45th week of 2021 patent applcation highlights part 45 |
Patent application number | Title | Published |
20210349945 | SELECTIVE SENSING: A DATA-DRIVEN NONUNIFORM SUBSAMPLING APPROACH FOR COMPUTATION-FREE ON-SENSOR DATA DIMENSIONALITY REDUCTION - A data-driven nonuniform subsampling approach for computation-free on-sensor data dimensionality is provided, referred to herein as selective sensing. Designing an on-sensor data dimensionality reduction scheme for efficient signal sensing has long been a challenging task. Compressive sensing is a generic solution for sensing signals in a compressed format. Although compressive sensing can be directly implemented in the analog domain for specific types of signals, many application scenarios require implementation of data compression in the digital domain. However, the computational complexity involved in digital-domain compressive sensing limits its practical application, especially in resource-constrained sensor devices or high-data-rate sensor devices. Embodiments described herein provide a selective sensing framework that adopts a novel concept of data-driven nonuniform subsampling to reduce the dimensionality of acquired signals while retaining the information of interest in a computation-free fashion. | 2021-11-11 |
20210349946 | METHOD AND SYSTEM FOR IDENTIFYING, MANAGING, AND MONITORING DATA DEPENDENCIES - Software is increasingly being developed as a collection of loosely coupled applications. Loosely coupled applications exchange data by publishing data to and retrieving data from a data store, such as a database, a file located on a storage cluster, etc. Data produced by one application and consumed by another is referred to as a data dependency. In some embodiments, an application's data dependencies are identified by analyzing cached query plans associated with the application. Query plans include a hierarchical representation of a query, where non-leaf nodes represent commands and leaf nodes identify data dependencies. An application's data dependencies are identified by traversing the hierarchical representation of the query. Data dependencies consumed by the application are identified by finding leaf nodes that descend from a read command, while data dependencies produced by the application are identified by finding leaf nodes that descend from a write command. | 2021-11-11 |
20210349947 | Low Entropy Browsing History for Content Quasi-Personalization - The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers. | 2021-11-11 |
20210349948 | AUTOMATED POPULATION OF DIGITAL INTERFACES BASED ON DYNAMICALLY GENERATED CONTEXTUAL DATA - The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, automatically populate, in real-time, portions of digital interfaces based on dynamically generated contextual data. For example, a network-connected apparatus may receive, from a device, a portion of an identifier of a first counterparty to an exchange of data. The apparatus may perform operations determine a second counterparty to the data exchange based on at least one of a current geographic position of the first device, a first element of profile data associated with the first device, or the received portion of the first counterparty identifier, and may transmit an identifier of the second counterparty to the device. The device may execute an application program that presents the second counterparty identifier within a corresponding portion of an interface associated with the data exchange. | 2021-11-11 |
20210349949 | DOMAIN-AGNOSTIC STRUCTURED SEARCH QUERY EXPLORATION - A method for a search engine to provide domain-agnostic options for structured exploration based on a query. The method comprises clustering a corpus of historical queries into a plurality of query clusters. The method further comprises identifying a set of variable query terms in each query cluster. Then, a query structure of a new user query is identified, and a specific query cluster matching the query structure of the new user query is selected. Furthermore, the variable query term in the query structure of the new user query is identified. The method further comprises providing a query exploration interface offering user-selectable options for structured exploration of the new user query. Each of the user-selectable option corresponds to a variable query term in the identified set of variable query terms for the specific query cluster identified as matching the query structure of the new user query. | 2021-11-11 |
20210349950 | Utilizing Autocompletion as a Data Discovery Scaffold for Supporting Visual Analysis - A method utilizes data discovery to support visual analysis of datasets. A user selects a data source, and the method presents a natural language interface for analysis of the data source. A user specifies an incomplete natural language command directed to the data source, and the method correlates words in the incomplete natural language command with a data field in the data source. The method determines the data type of the data field and a range of data values for the data field. According to the data type and the range of data values, the method presents one or more autocompletion options for the incomplete natural language command. Each option includes respective text and a respective corresponding visual graphic. The user selects one of the autocompletion options, and the method forms a complete natural language command. The method then displays a data visualization according to the complete natural language command. | 2021-11-11 |
20210349951 | INTERNET DATA COLLECTION METHOD - An internet data collection method includes steps of receiving a collecting instruction, the collecting instruction corresponds to target data that marked on a web page; retrieving a web address corresponding to the web page and the location information of the target data on the web page; and storing the web address and the location information as a tag to an operating end. | 2021-11-11 |
20210349952 | Encapsulating Virtual Area Based Communicant Assemblies - Realtime communications between communicants in a virtual area are administered. Assemblies of copresent communicants in the virtual area are detected. For each of respective ones of the detected assemblies, a respective meeting object linked to information relating to communicant interactions in the assembly is generated. Respective meeting summary data is determined based on the information linked to selected ones of the meeting objects meeting objects. The determined meeting summary data is transmitted to a network node for display. A visualization of summaries of respective assemblies of copresent communicants in the virtual area is presented on a display. | 2021-11-11 |
20210349953 | SINGLE CLICK DELTA ANALYSIS - Single-click delta analysis is disclosed. A user query of status information collected from one or more monitored devices is received from a user. In response to receiving an indication from the user to determine a variance between different portions of the collected status information, a target query and a baseline query are generated using the user query. The generated target query and the generated baseline query are performed, respectively, against data in a data store including the status information collected from the one or more monitored devices. A target set of status information results and a baseline set of status information results are obtained in response to performing, respectively, the generated target query and the generated baseline query. The obtained target and baseline sets of results are combined. Output indicative of a variance between the target and baseline sets of status information results is provided based at least in part on the combining. | 2021-11-11 |
20210349954 | SYSTEM AND METHOD FOR PERFORMING CROSS-MODAL INFORMATION RETRIEVAL USING A NEURAL NETWORK USING LEARNED RANK IMAGES - A system and method perform cross-modal information retrieval, by generating a graph representing the set of media objects. Each node of the graph corresponds to a media object and is labeled with a set of features corresponding to a text part of the respective media object. Each edge between two nodes represents a similarity between a media part of the two nodes. A first relevance score is computed for each media object of the set of media objects that corresponds to a text-based score. A second relevance score is computed for each media object by inputting the graph into a graph neural network. The first relevance score and the second relevance score are combined to obtain a final ranking score for each media object. | 2021-11-11 |
20210349955 | SYSTEMS AND METHODS FOR REAL ESTATE DATA COLLECTION, NORMALIZATION, AND VISUALIZATION - A system for generating personalized uniform resource locators for data collection. The system may include a processor and a memory device storing instructions that configure processor to perform operations. The operations may include configuring an application programming interface (API) to communicate with a repository server storing information from real estate properties, retrieving (using the API) records of real estate properties and identifying a subset of users with upcoming reporting duties. The operations may also include generating personalized URLs encoding client identifiers (IDs) and account IDs for users in the subset, transmitting the personalized URLs to client devices, and receiving a website request through one of the personalized URLs. The operations may also include determining a client ID and an account ID embedded a personalized URL; and generating a data collection website comprising a collection graphical user interface (GUI). | 2021-11-11 |
20210349956 | TECHNIQUES FOR AN AGENT-ASSISTED BROWSING SYSTEM - Techniques are disclosed for agent-assisted information browsing. In one example, an audio connection is established between a mobile device and an agent platform. In addition, a web service is established between the mobile device and the agent platform. The mobile device requests information through audio connection and/or web service. The agent platform searches a database for requested information and updates a webpage on the mobile device through the web service. | 2021-11-11 |
