows the user to use the account. The user may then attempt to utilize the credentials with the service provider but may perform a typo in entering the authentication credential. The service provider may reject an authentication of the user but may allow the user to reenter the authentication credential. If the user correctly enters the authentication credential at this stage, the service provider may perform analysis of the incorrect and correct authentication credential to determine whether to allow the incorrect authentication credential for future authentications. | 2021-10-21 |
20210326433 | Artificial Intelligence-Based Generation of Anthropomorphic Signatures and use Thereof - The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold. | 2021-10-21 |
20210326434 | VIRTUAL ENVIRONMENT SYSTEM FOR SECURE EXECUTION OF PROGRAM CODE USING CRYPTOGRAPHIC HASHES - A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment. | 2021-10-21 |
20210326435 | BEHAVIORAL THREAT DETECTION DEFINITION AND COMPILATION - Examples of the present disclosure describe systems and methods for behavioral threat detection definition. In an example, a behavior rule comprising a set of rule instructions is used to define one or more events indicative of a behavior. For example, a set of events from which one event must be matched may be defined or a set of events from which all events must be matched may be defined. In some examples, events are matched based on an event name or type, or may be matched based on one or more parameters. Exact and/or inexact matching may be used. The set of rule instructions ultimately specifies one or more halt instructions, thereby indicating that a determination as to the presence of the behavior has been made. Example determinations include, but are not limited to, a match determination, a non-match determination, or an indication that additional monitoring should be performed. | 2021-10-21 |
20210326436 | MALICIOUS BEHAVIOR DETECTION AND MITIGATION IN A DOCUMENT EXECUTION ENVIRONMENT - A document execution engine receives a training set of data representative of incidents of malicious activity within a document execution environment. The training set also includes data representative of remedial actions taken in response to the malicious behavior, and resulting measures of mitigation. The document execution engine trains a machine learned model based on the training set. The trained machine learned model, when applied to activity within the document execution environment, can identify activity that is indicative of malicious behavior. The trained machine learned model can then output recommendations for remedial actions to take in response to the identified malicious activity. The recommended remedial actions can be provided for display to a user of the document execution engine, via a client device of the user. | 2021-10-21 |
20210326437 | CONTEXT-BASED RESPONSE TO ATTACKS AGAINST AUTONOMOUS SYSTEMS - Systems, apparatuses, and methods to response to detected attacks in an autonomous system based on context of the autonomous system are described. In particular, the disclosure provides an intrusion detection system receiving contexts and contracts dictating particular response guide rails from a higher level components or stack on the autonomous system. The intrusion detection system is arranged to respond to attacks according to the contract without intervention by the higher level components or stack. | 2021-10-21 |
20210326438 | Machine Learning Systems And Methods For Reducing The False Positive Malware Detection Rate - In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs. | 2021-10-21 |
20210326439 | LARGE SCALE ZERO TRUST MALWARE DETECTION - A malware detection facility is described. In a first computer system, the facility receives from a second computer system ciphertext obtained by subjecting plaintext file contents to homomorphic encryption. In the first computer system, the facility performs a malware detection operation directly on the received ciphertext. | 2021-10-21 |
20210326440 | METHODS AND APPARATUS FOR DETECTION OF MALICIOUS DOCUMENTS USING MACHINE LEARNING - An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file. | 2021-10-21 |
20210326441 | DATA PROCESSING APPARATUS, SYSTEM, AND METHOD FOR PROVING OR CHECKING THE SECURITY OF A DATA PROCESSING APPARATUS - An object of the disclosure is to simplify security enhancements based on trusted computing. For this, a first data processing apparatus configured to operate in accordance with one or more platform configuration is provided. The first data processing apparatus includes an attestation processor, a network interface, and a data storage device for storing validation data. The attestation processor is configured to establish attestation data that is indicative of a current platform configuration. The validation data facilitates a validity check of integrity data, which includes the attestation data. The first data processing apparatus is configured to provide the integrity and validation data. | 2021-10-21 |
20210326442 | HOST ATTESTATION - A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment. | 2021-10-21 |
