47th week of 2021 patent applcation highlights part 48 |
Patent application number | Title | Published |
20210365552 | CORE SHELL LIQUID METAL ENCAPSULATES COMPRISING MULTI-FUNCTIONAL LIGANDS AND NETWORKS COMPRISING SAME - The present invention relates to core shell liquid metal encapsulates comprising multi-functional ligands, networks comprising such encapsulates and processes of making and using such encapsulates and networks. When subjected to strain, such network's conductivity is enhanced, thus allowing the network to serve as a healing agent that restores at least a portion of the conductivity in an adjacent conductor. | 2021-11-25 |
20210365553 | CONTROL DEVICE AND CONTROL METHOD - To provide a control device capable of minimizing side-channel leaks that can be generated before completion of an analog-to-digital conversion by a PUF implemented as a physical parameter and making attacks difficult. The control device provided includes a device unit that has regularly arranged analog devices such as pixel array, and a readout control unit that executes readouts that are a mixture of a real PUF readout (first readout) that generates unique information for the device unit and a dummy PUF readout (second readout) that does not generate unique information for the device. | 2021-11-25 |
20210365554 | SECURING COMPUTING SYSTEMS AGAINST MICROARCHITECTURAL REPLAY ATTACKS - A system and method for mitigating micro-architectural replay attacks in a processing system by delaying speculative execution on the processing system of a set of processor instructions upon detection that the set of processor instructions are part of a micro-architectural replay attack by detecting repeating speculative execution of the set of processor instructions interleaved with misspeculation and squashing of the set of processor instructions. | 2021-11-25 |
20210365555 | A METHOD AND SYSTEM FOR DETECTING AND PREVENTING ISSUES IN SMART CONTRACTS BASED ON HISTORICAL BEHAVIOR ANALYSIS - The present invention relates to a system and a method which receives as an input transactions and a smart contract code, and provides as an output an analysis of possible issues such as possible security attacks or bugs found in the smart contract code that may exist in the smart contract code that was input to the blockchain-based system. More specifically, the present invention relates to the way data is stored in decentralized systems such as blockchain-based systems, to identify base paths and then alters the base paths looking for an attack, in a guided way. | 2021-11-25 |
20210365556 | AUTOMATED MALWARE MONITORING AND DATA EXTRACTION - A malware monitoring method includes: obtaining a malware sample; extracting operational parameters corresponding to the malware sample; configuring an emulator application corresponding to the malware sample using the operational parameters; executing a plurality of instances of the configured emulator application; collecting output data from each of the plurality of instances; and generating indicators of compromise (IOCs) based on the collected output data. | 2021-11-25 |
20210365557 | POLICY BASED ACCESS CONTROL OF SUBSYSTEM ASSETS VIA EXTERNAL DEBUG INTERFACE - A method for external access control to protect system-on-chip (SoC) subsystems and stored subsystem assets is described. The method includes sensing, during a cold boot of an SoC hardware system, a debug fuse vector for access to SoC subsystems of an SoC owner and/or third-party subsystems of an SoC hardware architecture. The method also includes disabling access to each SoC subsystem with a blown fuse in the debug fuse vector. The method further includes re-enabling, by a secure root of trust, access to an SoC subsystem and/or a third-party subsystem for an external debugger when authentication of one or more debug certificates of a third-party owner of the external debugger is successful. | 2021-11-25 |
20210365558 | SYSTEM AND METHOD FOR FIRMWARE IMAGE INTEGRITY VERIFICATION - An information handling system stores a hash values for firmware components for the information handling system. A processor receives an off-host image verification request from a second information handling system. In response to the off-host image verification request, the processor reads first metadata for a next firmware component, provides the first metadata to the second information handling system, and receives a golden hash value from the second information handling system. In response to the first hash value not matching the golden hash value, the processor applies a mitigation policy. In response to the first hash value matching the golden hash value, the processor provides a device verification signal. | 2021-11-25 |