20210349957 | METHOD FOR DETECTING AND ANALYZING SITE QUALITY - A method and system for analyzing sites is described. A scanner module scans listings of an online publication. A quality engine analyzes the quality of the listings. A data collection module collects defective conditions of the listings determined by the quality engine. A report module reports the defective conditions of the listings. An auto correction module automatically corrects at least a first portion of the defective conditions of the listings. A manual correction module enables an operator of the online publication to correct at least a second portion of the defective conditions of the listings. | 2021-11-11 |
20210349958 | METADATA BASED BI-DIRECTIONAL DATA DISTRIBUTION OF ASSOCIATED DATA - A method may include receiving, at a search engine, an indication that a first data object was created. The search engine may fetch metadata associated with the first data object, the metadata including a description of the first data object and a binding expression including relational information between the first data object and at least one other data object. The search engine may add data from the at least one other data object to the first data object. The search engine may store the metadata and the first data object in an index of the search engine, the index associated with the first data object. The search engine may receive a search phrase. The search engine may generate a search result that includes the relational information retrieved from the index. Related systems and articles of manufacture, including computer program products, are also provided. | 2021-11-11 |
20210349959 | RECOMMENDING DOMAINS FROM FREE TEXT - Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a character string (e.g., a user input or a file content) from a client; match file tokens tokenized from the character string with knowledge base tokens in a database; generate labels/tags for the file tokens according to labels assigned to the knowledge base tokens and a second level domain (SLD) including a token from the file tokens; remove any tokens from the SLD flagged for removal in the database; generate a top level domain (TLD) and one or more domain names combining the SLD and the TLD; score each of one or more generated domain names according to domain name characteristics; and display a list of scored domain names on the client. | 2021-11-11 |
20210349960 | METHODS AND SYSTEMS FOR A CONTENT DEVELOPMENT AND MANAGEMENT PLATFORM - The present system and method relate to an automated crawler for crawling a primary online content object and storing a set of results, a parser for parsing the stored set of results to generate a plurality of key phrases and a content corpus, a plurality of models for processing at least one of the plurality of key phrases or the content corpus, wherein the processing results in a plurality of topic clusters which arrange topics within the primary online content object around a core topic based on semantic similarity, a suggestion generator for generating a suggested topic that is similar to at least one topic among the plurality of topic clusters and for storing the suggested topic, and an application for developing a strategy for development of online presence content. | 2021-11-11 |
20210349961 | PAGE PERSONALIZATION - Techniques are disclosed for providing personalized pages. An example methodology implementing the techniques includes, displaying, by a computing device, a plurality of elements in a page and monitoring interaction with the displayed page. The method also includes, responsive to determining a topic based on the interaction with the plurality of elements in the displayed page, identifying one or more files related to the identified topic and providing an element on the page, the element configured to provide access to one of the identified one or more files in response to an input received on the element. The element may be provided in a file zone in the displayed page. | 2021-11-11 |
20210349962 | GEO-REFERENCED VIRTUAL ANCHOR MANAGEMENT SYSTEM FOR MEDIA CONTENT ACCESS FROM PHYSICAL LOCATION - Methods, systems, and devices for sharing a physical location with online users by requiring the online users to be in physical proximity of a specific physical location before the users can experience media content associated with the physical location. A user can mark a physical location when that user is at the location by associating a virtual anchor with that location. The virtual anchor creates a data structure that contains the location's geographic coordinates as well as other details regarding the anchor. The user can also associate media content with the virtual anchor. The virtual anchor can be shared with other users and these other users are notified of the presence of the virtual anchor when they are within a physical proximity from the physical location. Only when the other users are at the location can these users access the media content associated with the virtual anchor. | 2021-11-11 |
20210349963 | CONFIGURATION OF CONTENT SITE USER INTERACTION MONITORING IN DATA NETWORKS - Style instructions, which may be coded in a style language and not include application logic, can be used to both control presentation of content of a web page by a web browser and control monitoring of interactions with the web page. Selectors in the style instructions, for example, can be used to identify elements of the web page and define styles for the elements. As a result of implementing such style instructions, individuals tasked with design of a web page can more easily and quickly configure monitoring of interactions with the web page. | 2021-11-11 |
20210349964 | PREDICTIVE RESOURCE IDENTIFICATION AND PHASED DELIVERY OF STRUCTURED DOCUMENTS - In one embodiment, a method includes, by a client device, sending a request to a computer server system for a structured document; receiving, from the computer server in a first response phase, a first response portion comprising one or more first resources associated with the structured document or references to the one or more first resources; processing the one or more first resources for rendering a part of the structured document; and receiving, from the computer system in a second response phase that is subsequent to the first response phase, a second response portion from comprising one or more second resources associated with the structured document or references to the one or more second resources, the one or more second resources being different than the one or more first resources. | 2021-11-11 |
20210349965 | DEVICE AND METHOD FOR FLEXIBLY SUMMING MATRIX VALUES - A device (e.g., an application-specific integrated circuit chip) includes a matrix transpose component, a matrix processing component, a data alignment component, and a data reduction component. The matrix transpose component is configured to transpose an input matrix of elements to output an output matrix of the elements that have been transposed, wherein: each element of the input matrix of elements is represented using a first number of bits, each value of a group of values stored in the input matrix is represented using a second number of bits greater than the first number of bits, and each value of the group of values is stored as split segments across more than one element of the elements of the input matrix. The matrix processing component is configured to multiply a first multiplication input matrix with a second multiplication input matrix, wherein the output matrix of the matrix transpose component is utilized as the first multiplication input matrix and a mask vector is utilized as the second multiplication input matrix. The data alignment component is configured to modify at least a portion of elements of a result of the matrix processing component. The data reduction component is configured to sum at least the elements of the modified result of the matrix processing component to determine a sum of the group of values. | 2021-11-11 |
20210349966 | SCALABLE SPARSE MATRIX MULTIPLY ACCELERATION USING SYSTOLIC ARRAYS WITH FEEDBACK INPUTS - Described herein is an accelerator device including a host interface, a fabric interconnect coupled with the host interface, and one or more hardware tiles coupled with the fabric interconnect, the one or more hardware tiles including sparse matrix multiply acceleration hardware including a systolic array with feedback inputs. | 2021-11-11 |
20210349967 | MEDIA CONTENT CONTROL - According to an example aspect of the present invention, there is provided a method, comprising: receiving a cryptographic proof of use indicative of decoding of a first media content element by a user device ( | 2021-11-11 |
20210349968 | METHOD AND SYSTEM FOR ELECTRONIC CONTENT DELIVERY TO A USER DEVICE THROUGH A WIRELESS CAPTIVE AUDIENCE DEVICE - Digital content distribution methods, systems and devices are provided. The digital content distribution utilizes a content distribution server for providing a user device access to digital content. In certain embodiments, the content distribution server: (a) receives a check-out request from a user device via a content access device; (b) provides metainfo to the user device via the content access device; (c) receives an open content command comprising an identifier of the digital content and an identifier for a user from the user device; (d) determines from the open content command whether the user device is authorized to view the digital content; and (e) provides a license response to the user device based on the user device being authorized to view the digital content, the license response comprising a license and the digital content. | 2021-11-11 |
20210349969 | NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ELECTRONIC MUSICAL INSTRUMENT PROGRAM, METHOD FOR MUSICAL SOUND GENERATION PROCESS AND ELECTRONIC MUSICAL INSTRUMENT - An electronic musical instrument, method for a musical sound generation process and a non-transitory computer readable medium that stores an electronic musical instrument program are provided. The program causes a computer provided with a storage part to execute a musical sound generation process using sound data. The program causes the computer to execute: | 2021-11-11 |