20210326443 | EXECUTING SOTWARE - An example method is disclosed, for example a method of executing a software module in a computing system, the method comprising executing, in a first processing device of the computing system, a first software module to verify a second software module and to cause a second processing device of the computing system to execute the second software module, executing, in the second processing device, the second software module to execute, in the second processing device, a third software module and to provide a first key of a key pair to the third software module, and protecting, by the second processing device, a memory space associated with the third software module, wherein the memory space contains the first key of the key pair, wherein the first processing device contains a second key of the key pair. | 2021-10-21 |
20210326444 | FIRMWARE FOR SMALL MCU CARRYING A LARGE SET OF FEATURES - A controller and techniques for expanding its feature capabilities. Techniques may incorporate using an external memory to store feature sets that can be downloaded to an internal memory for intimate incorporation and usage by the controller. The external memory may be large in comparison to the internal memory. External storage of additional feature sets allows for use of a small and simple controller with access to numerous feature sets that otherwise could not be incorporated by the small controller. | 2021-10-21 |
20210326445 | SECURE APPLICATION DEVELOPMENT USING DISTRIBUTED LEDGERS - Disclosed are various embodiments for using distributed ledgers to assist in securely developing applications. An application component comprising a component file can be received from a validation client. It can then be determined that the application component complies with a security policy. In response to a determination that the application component complies with the security policy, an endorsed application component record can be generated that comprises the component file or a network address at which the component file is obtainable and a signature for the component file generated with an asymmetric key-pair stored in the memory. The endorsed application component record can then be stored in the distributed ledger. | 2021-10-21 |
20210326446 | Vulnerability Detection Method, Apparatus, Electronic Device and Storage Medium - The present application discloses a vulnerability detection method and apparatus, an electronic device and a storage medium, and relates to the field of vulnerability processing and the like. The specific implementation is as follows: implanting an agent into a target object, and performing, by the agent, preprocessing of taint tracking on actual running information of the target object, to obtain target running information to be loaded after the preprocessing; executing the target running information till a taint monitoring point for the taint tracking, to obtain taint information and probe information; and transmitting the taint information and the probe information to a scanning end, to construct, at the scanning end, a vulnerability detection request for vulnerability detection, according to the taint information and the probe information. | 2021-10-21 |
20210326447 | METHOD AND APPARATUS FOR SYSTEM INFORMATION PROTECTION PROCESSES AND PROCEDURES ANALYSIS - A method includes determining, by an analysis system, a system aspect of a system for a protection evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective for use in performing the protection evaluation on the system aspect. The method further includes determining, by the analysis system, at least one evaluation viewpoint for use in performing the protection analysis on the system aspect. The method further includes obtaining, by the analysis system, protection data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, a protection rating as a measure of protection maturity for the system aspect based on the protection data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric. | 2021-10-21 |
20210326448 | METHOD AND APPARATUS FOR SYSTEM PROTECTION MAINTENANCE ANALYSIS - A method includes determining, by an analysis system, a system aspect of a system for a protection evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective for use in performing the protection evaluation on the system aspect. The method further includes determining, by the analysis system, at least one evaluation viewpoint for use in performing the protection analysis on the system aspect. The method further includes obtaining, by the analysis system, protection data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, a protection rating as a measure of protection maturity for the system aspect based on the protection data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric. | 2021-10-21 |