20210365559 | SEAMLESS SYSTEM MANAGEMENT MODE CODE INJECTION - Methods and apparatus for seamless system management mode (SMM) code injection. A code injection listener is installed in BIOS during booting of the computer system or platform. During operating system (OS) runtime operation a secure execution mode code injection image comprising injected code is received and delivered to the BIOS. The processor execution mode is switched to a secure execution mode such as SMM, and while in the secure execution mode the injected code is accessed and executed on the processor to effect one or more changes such as patching processor microcode, a profile or policy reconfiguration, and a security fix. The solution enables platform changes to be effected during OS runtime without having to reboot the system. | 2021-11-25 |
20210365560 | METHOD, APPARATUS AND DEVICE FOR SHARING PASSWORD BETWEEN BIOS AND OPERATING SYSTEM - A method, an apparatus and a device for sharing a password between a BIOS and an operating system are provided, which are applied to a Legacy boot mode. In the method, a user is prompted to input a password of the BIOS. The password inputted by the logon user is received and verified. The verified password is stored in a predetermined target memory and E820H information is created if the received password is verified as correct, where address data in the E820H information points to an address of the target memory. The address of the target memory is determined based on the created E820H information and memory contents are obtained if a password is set for the operating system. The logon user is permitted to log on the operating system if the acquired memory contents are verified as correct. | 2021-11-25 |
20210365561 | OVERRIDING SUB-SYSTEM IDENTIFIERS WITH PROTECTED VARIABLE VALUES - In one example in accordance with the present disclosure, a computing device is described. The computing device includes a printed circuit assembly and a basic input/output system (BIOS) coupled to the printed circuit assembly. The BIOS includes a subsystem identifier (SSID). The computing device also includes a non-volatile memory device which includes an override flag to indicate whether an override of the SSID is enabled and a protected variable value to, when enabled, override the SSID in the BIOS. | 2021-11-25 |
20210365562 | EMBEDDED REMOVABLE BOOT DRIVE - A system including an embedded removable-boot-drive plug-in device and an embedded removable-boot-drive host device is disclosed. Additionally, a method of using the embedded-removable-boot-drive system is disclosed. The system and method provide security to, and accessibility of, stored data and/or boot-drive devices. | 2021-11-25 |
20210365563 | SPLIT CHAIN OF TRUST FOR SECURE DEVICE BOOT - The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame. | 2021-11-25 |
20210365564 | TECHNIQUES FOR MONITORING COMPUTING INFRASTRUCTURE - A technique for monitoring a computing infrastructure having one or more target devices includes receiving, from a plurality of evaluation services, evaluation results of one or more target devices. The technique further includes extracting, using a different data collector for each of the plurality of evaluation services, data from each of the evaluation results. The technique further includes converting the extracted data to a common format, determining whether an issue or a vulnerability is present in the one or more target devices based on the extracted and converted data, and reporting the issue or the vulnerability. | 2021-11-25 |
20210365565 | METHOD AND APPARATUS FOR DETECTING VULNERABILITY OF MULTI-LANGUAGE PROGRAM - A method for detecting vulnerability according to an embodiment includes performing taint analysis on a front-end source code generated with a first programming language of a program composed of the front-end source code and a back-end source code generated with a second programming language, generating a back-end call table including input parameter taint information for a called function called by the front-end source code among one or more back-end functions included in the back-end source code, based on a result of the taint analysis on the front-end source code, and performing taint analysis on the back-end source code based on the back-end call table. | 2021-11-25 |
20210365566 | METHODS AND DEVICES FOR SECURE SECRET KEY GENERATION - There is provided a cryptographic key determination device for determining one or more cryptographic keys in a cryptographic device, the cryptographic device being configured to execute one or more test programs, the cryptographic device comprising one or more components ( | 2021-11-25 |
20210365567 | DEVICE AND METHOD FOR REPAIRING SECURITY VULNERABILITY OF COMPUTER APPLICATION SOFTWARE - Disclosed is a device for repairing a security vulnerability of computer application software, including vulnerability repairing software, computer application software and computer system software, where the vulnerability repairing software includes a main control module, a software vulnerability repairing module, a system virus repairing module, a system virus scanning module, a software vulnerability definition central database and a system virus definition central database; the main control module sends a notification to the software vulnerability scanning module and the system virus scanning module, respectively; the software vulnerability scanning module scans the computer application software for a security vulnerability, and the software vulnerability repairing module sends a repair command according to a comparison result; and the system virus scanning module scans the computer system software for a system virus, and the system virus repairing module sends a virus-killing command according to a comparison result. | 2021-11-25 |