20210349970 | APPLICATION PROTECTION ENFORCEMENT IN THE CLOUD - A method and system provide the ability to enforce application protection in the cloud. A request to register an application is received in a registration tool executing within a cloud computing environment. The registration tool collects application information data and protection policy settings, and registers the application by returning, to a build-time environment, a secure protection authorization (SPA) certificate that authorizes the application to be built. A build registration tool executing in the cloud computing environment receives, from a cloud protection toolchain executing in the build-time environment, signed build-data that includes the SPA and build information for a build of the application. After determining, in the cloud, that the SPA is authenticate, developer credentials are authorized, and the build information is valid, the build registration tool responds to the cloud protection toolchain that the build for the application is authorized. | 2021-11-11 |
20210349971 | SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY - The system and methods described allow a content delivery application to provide temporary access to a content item for display on a content access device based on a user obtaining access to the content item initially on another system. The content delivery application receives content accessed confirmation that user access a content item and then monitors whether that access was interrupted. If the access was interrupted, the content delivery application generates a content access bookmark based on a content timeline and stores a content access authorization comprising the content access bookmark and an identifier from the profile. When the user requests the content item, the content delivery application transmits access information corresponding to segments of the content item, based on the content access bookmark to a user's device. | 2021-11-11 |
20210349972 | CONTROL OF APPLICATIONS BASED ON LICENSING OBJECTS - An example of a computer-readable medium to store machine-readable instructions. The instructions may cause a processor to verify a licensing object and determine a license has expired. An application may be controlled based on an expiration parameter specific to the licensing object. | 2021-11-11 |
20210349973 | DETERMINING SOFTWARE APPLICATION LICENSE USAGE - Provided are techniques for automated software application license usage. Global detection results that indicate, for each of a plurality of end user computers, one or more installed software applications, one or more running software applications, and a user account. Unique pairs are identified using the global detection results, wherein each pair of the unique pairs comprises a software application name for a software application and a user name for a user. For a unique pair, a query is run against a user registry to get a list of user groups that the user name is a member of, a user group is selected that corresponds to the software application name, and a number of users in the selected user group is designated as a license demand for authorized users for the software application. Then, based on the global detection results and the license demand, one or more recommendations are provided. | 2021-11-11 |
20210349974 | SYSTEM AND METHOD FOR PROVIDING SERVICE, AND RECORDING MEDIUM - A system includes circuitry that determines whether a license for an application has been issued to both a user and an electronic device, assigns use permission of an application to each of the user and the electronic device, based on a determination that a license for the application has been issued to both the user and the electronic device, and when use permission of the application has been assigned to both the user and the electronic device, permits the user who has logged in to the electronic device to use the application. | 2021-11-11 |
20210349975 | SYSTEMS AND METHODS FOR IMPROVED CYBERSECURITY NAMED-ENTITY-RECOGNITION CONSIDERING SEMANTIC SIMILARITY - Various embodiments of a system and associated method for generating and training a name-entity recognition model for automatic dataset labeling and corpus generation for cybersecurity related entities are disclosed. | 2021-11-11 |
20210349976 | HASH-BASED DYNAMIC RESTRICTION OF CONTENT ON INFORMATION RESOURCES - Systems and methods for restricting content inserted into information resources are provided herein. A computing device can identify a content element included in an information resource. The computing device can identify a bit stream corresponding to the content element included in the information resource. The computing device can hash the identified bit stream to generate an element identifier corresponding to the content element. The computing device can access a restricted content database using the element identifier. The computing device can modify, responsive to finding the element identifier in the restricted content database, the presentation of the content element on the information resource in accordance with the content restriction policy. | 2021-11-11 |
20210349977 | VEHICLE SURVEILLANCE DEVICE AND VEHICLE SURVEILLANCE METHOD - A vehicle surveillance device for an in-vehicle network system that includes one or more electronic control units includes: a frame transmitter and receiver that receives a frame flowing over the in-vehicle network system; and a score calculator that detects a suspicious behavior different from a normal driving behavior based on the frame received by the frame transmitter and receiver and vehicle data including information on one or more frames received by the frame transmitter and receiver prior to receiving the frame, and calculates, based on a detection result, a score indicating a likelihood that reverse engineering has been performed on a vehicle provided with the in-vehicle network system. | 2021-11-11 |
20210349978 | SELECTIVE SECURING OF COMPUTING DEVICES WITH DOCKING STATIONS - A method of selectively securing a computing device at a docking station may include creating a security key between a security application programming interface (API) and an application executed on the computing device; upon logging into and execution of a basic input/output system (BIOS) of the computing device by a user, registering the application with the security API using the security key; and, upon receipt of a request to remove the computing device from the docking station, validating the user is authorized to remove the computing device from the docking station based on settings associated with the application. | 2021-11-11 |
20210349979 | DETECTION OF SLOW BRUTE FORCE ATTACKS BASED ON USER-LEVEL TIME SERIES ANALYSIS - Methods, systems and computer program products are provided for detection of slow brute force attacks based on user-level time series analysis. A slow brute force attack may be detected based on one or more anomalous failed login events associated with a user, alone or in combination with one or more post-login anomalous activities associated with the user, security alerts associated with the user, investigation priority determined for the user and/or successful logon events associated with the user. An alert may indicate a user is the target of a successful or unsuccessful slow brute force attack. Time-series data (e.g., accounted for in configurable time intervals) may be analyzed on a user-by-user basis to identify localized anomalies and global anomalies, which may be scored and evaluated (e.g., alone or combined with other information) to determine an investigation priority and whether and what alert to issue for a user. | 2021-11-11 |
20210349980 | Method and Apparatus for Processing Requests for Access by Biometric Verification - A method and apparatus for processing requests for access to particular activities by utilizing biometric/threshold data examinations to verify the identity of the requestor making the request, wherein a data processor system is programmed to permit a more-restricted or a less-restricted access to the particular activity to be granted by specifying in the stored template the enrollee biometrics/threshold data required for the more-restricted access and that required for the less-restricted access; and during the operational phase, to sense and compare the corresponding biometric/threshold data of the requestor with that in the stored template in determining whether to grant or deny the requested access. | 2021-11-11 |
20210349981 | AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AND AUTHENTICATION DEVICE - An authentication method is used by an automated driving system that includes a vehicle and an external device, the external device communicating with the vehicle to cause the vehicle to implement automated driving. The vehicle holds a first certificate that certifies validity of the vehicle. The external device holds a second certificate that certifies validity of the external device. The authentication method includes: validating a third certificate that certifies validity of a combination of the vehicle and the external device, in accordance with a result of device authentication performed between the vehicle and the external device by reference to the first certificate and the second certificate. | 2021-11-11 |
20210349982 | SERVICE KIOSK DEVICE PROVISIONING - Examples associated with service kiosk device provisioning are described. One example includes receiving at a service kiosk, authentication data associated with a user, data associated with a first device currently assigned to the user, a device specification for a second device to be provided to the user, and provisioning data for the second device. A selected device is selected based on the device specification to serve as the second device. The selected device is selected from a set of devices stored in compartments of the service kiosk and operably connected to the service kiosk. The selected device is configured based on the provisioning data. At a physical interface of the service kiosk, a credential that matches the authentication data associated with the user is received. Physical access is provided to a first compartment into which the user is to store the first device. Physical access is provided to a second compartment from which the user is to retrieve the second device. | 2021-11-11 |
20210349983 | ACCESS LEVEL AUTHENTICATION BASED ON FIELD OF VIEW SEGMENTATION - A method provides for a field of view (FOV) of a smart contact lens of a user, such that the FOV includes a plurality of segments of the FOV. A device is identified from object recognition performed on image data from the smart contact lens and viewed within a first segment of the FOV. A key is transmitted to the device that includes credentials of the user of the smart contact lens to authenticate the user to the device that is viewed within the first segment of the FOV. A first level of access to the device is provided, based on viewing the device in the first segment of the FOV, and in response to changing the viewing of the device to a second segment of the FOV, providing a second level of access to the device associated with viewing the device in the second segment of the FOV. | 2021-11-11 |