20210326449 | SYSTEMS AND METHODS FOR GENERATING SECURITY IMPROVEMENT PLANS FOR ENTITIES - A computer-implemented method is provided for statistical modeling of entities of a particular type. The method can include obtaining entity data including a plurality of entity data sets, each entity data set associated with a respective entity and including values for one or more static parameters indicative of a type of the entity. Each entity data set can include (i) values for input parameter(s) indicative of a security profile of the entity and (ii) a value of a security class parameter indicative of a security class of the entity based on the values of the input parameters. The method can include training a statistical classifier to infer a value of the security class parameter indicative of the security class of a particular entity of the particular type based on values of one or more of the input parameters indicative of a security profile of the particular entity. | 2021-10-21 |
20210326450 | SYSTEMS AND METHODS FOR AIDA CAMPAIGN CONTROLLER INTELLIGENT RECORDS - Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications. Based on this information, the campaign controller may determine a rate of success of the model, in causing a user to interact with a link in one of the simulated phishing campaigns, and may display the model's rate of success via a user interface. | 2021-10-21 |
20210326451 | AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS - Systems and methods which provide a new application security assessment framework that allows auditing and testing systems to automatically perform security and compliance audits, detect technical security vulnerabilities, and illustrate the associated security risks affecting the business-critical applications. | 2021-10-21 |
20210326452 | DISTRIBUTED DIGITAL SECURITY SYSTEM - A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests. | 2021-10-21 |
20210326453 | DISTRIBUTED DIGITAL SECURITY SYSTEM - A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests. | 2021-10-21 |
20210326454 | SYSTEMS AND METHODS FOR USE IN VALIDATING ARTIFACTS FOR DEPLOYMENT - Systems and methods are provided for use in authenticating a software artifact, including target applications for a payment network. One exemplary computer-implemented method includes retrieving metadata and a stage log for an artifact from a stage of a pipeline, the metadata including a result of the stage. A keyword count is generated of the stage log, and a checksum for the stage log is generated based on a hashing function. A stage record is compiled for the artifact and the stage. The stage record includes the checksum, a representation of the keyword count, and the result, but not the stage log. The stage record is stored in at least two different data structures. The artifact is authenticated based on the stage records for the artifact in each of the at least two data structures, prior to releasing the artifact into production. | 2021-10-21 |
20210326455 | SYSTEM FOR ANALYSIS AND AUTHORIZATION FOR USE OF EXECUTABLE ENVIRONMENT DATA IN A COMPUTING SYSTEM USING HASH OUTPUTS - A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment. | 2021-10-21 |
20210326456 | SECURE, EFFICIENT, AND FLEXIBLE SEARCHABLE-ENCRYPTION TECHNIQUES - Disclosed embodiments relate to performing secure and flexible searches of encrypted data. Operations may include maintaining a database of a plurality of sets of encrypted data; receiving a transformed search query for the database, the transformed search query having undergone a transformation process at a client including: identifying a plaintext string in a search query at the client, applying the plaintext string to a language dictionary accessible to the client, receiving, based on the language dictionary, one or more plaintext search strings, and encrypting, at the client, the one or more plaintext search strings; and returning a result based on the transformed search query, the result being based on the encrypted one or more plaintext search strings. | 2021-10-21 |
20210326457 | SYSTEM AND METHOD FOR GENERATING PRIVACY DATA CONTAINMENT AND REPORTING - Aspects of the present disclosure involve, a customizable system and infrastructure which can receive privacy data from varying data sources for privacy scanning, containment, and reporting. In one embodiment, data received is scanned for privacy data extraction using various data connectors and decryption techniques. In another embodiment, the data extracted is transferred to a privacy scanning container where the data is analyzed by various deep learning models for the correct classification of the data. In some instances, the data extracted may be unstructured data deriving form emails, case memos, surveys, social media posts, and the like. Once the data is classified, the data may be stored or contained according to the classification of the data. Still in another embodiment, the classified data may be retrieved by an analytics container for use in reporting. | 2021-10-21 |
20210326458 | SYSTEMS AND METHODS FOR MEDIATING PERMISSIONS - Systems and methods mediate permissions for applications on user devices using predictive models. Data communications are monitored on a user device for permission requests and responses. A predictive model is trained with these permission requests and responses until a threshold is met. Then, a default permission response is provided on behalf of the user device in response to a permission request. | 2021-10-21 |