20210365568 | PRIVACY PRESERVING APPROACH TO PEAK LOAD MANAGEMENT - The present exemplary embodiments relate to a privacy preserving approach to peak load management. It finds example application in conjunction with, for example, power systems, such as smart homes, smart buildings, microgrids, distribution systems and bulk systems, and energy management systems. | 2021-11-25 |
20210365569 | METHOD AND COMPUTER PROGRAM PRODUCT AND APPARATUS FOR ENCRYPTING AND DECRYPTING PHYSICAL-ADDRESS INFORMATION - The invention relates to a method, a non-transitory computer program product, and an apparatus for encrypting and decrypting physical-address information. The method includes: receiving a first read command requesting of the flash controller for first physical block addresses (PBAs) corresponding to a logical block address (LBA) range from a host side, wherein each first PBA indicates which physical address that user data of a first LBA of the LBA range is physically stored in a flash device; reading the first PBAs corresponding to the LBA range from the flash device; arranging the first PBAs into entries; encrypting content of each entry by using an encryption algorithm with an encryption parameter to obtain an encrypted entry; and delivering the encrypted entries to the host side. | 2021-11-25 |
20210365570 | ZERO TRUST COMMUNICATION SYSTEM FOR FREIGHT SHIPPING ORGANIZATIONS, AND METHODS OF USE - Presented herein are systems and methods of securely sharing data from multiple sources with different client terminals. A server may establish an electronic document for defining a transaction. The electronic document may have data fields. Each data field may be from a client terminal. The server may identify encryption keys to encrypt the corresponding data fields included in the electronic document. The server may distribute the encryption keys across the client terminals in accordance with an access control policy. The access control policy may specify access permissions for a client terminal to each of the plurality of data fields based on a role of the client terminal in the transaction. The server may provide, to each client terminal with access to the data fields in the electronic document via the encryption keys distributed in accordance with the access control policy. | 2021-11-25 |
20210365571 | PARTIAL POLICY EVALUATION - Some embodiments provide a method for evaluating a policy for authorizing an API (Application Programming Interface) call to an application. Based on a first set of parameters available before receiving the API call, the method evaluates only a portion of the policy to produce a partially evaluated policy. The method stores the partially evaluated policy in a cache. The method then receives an API call to authorize, and determines whether the API call should be authorized by fully evaluating the policy, using the partially evaluated policy retrieved from the cache first storage, and a second set of parameters associated with the API call. The method responds to the API call with a policy decision based on the fully evaluated authorization policy. | 2021-11-25 |
20210365572 | SYSTEMS AND METHODS FOR INTEGRATING HTML BASED APPLICATION WITH EMBEDDED BROWSER - Embodiments described include systems and methods for using an HTML-based application integrated with an embedded browser on a client device, for trusted data transfer for instance. An HTML-based application within an embedded browser of a client device can provide access to a network application and its resources. The HTML-based application can establish a secure session for the network application between a server and the HTML-based application. The embedded browser can determine that the HTML-based application is a trusted application via application of one or more policies. With the secure session established and responsive to determining that the HTML-based application is a trusted application, the embedded browser may establish at least one virtual channel between the embedded browser and the HTML-based application. Using the at least one virtual channels, the embedded browser can transfer data between the secure session of the network application and the operating system (OS) of the client device. The operating system of the client device may include a file system, a clip board, and/or input and output (I/O) devices. | 2021-11-25 |