20210349984 | DETECTOR FOR ONLINE USER VERIFICATION - An approach is provided in which the approach provides a first question to a requestor requesting access to a resource. The first question corresponds to a first cognitive level and includes at least one image selected from a set of images. The approach computes a confidence value of a first answer received from the requestor responding to the first question. In response to determining that the confidence value is below a confidence threshold, the approach provides a second question to the requestor corresponding to a second cognitive level that is increased from the first cognitive level. The approach grants access to the requestor in response to determining that a second answer received from the requestor responding to the second question is a correct answer. | 2021-11-11 |
20210349985 | MEMORY MODULE AUTHENTICATION EXTENSION - Systems and methods are provided for a secondary authentication of a memory module. A nonce key is written to a nonce register of a register array on the memory module, the nonce register being accessible over two different interfaces. In various embodiments, the nonce key may be generated by a management system of the computing platform after performing one or more authentication processes for a memory module over a management interface. Authentication information for use in performing authentication can be stored in an identification component on the memory module. If authentication is successful, the management system can generate the nonce key and write it to the nonce register. Upon receiving a request to access an address, a memory controller can read the nonce register of the memory module at the requested address and compare the nonce key to an identifier included in the request. | 2021-11-11 |
20210349986 | BINDING A HARDWARE SECURITY TOKEN TO A HOST DEVICE TO PREVENT EXPLOITATION BY OTHER HOST DEVICES - A system and method described below prevents exploitation of a client's PKI station using the a token installed on other host (attackers') processors. This is accomplished by binding the token to the approved PKI client station (host) using the a software development kit installed in the PKI client station. Once a token is bound to a PKI client station, the token can no longer be used on another station unless permitted by authorized personnel. | 2021-11-11 |
20210349987 | SYSTEMS AND METHODS FOR AUTHENTICATION - An authentication method for a tag device includes exchanging authentication codes between the tag device and an authentication server to perform mutual authentication. A reader device acts as a communications bridge between the tag device and the authentication server. The reader device may observe mutual authentication between the tag device and the authentication server as an indicator that the tag device is authentic. A failure of mutual authentication indicates that the tag device is not authentic. | 2021-11-11 |
20210349988 | SYSTEMS AND METHODS FOR DECENTRALIZED RECOVERY OF IDENTITY ATTRIBUTES - Systems and methods for decentralized recovery of identity attributes are disclosed. In one embodiment, a method for decentralized storage of identity data may include: (1) receiving, at an identity management computer program executed by a computer processor, identity data from a user electronic device; (2) parsing, by the identity management computer program, the identity data into a plurality of portions; (3) mapping, by the identity management computer program, each portion to one of a plurality of storage locations; and (4) storing, by the identity management computer program, the plurality of portions to the plurality of storage locations based on the mapping. | 2021-11-11 |
20210349989 | METHOD AND APPARATUS FOR UPDATING PASSWORD OF ELECTRONIC DEVICE, DEVICE AND STORAGE MEDIUM - The present application discloses a method and apparatus for updating a password of an electronic device, a device, and a storage medium, and relates to intelligent transportation, vehicle-road collaboration, and device security technologies in the field of data processing. The specific implementation solution is: in response to detecting a trigger condition of a password update, the electronic device randomly generates a first password, and updates a login password of the electronic device to the first password; then the electronic device sends a password updating message to a server, and the password updating message is configured to indicate an identification of the electronic device and the first password. The server updates the database for storing login passwords of different electronic devices according to the password updating message. Through the above process, the safety of the electronic device is improved. | 2021-11-11 |
20210349990 | COUNTERMEASURE FOR PROTECTING AGAINST A FAULT INJECTION ATTACK IN A DATA PROCESSING SYSTEM - A method is provided for protecting execution of a program against a fault injection attack. In one embodiment, a portion of the program includes multiple substantially logically identical conditional operations that are executed in a sequence. An attacker must successfully inject a fault at each instance of the conditional operations to cause the program execution to reach the final state. The multiple conditional operations may ask the same question differently so that the glitch will not cause the same response from both conditional operations. Also, the program portion may make advancement from one state to the next contingent on arriving at the next state from a valid previous state. The described program portions with multiple instances of a conditional operation make a program execution more resistant to a glitch type of fault injection attack. | 2021-11-11 |
20210349991 | IN-MEMORY PROTECTION FOR CONTROLLER SECURITY - In one implementation, a method for providing security on controllers includes detecting computer-readable code running on a controller, the computer-readable code including code portions that each include instructions to be performed by the controller; identifying a current code portion of the computer-readable code; accessing an in-memory graph that models an operational flow of the computer-readable code, wherein the in-memory graph includes a plurality of nodes, each of the nodes corresponding to one of the code portions and each of the nodes having a risk value for the associated code portion that is a measure of security risk for the associated code portion; identifying the risk value for the current code portion; selecting, from a plurality of available flow control integrity (IMV) schemes, an IMV scheme based on the identified risk value; and applying, to the code portion as the code portion is running on the controller, the selected IMV scheme. | 2021-11-11 |
20210349992 | DEPARTURE-BASED PROCESS-LEVEL DETECTION OF STEALTHY ATTACKS ON CONTROL SYSTEMS - Method and device for extracting noise-reduced signal information from a time series of sensor measurements during normal process operation and then actively checking whether present realizations of the process are departing from historical normal behavior. To extract signal information, the solution borrows ideas from singular spectrum analysis a non-parametric exploratory analysis tool for time series that is particularly suitable for separating the deterministic part of a dynamical system behavior from the chaotic part, purely from noisy time series of measurements. | 2021-11-11 |
20210349993 | SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED CONNECTED DEVICES IN A VEHICLE - The invention relates to the field of providing security to vehicles, specifically to a system and a method for detecting the connection of unauthorized devices. A system for detecting unauthorized connected devices in a vehicle comprises at least one electronic device of the vehicle, which is connected via an electrical bus to a module for detecting unauthorized devices consisting of a measurement unit, an analog-digital converter, a digital signal processing unit, a buffer unit and a comparator unit. A method for detecting unauthorized devices includes measuring the parameters of an electrical signal at a first moment and a second moment in time, with subsequent formation of an electrical signal spectrum. The electrical signal spectrum at the first moment in time is set as a threshold, on the basis of which a comparison is made with that received in the second time period. The accuracy of detecting unauthorized connected devices is increased. | 2021-11-11 |
20210349994 | ENTERPRISE NOTIFICATION OF TRENDING THREATS - An approach is provided in which the approach receives a global trending threat corresponding to an incident occurring in an industry. The approach identifies a set of local Indicators of Concern (IoCs) within an entity that corresponds to the global trending threat, and computes an alert priority based on the set of local IoCs and the global trending threat. The approach adjusts the alert priority based on comparing entity properties of the entity with threat properties of the global trending threat, and dispatches an alert based on the adjusted alert priority. | 2021-11-11 |
20210349995 | Systems and Methods for Protecting Cache and Main-Memory from Flush-Based Attacks - Disclosed herein are systems and methods for identifying and mitigating Flush-based cache attacks. The systems and methods can include adding a zombie bit to a cache line. The zombie bit can be used to track the status of cache hits and misses to the flushed line. A line that is invalidated due to a Flush-Caused Invalidation can be marked as a zombie line by marking the zombie bit as valid. If another hit, or access request, is made to the cache line, data retrieved from memory can be analyzed to determine if the hit is benign or is a potential attack. If the retrieved data is the same as the cache data, then the line can be marked as a valid zombie line. Any subsequent hit to the valid zombie line can be marked as a potential attack. Hardware- and software-based mitigation protocols are also described. | 2021-11-11 |
20210349996 | OS START EVENT DETECTION, OS FINGERPRINTING, AND DEVICE TRACKING USING ENHANCED DATA FEATURES - In one embodiment, a device in a network tracks traffic features indicated by header information of packets of an encrypted traffic flow over time. The encrypted traffic flow is associated with a particular host in the network. The device detects an operating system start event based on the traffic features and provides data regarding the detected operating system start event as input to a machine learning-based malware detector to determine whether the particular host with which the encrypted traffic flow is associated is infected with malware. The device causes performance of a mitigation action in the network when the malware detector determines that the particular host is infected with malware. | 2021-11-11 |
20210349997 | ANOMALOUS VEHICLE DETECTION SERVER AND ANOMALOUS VEHICLE DETECTION METHOD - An anomalous vehicle detection server includes an anomaly score calculator that detects a suspicious behavior different from a predetermined driving behavior based on pieces of vehicle information that are received from a plurality of vehicles, respectively, and are each based on a vehicle log including the content of an event that has occurred in a vehicle system provided in the vehicle, and acquires an anomaly score of each of the plurality of vehicles that indicates a likelihood that reverse engineering is performed on the vehicle; and an anomalous vehicle determiner that determines whether one vehicle of the plurality of vehicles is an anomalous vehicle based on the anomaly score of the one vehicle and a statistical value of the anomaly scores of two or more vehicles of the plurality of vehicles. | 2021-11-11 |
20210349998 | SYSTEMS AND METHODS FOR THERMAL SIDE-CHANNEL ANALYSIS AND MALWARE DETECTION - In some embodiments, the present disclosure provides systems and methods for detecting malware, including receiving thermal images of an integrated circuit, and generating a power density profile using at least one of the thermal images. The present disclosure further includes comparing the power density profile to an expected power density profile of the integrated circuit, and determining, based on the comparison, if the integrated circuit is in an abnormal operating state. | 2021-11-11 |
20210349999 | MEMORY SCANNING METHODS AND APPARATUS - An example apparatus includes a scan manager to add a portion of a page of physical memory from a first sequence of mappings to a second sequence of mappings in response to determining the second sequence includes an address corresponding to the portion of the page of physical memory, and a scanner to scan the first sequence and the second sequence to determine whether at least one of first data in the first sequence or second data in the second sequence includes a pattern indicative of malware. | 2021-11-11 |
20210350000 | SYSTEM AND METHOD FOR VERIFYING A REGEX GROUP - Disclosed is a method and system for verifying a regex group. The method comprises verifying of a regex group by creating a flow id through a processor for the regex group when source reaches the sink. The flow id is used for tracking the flow of the regex group. The processor checks in case the flow id is a previously tested flow id. When the flow id is not the previously tested flow id, the processor passes one or more run tasks through a processor forming a queue. The processor tests for one or more vulnerabilities to be associated with the regex group based on the passing, wherein the testing is used to qualify the regex group as a valid regex group. | 2021-11-11 |
20210350001 | MACHINE LEARNING-BASED METHOD AND SYSTEM FOR DETECTING PLAINTEXT PASSWORDS - A technological solution for mitigating a cybersecurity risk on a computer that potentially includes a plaintext password. The solution includes searching a computer resource on the computer, analyzing any text, detecting a string of characters in the text that potentially includes a plaintext password, determining a confidence score for the string of characters indicating a likelihood the string of characters includes the plaintext password, and effectuating a remediation action based on the confidence score, wherein the remediation action includes encrypting the string of characters when the confidence score is equal to or greater than a first certainty level. | 2021-11-11 |
20210350002 | GUARD RAILED SECURITY BENCHMARK IMPLEMENTATION ASSURANCE - Guard-railed security benchmark compliance assurance includes storing in memory of a computer a multiplicity of specific parameter values, retrieving from memory, different parameterized operating system directives arranged together in a programmatic module, populating different parameters of the directives with respective ones of the stored specific parameter values and invoking each of the directives with the populated different parameters through a command line shell of an operating system executing in the computer, each invocation establishing a different configuration setting in a computing environment hosted by the computer. | 2021-11-11 |
20210350003 | SECURING BOOT CONTROLLER FOR AN EMBEDDED SYSTEM, ASSOCIATED EMBEDDED SYSTEM AND SECURING BOOT METHOD - The present invention relates to a securing boot controller for an embedded system, the embedded system further comprising an operational module incorporating an operational function of the system, and a verification module incorporating a function of verifying various components of the system; | 2021-11-11 |
20210350004 | METHODS AND SYSTEMS FOR EXPLAINING A DECISION PROCESS OF A MACHINE LEARNING MODEL - A method and system for explaining a decision process of a machine learning model that includes inputting into a machine learning model a first input data file; receiving a first output data file from the machine learning model based on the first input data file; executing an adversarial attack on the machine learning model, creating a mapping of the one or more units of data of the first input data file with changes by the adversarial attack exceeding a first threshold to one or more segments of the first input data file; determining a density of the changes to the one or more units of data in each of the one or more segments; and displaying the one or more segments of the first input data file having a density of changes to the one or more units of data exceeding a second threshold via a graphical user interface. | 2021-11-11 |
20210350005 | SYSTEM AND METHOD FOR VERIFYING A REGEX SANITIZER AND A VALIDATOR - Disclosed is a method and system for verifying a regex sanitizer and a validator. The method comprises verifying of at least one of a regex sanitizer and a validator by applying the regex sanitizer and a validator over multiple predefined tainted inputs. An output obtained after applying at least one of the regex sanitizer is checked for one of a tainted output or a non-tainted output. The at least one of the regex sanitizer and validator may be qualified as a valid regex sanitizer and validator based upon the checking. The valid regex sanitizer may be tagged with a validation signature. The valid regex sanitizer is used for checking the tainted input in the user's input. | 2021-11-11 |
20210350006 | SYSTEMS AND METHODS FOR IDENTIFYING SOFTWARE VULNERABILITIES IN EMBEDDED DEVICE FIRMWARE - The disclosed computer-implemented method for identifying software vulnerabilities in embedded device firmware may include (i) collecting a firmware image for an Internet-of-Things device, (ii) extracting library dependencies from the firmware image for the Internet-of-Things device, (iii) identifying a true version of a library specified in the firmware image by checking a ground truth database that records confirmed values for true versions for previously encountered libraries, and (iv) performing a security action to protect a user from a security risk based on identifying the true version of the library specified in the firmware image. Various other methods, systems, and computer-readable media are also disclosed. | 2021-11-11 |
20210350007 | Method, System, and Apparatus for Probabilistic Identification of Encrypted Files - A mechanism for probabilistically determining the contents of an encrypted file is provided, such that a transfer of the encrypted file can be restricted according to rules associated with an unencrypted version of the file. Embodiments generate a file size table of a subset of files, where each entry of the file size table includes a size information regarding the unencrypted file. Embodiments compare the size of the encrypted file against the file sizes and compressed file size ranges to determine whether the encrypted file has a match. If the size of the encrypted file has a single match in the table, then there is a high probability that the file associated with the matching entry is the unencrypted version of the encrypted file. Rules associated with restricting access of the file related to the matching entry can be used to control transfer of the encrypted file. | 2021-11-11 |
20210350008 | SECURE INGRESS AND EGRESS OF DATA FIELDS THROUGH LEGACY COMPUTER SYSTEMS - Aspects include receiving an outbound payload for output to a requestor as part of a response to a call by the requestor to an application programming interface (API). Clear data in the outbound payload is selected for encryption based on policy information. The clear data is encrypted to generate encrypted data, and the encrypted data is inserted into the outbound payload in place of the clear data to generate an updated outbound payload. The response, including the updated outbound payload, is sent to the requestor. | 2021-11-11 |
20210350009 | SYSTEMS AND METHODS FOR CREATING ENHANCED DOCUMENTS FOR PERFECT AUTOMATED PARSING - The disclosed enhanced document creation and parsing systems deal with enhanced documents that allow for the presentation of document content in a preferred visual manner, while ensuring that the document content can be captured accurately by an automated parser with nothing being discarded or misrepresented. The enhanced document creation system may create an enhanced document by encoding document content in accordance with a defined schema, optionally encrypting the resulting structured data into an encrypted byte string, and embedding the encrypted byte string as non-visible metadata in a rendered document. The resulting enhanced document can be completely and accurately parsed by an enhanced document parsing system that is capable of extracting, decrypting and decoding the embedded document metadata. | 2021-11-11 |