20210365573 | Methods and Systems for Creating, Verifying, and Entering Security Information - A system for securely producing and using high-entropy security information, such as a password. The system includes a printer, a display device, and a generator computer that is connected to the printer and the display device. The generator computer generates the high-entropy set of characters, (e.g., password), and also generates a machine-readable representation of the high-entropy set of characters, (e.g., a barcode). The generator computer causes the printer to print the high-entropy set of characters and the machine-readable representation on paper, and then deletes the high-entropy set of characters and the machine-readable representation from the system. The high-entropy set of characters, (e.g., password), may be entered into a target computer by scanning the barcode on the paper using a barcode scanner connected to the target computer, which is significantly faster than, and eliminates the human error associated with, typing in a high-entropy set of characters. | 2021-11-25 |
20210365574 | Method and System for Data Valuation and Secure Commercial Monetization Platform - A system, method, and platform for monetizing data. A selection is received from a user to monetize a data object associated with the user. Data associated with the data object is compiled. A security token is generated referencing the data. The data object is monetized utilizing the security token in accordance with the selection. | 2021-11-25 |
20210365575 | SYSTEMS AND METHODS FOR PRODUCING, DISPLAYING, AND INTERACTING WITH COLLABORATIVE ENVIRONMENTS USING CLASSIFICATION-BASED ACCESS CONTROL - Systems and methods are provided for sharing maps in a collaborative environment using classification-based access control. The generation of and dissemination of maps and/or data within such maps can be governed by classification-based access control, where a user's classification level can determine whether or not maps and/or data within those maps can be seen. In scenarios whether a plurality of users wishes to collaborate on the same map, the systems and methods provided herein generate multiple versions or views of the same map in accordance with different classification levels. In this way, users with different classification levels can nevertheless see the same map and engage in collaborations regarding the same map, while maintaining control of sensitive data. | 2021-11-25 |
20210365576 | MULTISTAGE DATABASE SECURITY - A data storage system secures information by storing records in a long term storage database to which only the data storage system can access and moving them into a working database where access requestors can work with them. As such, only records in the working database may be exposed. Further, unauthorized people attempting to gain access may only discover accesses going to the working database and may be less likely to discover and attempt to access the long term storage database. The records may be individually encrypted and/or otherwise controlled to require individual authorization prior to decryption and/or copying to the working database. As such, access requestors may be unable to request records to be moved absent involvement of the appropriate authorizer or authorization provider. Additionally, this may allow separate tracking, trend analysis, and alarms based on profiles of typical access for each of the databases. | 2021-11-25 |
20210365577 | APPLICATION-PROVISIONING FRAMEWORK FOR DATABASE PLATFORMS - In an embodiment, an application-provisioning framework of a database platform receives a provisioning request from a requesting entity, requesting provisioning of an application for a customer account of the database platform. In response to receiving the provisioning request, the application-provisioning framework retrieves, from data storage, an application-provisioning blueprint document that lists one or more database objects. The application-provisioning framework provisions, according to the retrieved application-provisioning blueprint document, the one or more listed database objects in a database associated in the database platform with the customer account. | 2021-11-25 |
20210365578 | SYSTEMS AND METHODS FOR DYNAMIC QUEUE CONTROL USING MACHINE LEARNING TECHNIQUES - Certain embodiments of the present disclosure relate to systems and methods that control access to system resources, such as interfaces, access rights to events, query systems, and other suitable system resources. Further, certain embodiments of the present disclosure relate to a collision detection technique that is implemented to control which and/or a number of queue positions within a queue that are processed. In some implementations, a collision may be detected when two or more users request the same access right within a defined time period. | 2021-11-25 |
20210365579 | PROVIDING WEB APPLICATION COMPONENTS WITHIN REMOTE SYSTEMS - Disclosed are examples of systems, apparatus, methods and computer program products for providing components for building web applications within remote systems. A component database for web application components and an application database for web applications can be maintained in a multi-tenant database system. A first request can be processed to provide a web application for use at a remote site associated with a developer. Authorization of the remote site by the multi-tenant database can be determined based on a list of allowed remote sites for web applications. Data associated with the web application can then be sent to the remote site. A second request can be processed to provide a component for use at the remote site, indicating a component location of the remote site. Data associated with the first component can then be sent to the remote site. The data can be capable of causing an instance of the first component to be included at the component location of the remote site. | 2021-11-25 |