20210350010 | DISTRIBUTED PRIVATELY SUBSPACED BLOCKCHAIN DATA STRUCTURES WITH SECURE ACCESS RESTRICTION MANAGEMENT - Disclosed herein is a system for providing a cryptographic platform for distributing data structures within a peer-to-peer network wherein encrypted messages are exchanged among nodes. The system provides for the creation and management of privately subspaced blockchains that include subspaces that are private, yet verifiable through the use of global state roots. The global state roots are updated based on subspace roots that are in term generated based on the data in that subspaces. | 2021-11-11 |
20210350011 | FEATURE ACCESS CONTROL IN A DIGITAL TRANSACTION MANAGEMENT PLATFORM - An online document system manages access to features within the online document system. The online document system may receive and fulfill a request from a first entity to sponsor a feature for a second entity. The online document system may determine an access policy to restrict access to the sponsored feature. For example, the access policy may include a requirement that the second entity only use the sponsored feature with the first entity. The first entity may provide a second access policy to the online document system to enforce. If the second entity satisfies requirements of the access policies, the online document system may then provide access to the second entity to use the sponsored feature. | 2021-11-11 |
20210350012 | APPLICATION-SPECIFIC SECURITY - Embodiments for enabling or disabling application features according to application-specific security settings are described. The application-specific security settings can control when particular security levels, corresponding to authentication procedures, are required. The security levels can correspond to authentication procedures such as requiring no password, only requiring a PIN, allowing authentication by biometrics, or requiring a password. The application-specific security settings can control security levels based on a variety of circumstances such as setting particular security levels for particular locations, setting different security levels based on time since last device use, etc. In various implementations, the security levels can be mapped to application features to enable or disable. | 2021-11-11 |
20210350013 | SECURITY SYSTEMS AND METHODS FOR CONTINUOUS AUTHORIZED ACCESS TO RESTRICTED ACCESS LOCATIONS - Systems and methods for authorized access to restricted access locations. A first and/or second device includes a secure storage storing security credentials associated with a user for authorized access to restricted access locations. The second device is associated with a unique identifier. A processor of the first device is configured to: detect a presence of the second device within a predetermined proximity range of the first device; establish a communication channel between the first and second devices; receive the unique device identifier from the second device via the communication channel; determine whether the received unique device identifier matches a predetermined identifier in the secure storage, to validate the second device; determine whether the first and second devices maintain a predefined connection state; and permit access to the security credentials stored on the secure storage when the second device is validated and the predefined connection state is maintained. | 2021-11-11 |
20210350014 | Encrypted Search over Encrypted Data with Reduced Volume Leakage - A method for performing encrypted search includes receiving a search query for a plurality of keywords from a user device that appear in one or more encrypted documents stored on an untrusted storage device. The method also includes accessing an encrypted search index to obtain a first list of document identifiers each representative of a document that includes a first keyword and a second keyword of the plurality of keywords. The method also includes, for each remaining keyword, determining a corresponding list of document identifiers each representative of a document that includes the first, second, and respective remaining keyword. The method includes determining, based on the first list of document identifiers and each corresponding list of document identifiers, a second list of document identifiers each representative of a document that includes each of the plurality of keywords. The method also includes returning the second list to the user device. | 2021-11-11 |
20210350015 | SECURE DATA REPLICATION IN DISTRIBUTED DATA STORAGE ENVIRONMENTS - A described method includes receiving, by a database system, an instruction to change a first data element in a table in a database, which includes a first copy and a second copy of the table. A first entry is created in a first change-table. The first entry includes an updated value for a first data element. A second entry is created in a second change-table. Creating the second entry includes, changing the updated value into a ciphertext if the first data element is secured, and storing the ciphertext into the second entry. If the first data element is non-secured, the updated value is stored into the second entry as is. The second copy of the table is modified using the second change-table. The second copy of the table is used to respond to subsequent queries. | 2021-11-11 |
20210350016 | CRYPTOGRAPHIC DATA ENCODING METHOD WITH ENHANCED DATA SECURITY - Data security and privacy are improved by a client providing a hashed version of collected data to a remote analysis service, and having the analysis service determine the relevancy of the data from the hashes before requesting the plaintext of the data. In one example, a browser plug-in obtains data which is divided into overlapping three-character sequences, and the sequences are hashed to produce a sequence of hashes. The sequence of hashes is sent by the plug-in to the remote service, which uses the hashes to determine if the associated data is relevant to the analysis performed by the remote service, without requiring access to the associated plaintext. After making the determination, the remote service may request that relevant data be provided to the service in plaintext form, while data that is not relevant need not be sent to the remote service. | 2021-11-11 |
20210350017 | ENCRYPTION SYSTEM - There is disclosed a processing device, comprising a mass storage interface for connecting to a host device; at least one processor; and computer program code executable by the at least one processor, wherein the computer program code, when executed by the at least one processor, causes the processing device: to receive at least one file from the host device via the mass storage interface; to receive a disconnection request via the mass storage interface; and in response to the disconnection request, to perform a processing task on each file. The processing device may be an encryption device, and the processing task may comprise performing an encryption or decryption operation on the at least one file. | 2021-11-11 |
20210350018 | SYSTEM, METHOD AND COMPUTER PRODUCT FOR FAST AND SECURE DATA SEARCHING - A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a user via the user interface and configured to perform user authentication, and a database layer in communication with and accessible by the web layer and comprising a database configured for storing data, and a search engine configured for searching the database, wherein, communication to and from the database layer from and to the web layer is controlled by secure socket layer certificate authorization. The database layer may also include an inverted index in communication with the database and the search engine and configured for maintaining updated snapshots relating to the data in the database and an encryption/decryption layer for selective encryption of the data and configurable for field level, document level, and/or chunk level encryption. | 2021-11-11 |
20210350019 | EVM-BASED TRANSACTION PROCESSING METHOD, DEVICE, PROGRAM AND MEDIUM - Provided are an Ethereum Virtual Machine-based transaction processing method and apparatus, a device, a program and a medium, which relate to the field of computer technologies and, in particular, to blockchain technologies. An implementation scheme includes: acquiring, by a virtual machine instance running in a blockchain node, a to-be-processed transaction request; generating, by the virtual machine instance, a data access request for target access data and transmitting the data access request to an interface module in a process of executing the to-be-processed transaction request; performing, by the interface module, instruction conversion according to the data access request to determine a blockchain access interface corresponding to a function of the data access request; and calling, by the interface module, the blockchain access interface for a data storage space of a blockchain to access the target access data and feeding back an access result to the virtual machine instance. | 2021-11-11 |
20210350020 | De-identified Identity Proofing Methods and Systems - Displaying on a first device a plurality of items in an electronic proofing guide of a corresponding plurality of documents available for identity proofing. The first device receives user input indicative of an item selected from among the plurality of items in the electronic proofing guide, corresponding to a document comprised in the plurality of documents available for identity proofing. In response to receipt of the selection, a selection of the document transmits to a second device paired with a signal comprising at least one of (a) reputation information to be disclosed and (b) a consent to disclosure of said reputation information. In response to receipt of the consent from the second device, an obfuscated version of the reputation information is transmitted to the first electronic device. A data-user electronic device displays the reputation information upon detecting an unlock condition to the obfuscated reputation information. | 2021-11-11 |