20210365580 | CALCULATING DIFFERENTIALLY PRIVATE QUERIES USING LOCAL SENSITIVITY ON TIME VARIANT DATABASES - Systems, methods, and manufactures for enhancing the determination of differential privacy query results. A computer implemented method for enhancing the determination of differential privacy query results is provided. The computer implemented method includes obtaining a first query of a database, determining a query result by executing the first query on the database, determining a noisy result by adding noise to the query result, wherein the noise is determined based on a first statistical evaluation of the first query, determining a first hash value identifying the first query based on one or more of the first statistical evaluation and a second statistical evaluation of the first query, maintaining the noisy result linked to the first hash value in a result cache, and returning the noisy result from the result cache in response to a subsequent query when a second hash value identifying the subsequent query is determined to be statistically similar to the first hash value. | 2021-11-25 |
20210365581 | DATA SECURITY - A computer system is configured to receiving a data set from a data provider and automatically save the data set in a quarantine database where copying, moving, and sharing of the data set are restricted until the data set is released by a data provider. The data set is parsed to find and mark portions with potentially sensitive information. At least those parts are reviewed by a data governor, who can confirm, add, edit, or remove markers. Those parts can be visually indicated to the data governor, along with a preview of, metadata about, and analysis of the data set. After reviewing at least the automatically marked portions, the data governor can release the data set to a non-quarantine database where another user can use the data set. The user is restricted from accessing the quarantine database. | 2021-11-25 |
20210365582 | Method for Protecting Privacy of Shared Video Files - A method for protecting privacy of shared video files that is performed by processing devices running on mobile devices of a first user and a second user and a remote server that enables the users to create a virtual group with a shared dialog box, to store solely on the remote server files of video films that the first user shoots by his mobile device, to display on the shared dialog box links to these files, to enable the second user to select for viewing these links, to stream and playing the video films on the screen of the mobile device of the second user, to prevent the ability of the mobile device to make a screenshot when playing the videos, to prevent abilities of the mobile device of the second user to save, to share or to forward these files. | 2021-11-25 |
20210365583 | METHOD AND SYSTEM FOR MANAGING ACCESS TO ENTITY IDENTITY DATA - A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party. | 2021-11-25 |
20210365584 | PORTABLE REPUTATION BROKERING USING LINKED BLOCKCHAINS AND SHARED EVENTS - Described herein are a system and techniques for enabling access control utilizing one or more blockchains associated with a user. A blockchain provider can manage one or more blockchains specifically associated with a an entity, where each blockchain may be associated with a differing sensitivity level. The entity may be a person or a machine such as an IOT (Internet of Things) device. The blockchain provider can manage access control policies associated with each blockchain such that access to the data of the blockchain may be allowed or restricted to requesting entities according to those access control policies. | 2021-11-25 |
20210365585 | PRIVACY-PRESERVING CONTACT TRACING - Techniques for privacy-preserving contact tracing are disclosed, including: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; and transmitting, by the first user device, publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry. | 2021-11-25 |
20210365586 | DATA MASKING IN A MICROSERVICE ARCHITECTURE - A method includes receiving an object from a client as part of a data ingestion process, directing the object to an object access microservice, providing a copy of the object to a masker worker microservice, masking the copy of the object to create a masked object, and the masking of the copy of the object is performed inline prior to storage of the object, deduplicating the object, and storing the masked object and the object in storage. | 2021-11-25 |