20210350021 | VERIFIABLE CONSENT FOR PRIVACY PROTECTION - Methods, systems, and apparatus, including a method for updating user consent in a verifiable manner. In some aspects, a method includes receiving, from a client device, a request including an attestation token. The attestation token includes a set of data that includes at least a user identifier that uniquely identifies a user of the client device, a token creation time that indicates a time at which the attestation token was created, user consent data specifying whether one or more entities that receive the attestation token are eligible to use data of the user, an action to be performed in response to the request. The attestation token also includes a digital signature of at least a portion of the set of data, including at least the user identifier and the token creation time. An integrity of the request is verified using the attestation token. | 2021-11-11 |
20210350022 | DATA PROCESSING SYSTEMS FOR CENTRAL CONSENT REPOSITORY AND RELATED METHODS - A data processing central consent repository system may be configured to, for example: (1) identify a form used to collect one or more pieces of personal data, (2) determine a data asset of a plurality of data assets of the organization where input data of the form is transmitted, (3) add the data asset to the third-party data repository with an electronic link to the form, (4) in response to a user submitting the form, create a unique subject identifier to submit to the third-party data repository and, along with the form data provided by the user in the form, to the data asset, (5) submit the unique subject identifier and the form data provided by the user to the third-party data repository and the data asset, and (6) digitally store the unique subject identifier and the form data in the third-party data repository and the data asset. | 2021-11-11 |
20210350023 | Machine Learning Systems and Methods for Predicting Personal Information Using File Metadata - Systems, methods and apparatuses are disclosed to efficiently and accurately scan a plurality of documents located in any number of unstructured data sources. Preprocessed metadata is generated for each document and metadata features are determined based on the preprocessed metadata. A trained machine learning system may utilize the metadata features to predict whether each of the documents contains personal information, without requiring any information relating to the content of such documents. | 2021-11-11 |
20210350024 | PROVIDING TRANSPARENCY IN PRIVATE-USER-DATA ACCESS - Examples described herein include systems and methods for providing privacy information to a user of a user device. An example method can include detecting, at a management server, access of the private data by an entity other than the user, such as an administrator who is authorized to access the management server. The method further includes generating an event reflecting the access of the private data. The generated event can be stored as part of an event log in a database. The method further includes providing the event to the user device for display to the user. The event displayed on the user device can include information such as an identity of the accessing entity, a description of the private data that was accessed, and when the access occurred. The user can select a displayed event at the user device and request further information on the event from an administrator. | 2021-11-11 |
20210350025 | METHOD AND SYSTEM FOR ANONYMIZING RAW SURGICAL PROCEDURE VIDEOS - This patent disclosure provides various verification techniques to ensure that anonymized surgical procedure videos are indeed free of any personally-identifiable information (PII). In a particular aspect, a process for verifying that an anonymized surgical procedure video is free of PII is disclosed. This process can begin by receiving a surgical video corresponding to a surgery. The process next removes personally-identifiable information (PII) from the surgical video to generate an anonymized surgical video. Next, the process selects a set of verification video segments from the anonymized surgical procedure video. The process subsequently determines whether each segment in the set of verification video segments is free of PII. If so, the process replaces the surgical video with the anonymized surgical video for storage. If not, the process performs additional PII removal steps on the anonymized surgical video to generate an updated anonymized surgical procedure video. | 2021-11-11 |
20210350026 | SYSTEMS AND METHODS FOR GENERATING AND PROCESSING SECURE SEARCH QUERIES - Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset. | 2021-11-11 |
20210350027 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND NON-TRANSITORY RECORDING MEDIUM - An information processing apparatus, an information processing method, and a non-transitory recording medium. The information processing apparatus creates in one or more memories, a partition in a verification target area for verifying integrity and authenticity and a partition in a non-verification target area for not verifying the integrity and authenticity, stores a compressed file and authentication data created from the compressed file in the partition in the verification target area of one or more memories, verifies a signature of the compressed file using the compressed file and the authentication data stored in the partition in the verification target area of the one or more memories, and based on a successful result of the signature verification, decompresses, and expands the compressed file to the partition in the non-verification target area of the one or more memories. | 2021-11-11 |
20210350028 | INTEGRITY OF COMMUNICATIONS BETWEEN BLOCKCHAIN NETWORKS AND EXTERNAL DATA SOURCES - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Embodiments include generating a request for data from a data source, the request including plaintext data and encrypted data, the encrypted data including access data and a hash of the plaintext data, transmitting the request to a relay system component external to the blockchain network, receiving a result from the relay system component that is digitally signed using a private key of the relay system component, and verifying an integrity of the result based on a public key of the relay system component and a digital signature of the result. | 2021-11-11 |
20210350029 | ELECTRONIC DEVICE - A electronic device including an integrated circuit, the integrated circuit comprising a secure element electronic circuit and an electronic radio communication circuit, the secure element having stored therein firmware program code configured to implement operating system functions, the operating system functions including a data receiving function and a data transmitting function, wherein the firmware program code is further configured to control the secure element to determine in the received data custom program code for a custom application, and to store the custom program code in the memory of the secure element, and to implement an application programming interface configured to receive from the custom application requests for called operating system functions, and to execute the called operating system functions for the custom application. | 2021-11-11 |
20210350030 | Data Protection in Computer Processors - Systems, apparatuses, and methods related to a computer system having a processor and a main memory storing scrambled data are described. The processor may have a cache, a register, an execution unit, and an unscrambler. The processor can load the scrambled data into the cache; and the unscrambler may convert the scrambled data into unscrambled data just in time for the register or the execution unit during instruction execution. The unscrambled data can be an instruction, an address, or an operand of an instruction. Unscrambling can be performed just before loading the data item in a scrambled form from the cache into the register in an unscrambled form, or after the data item leaves the register in the scrambled form as input to the execution unit in the unscrambled form. The unscrambled data and the scrambled data may have the same set of bits arranged in different orders. | 2021-11-11 |
20210350031 | METHOD AND DEVICE FOR MANAGING STORAGE SYSTEM - Implementations of the present disclosure relate to method and device for managing a storage system. The method comprises in response to receiving a write request at a storage system, determining whether storage units allocated to a logic storage unit of the storage system are sufficient for data associated with the write request. The method also comprises in response to determining that the allocated storage units are insufficient, allocating a new storage unit to the logic storage unit. The method further comprises updating metadata associated with allocation of the storage units of the storage system, the metadata indicating a mapping between the logic storage unit and the storage units. The method also comprises encrypting the updated metadata. Other implementations of the present disclosure also involve corresponding method, device and computer-readable medium for decryption metadata and recovering the logic storage unit using the decrypted metadata | 2021-11-11 |
20210350032 | PHYSICAL UNCLONABLE FUNCTION AT A MEMORY DEVICE - Various examples are directed to systems and methods for providing a digital fingerprint of a selected portion of a memory device to a host device. A host device executing at a host device may send a to a driver a command to produce digital fingerprint data. The command may include an output pointer indicating a memory location of the local memory. The driver may generate a modified command that does not include the output pointer. The driver may send the modified command to a memory device. The driver may receive a reply comprising the digital fingerprint data and write the digital fingerprint data to a location at the memory location of local memory of the host device indicated by the output pointer. | 2021-11-11 |
20210350033 | APPARATUS, METHOD, AND PROGRAM PRODUCT FOR SELECTIVELY OBSCURING DATA BEING DISPLAYED - Apparatus, methods, and program products for selectively obscuring data being displayed is disclosed. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine a security classification for data being displayed on a display and selectively obscure the data being displayed on the display based on the determined security classification for the data. Methods and computer program products that perform the operations and/or functions of the apparatus are also disclosed. | 2021-11-11 |