20210365587 | DATA MASKING IN A MICROSERVICE ARCHITECTURE - A method includes receiving an object from a client as part of a data ingestion process, by a masker worker, generating a list that identifies one or more byte ranges, of the object, to be masked, providing the list to an object access microservice, by the object access microservice, creating an object recipe of the object, and the object recipe includes one or more slices, and each of the slices includes one or more segments of data, masking only those segments of a slice that are in a byte range identified in the list, creating a masked slice that comprises the masked segments, and creating a masked object recipe that contains a reference to the masked slice, and the masking is performed before the object is stored in storage, creating a masked object that includes the masked slice, and deduplicating the masked object. | 2021-11-25 |
20210365588 | DATA MASKING IN A MICROSERVICE ARCHITECTURE - A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object. | 2021-11-25 |
20210365589 | SENSITIVE INFORMATION OBFUSCATION DURING SCREEN SHARE - Techniques are disclosed for protection of sensitive information on a computing device based on a security state of the environment in which the computing device is operating. An example methodology implementing the techniques includes determining that an application having screen share capability is running on a computing device and determining a security state of an environment of the computing device. The method also includes, responsive to a determination that the security state is unsecure, obfuscating sensitive information included in a notification displayed within an application window being displayed by the computing device. | 2021-11-25 |
20210365590 | Systems and Methods for Random Fill Caching and Prefetching for Secure Cache Memories - Systems and methods for random fill caching and prefetching for secure cache memories are provided. The system dynamically de-correlates fetching a cache line to the processor from filling the cache with this cache line, due to a demand memory access, in order to provide greater security from information leakage due to cache side-channel attacks on cache memories. The system includes a random fill engine which includes a random number generator and an adjustable random fill window. Also provided is an adaptive random fill caching system which dynamically adapts the random fill window to a wide variety of computational workloads. Systems and methods for cache prefetching to improve system performance using adaptive random fill prefetching and random fill prefetching are also provided. | 2021-11-25 |
20210365591 | SECURE DEBUG OF FPGA DESIGN - Technologies to perform a secure debug of a FPGA are described. In some examples an apparatus comprises an accelerator device comprising processing circuitry to facilitate acceleration of a processing workload executable on a remote processing device, a computer-readable memory to store logic operations executable on the accelerator device, and a debug module. The debug module comprises one or more debug registers to store debug data for the logic operations executable on the accelerator device and processing circuitry to receive, from a debug application on the remote processing device, a memory access request directed to a target debug register of the one or more debug registers, encrypt the debug data in the target debug register to generate encrypted debug data, and return the encrypted debug data to the debug application. Other embodiments are described and claimed. | 2021-11-25 |
20210365592 | CONFIGURABLE HARDWARE DEVICE - A configurable hardware device comprises a configuration memory of a known total size, and a configurable fabric arranged for being configured according to information from the configuration memory and segmented in a static partition and at least one dynamic partition. A static partition is arranged for receiving a bit stream and a cryptographic nonce and comprises a read/write mechanism for interacting with the configuration memory. The received bit stream is stored in the configuration memory and used to configure an intended application in the dynamic partition. The static partition is arranged for computing, based on the cryptographic nonce, a checksum of the entire configuration memory and for outputting the checksum. | 2021-11-25 |
20210365593 | SYSTEMS AND METHODS FOR USE IN SEGREGATING DATA BLOCKS TO DISTRIBUTED STORAGE - Systems and methods are provided for storing data blocks in distributed storage. One example computer-implemented method includes, in response to receipt of a data block comprising data, generating a value N for the data block, wherein the value N includes a variable integer greater than one and dividing the data block into N segments, wherein each segment includes a portion of the data. The method also includes generating a value M for the data block, wherein the value M includes a variable integer greater than or equal to one, and adding M segments of chaff to the N segments. The method then includes encrypting the N segments and the M segments of chaff and distributing the M segments and the N segments in distributed storage, wherein the N segments and the M segments of chaff are stored in multiple different storage devices included in the distributed storage. | 2021-11-25 |