20210350034 | DEVICE DEACTIVATION BASED ON BEHAVIOR PATTERNS - Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption. | 2021-11-11 |
20210350035 | METHODS AND SYSTEMS FOR SELECTING INFLOW CONTROL DEVICE DESIGN SIMULATIONS BASED ON CASE SELECTION FACTOR DETERMINATIONS - A method relates to generating and selecting in-flow control device design simulations. The method includes generating, based on a synthetic production logging profile and properties of a reservoir associated with a target well, a first design simulation and a second design simulation, the first design simulation including representations of a first plurality of in-flow devices and the second design simulation including different representations of a second plurality of in-flow devices, locations of the representations of the first plurality of in-flow devices and different locations of the different representations of the second plurality of in-flow devices is based on density parameters and cross-sectional area parameters, generating, automatically and without user intervention, case selection factors associated with each of the first design simulation and the second design simulation, ranking, automatically and without user intervention, the case selection factors; and selecting based on the ranking, automatically and without user intervention, at least one of the first design simulation or the second design simulation. | 2021-11-11 |
20210350036 | COMPUTER AIDED GENERATIVE DESIGN WITH OVERALL THICKNESS CONTROL TO FACILITATE MANUFACTURING AND STRUCTURAL PERFORMANCE - Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using generative design processes, where the three dimensional (3D) models of the physical structures are produced in accordance with a design criterion that limits a minimum thickness of the generatively designed 3D models, include: obtaining a design space for an object to be manufactured and one or more design criteria including a thickness constraint; iteratively modifying a generatively designed 3D shape of the modeled object in the design space in accordance with the one or more design criteria, including measuring a current thickness for the 3D shape using an overall relationship of a volume of the 3D shape with respect to a surface area of the 3D shape; and providing the generatively designed model for use in manufacturing the physical structure using one or more computer-controlled manufacturing systems. | 2021-11-11 |
20210350037 | METHOD AND SYSTEM FOR DERIVING A DIGITAL REPRESENTATION OF AN UNFOLDED BLANK AND FOR COST ESTIMATION BASED UPON THE SAME - A computer-implemented method for creating a computer-aided design (CAD) corresponding to a 2-dimensional rendering of an unfolded blank configured for manipulation into a 3-dimensional shape. The method includes obtaining a first digital, non-CAD design file containing information relating to the unfolded blank geometry but lacking metadata that defines cut or crease lines separately from surrounding content, and deriving, with a computer processor, a digital representation of the unfolded blank geometry based upon the first digital non-CAD design file. The digital representation includes defined data corresponding to a shape having one or more defined cut and/or crease lines. A system for performing the method includes a computer processor and machine-readable media accessible by the computer processor comprising non-transitory, instructions readable by the computer processor for performing the method steps of defining the digital non-CAD design file and deriving the digital representation therefrom. | 2021-11-11 |
20210350038 | Systems and Methods for Rapidly Developing Annotated Computer Models of Structures - Systems and methods for rapidly developing annotated computer models of structures and properties is provided. The system generates three-dimensional (3D) models of structures and property using a wide variety of digital imagery, and/or can process existing 3D models created by other systems. The system processes the 3D models to automatically identify candidate objects within the 3D models that may be suitable for annotation, such as roof faces, chimneys, windows, gutters, etc., using computer vision techniques to automatically identify such objects. Once the candidate objects have been identified, the system automatically generates user interface screens which gather relevant information related to the candidate objects, so as to rapidly obtain, associate, and store annotation information related to the candidate objects. When all relevant annotation information has been gathered and associated with model objects, the system can create a list of materials that can be used for future purposes, such as repair and/or reconstruction of real-world structures and property. The system also allows for modeling of water damage of a structure, as well as generating lists of tasks for mitigating the water damage and associated costs. | 2021-11-11 |
20210350039 | Graphical Representation for Datasets - The invention provides a method of automatically generating models for a dataset, comprising the steps of storing coordinates for a first dataset in a database, storing status reports as a second dataset in the database corresponding to the first dataset, exporting a graphical representation of the first dataset to render a graphical visualization of the relationship between the first dataset and a second dataset using data values, plotting of individual coordinates of the first dataset onto the graphical visualization using the data values, displaying the second dataset onto the graphical visualization to provide a graphical view of data from the status reports in a corresponding location to the first dataset, saving the graphical view to the memory and displaying the graphical view on a monitor. | 2021-11-11 |
20210350040 | METHOD OF PHYSICAL MODE EXTRACTION FOR ENGINEERING STRUCTURE FLEXIBILITY IDENTIFICATION - The present invention belongs to the technical field of data analysis for structural testing, and relates to a method of the physical mode exaction for flexibility identification of engineering structures. In the present invention combined deterministic-stochastic subspace identification algorithm is first adopted to calculate basic modal parameters and modal scaling factors from state-space models of different orders. Subsequently, the relative scaling factor difference is added as a new modal indicator to the classic stabilization diagram to better clean out the stabilization diagram. And check the correctness of the selection of the stable axis using single-modal frequency-domain similarity index (SFSI) between single-order FRF and measured FRF. Then, further determine the physical modes from the modes in the stable axis using multi-modal frequency-domain similarity index (MFSI) between lower-order superposition FRF and measured FRF. Finally, calculate flexibility matrix using identified modal parameters and predict the displacement of the structure under static load. | 2021-11-11 |
20210350041 | PARAMETRIC PROCESS FOR DESIGNING AND PRICING A PHOTOVOLTAIC CANOPY STRUCTURE WITH EVOLUTIONARY OPTIMIZATION - Systems and methods for automating design of photovoltaic installations for placement on a selected site receive geographical information describing the site that includes areas of the site which must be spanned by support structures carrying photovoltaic panels such as canals, trenches, roads, arenas, and other features. An initial structure design which meets supplied requirements for energy production and as well as economic constraints is produced using elements produced by varying characteristics of predefined template structures. Genetic optimization of the initial design is performed to optimize dimensions of the structural elements and structural material choices to produce a structure that optimizes a fitness metric such as the levelized cost of energy. | 2021-11-11 |
20210350042 | DESIGN PLATFORM FOR ARCHITECTURAL MODULARITY IN MULTIFAMILY RESIDENTIAL DESIGN AND CONSTRUCTION - A design platform for multifamily residential building design and construction is provided that may include a series of standardized and pre-coordinated nested design frameworks for each of several different scales within a building that may be efficiently adapted to a range of different sites, building programs, and municipal regulations to improve design efficiency and quality control in site-adapted designs, and that may allow for increased incorporation of off-site fabrication and other higher efficiency construction techniques. | 2021-11-11 |
20210350043 | METHODS AND APPARATUS FOR PROCEDURE TRACKING - Methods and apparatus for improving the provision of a procedure based upon automated determination of a location of agents and equipment during a procedure and quantifying conditions in an environment via automated sensors. The present invention provides apparatus and methods for wireless designation of a position of health care providers and equipment relative to each other based upon wireless communications amongst multiple wireless transceivers combined with ongoing monitoring of conditions present in a facility. The transceivers may be portions of nodes and nodes may form self-verifying arrays. A user interface may provide a augmented reality view of positions of all or some the providers and equipment and condition quantifying sensors. | 2021-11-11 |
20210350044 | Rough Surface Model for Shooting and Bouncing Rays - A method is disclosed for augmenting the SBR model used in EM field simulation by modeling the specular coherent and diffuse incoherent components of the field scattered by rough surfaces using statistical characteristics of surface roughness. For each projected ray-tube footprint, the magnitude of the coherent radiated field is attenuated with a scalar factor, while the incoherent radiated field is modulated by a random magnitude and phase. Both corrections are based on the statistical characteristics of surface roughness. Multiplying the incoherent field with a randomly generated phase renders it in a mathematically coherent form, which allows the method to generate a statistically viable instance of the total (i.e. coherent plus incoherent) field scattered by a rough surface. The results reproduce the field and power statistics (i.e. mean and variance) observed from direct SBR simulations using an ensemble of explicitly rendered rough surface geometry models, with a significant reduction in computation. | 2021-11-11 |