20210365594 | Cryptographic Data Storage - The present application concerns a method and a system of storing one or more service data items. To store and share in particular confidential data, the one or more service data items are partitioned into one or more data stores. The one or more data stores are stored. Metadata of the one or more data stores is generated and the metadata is stored in a metadata database. | 2021-11-25 |
20210365595 | LOCKING DEVICES WITH AUTHENTICATION - An example locking device includes a body to interface with a receptacle of a host computing device. An electromechanical locking mechanism is disposed in the body. The electromechanical locking mechanism engages the receptacle to secure the body in the receptacle. A processor is disposed in the body. The processor is electrically connected to the electromechanical locking mechanism to actuate the electromechanical locking mechanism. The processor receives a request to actuate the electromechanical locking mechanism and, in response to the request, perform an authentication on the request. The processor actuates the electromechanical locking mechanism in response to a successful authentication. | 2021-11-25 |
20210365596 | AUTOMATED SYSTEM FOR GENERATING APPROXIMATE SAFETY CONDITIONS FOR MONITORING AND VERIFICATION - Described is a system and method for generating safety conditions for a cyber-physical system with state space S, action space A and trajectory data labelled as either safe or unsafe. In operation, the system receives inputs and ten minimizes loss functions to cause a neural network to become a barrier function. Based on the barrier function, the system can then determine if the cyber-physical system is entering an usafe state, such that if the cyber-physical system is entering the usafe state, then the cyber-physical system is caused to initiate a maneuver to position the cyber-physical system into a safe state. | 2021-11-25 |
20210365597 | ARITHMETIC APPARATUS, ARITHMETIC METHOD, AND STORAGE MEDIUM - An arithmetic apparatus according to the present embodiment sets setting values with respect to two among a light guide distance of a light guide body, an input light amount to a light incident surface and an output light amount on a light-emitting surface, and calculates remaining one value among the light guide distance, the input light amount and the output light amount by applying the set setting values to a calculation equation indicative of a balance of a light amount of light that is guided by a unit distance in the light guide body. | 2021-11-25 |
20210365598 | Method and Apparatus for Providing Pre-Manufacturing Feedback on the Design of an Object To Be Formed through Solidification of a Fluid in a Mold - A computer-implemented method, computer program, system and apparatus for computing a thermal thickness and providing pre-manufacturing feedback on a design of a three-dimensional physical object that is to be formed by solidification of a fluid in a mold. An equation is solved, representing heat release through the cavity-mold interface when the object is formed. The thermal thickness and its uniformity provide insight in the manufacturability of the object, and may be used to automatically generate pre-manufacturing feedback. The thermal thickness and pre-manufacturing feedback are transmitted or displayed to a user. | 2021-11-25 |
20210365599 | INTELLIGENT DESIGN PLATFORM USING DIGITAL ASSISTANTS FOR DESIGN PROCESS SUPPORT - Implementations for receiving, by the design assistant, an initial set of requirements, each requirement in the initial set of requirements being manually provided by a user, providing, by the design assistant and using a knowledge graph, a first set of questions based on the initial set of requirements and content determined from at least one design document in a set of design documents, filtering, by the design assistant, one or more questions from the first set of questions to provide a second set of questions, providing, by the design assistant, at least a portion of the second set of questions as output to the user to elicit one or more responses from the user, and editing, by the design assistant, the initial set of requirements based on the one or more responses to provide a set of requirements, the set of requirements for the to-be-designed product. | 2021-11-25 |
20210365600 | STRUCTURAL ANALYTICAL MODEL APPARATUS AND METHOD - A data processing system, comprising an architectural building model conversion apparatus operating on a first processor and implementing one or more algorithms that cause the processor to receive an architectural building model and to generate a structural engineering model and a plurality of user control interfaces, each operating on one of a plurality of second processors and implementing one or more algorithms that allow a user to control conversion of one or more architectural model elements to one or more corresponding structural engineering model elements. | 2021-11-25 |
20210365601 | SYSTEM AND METHOD FOR CLINICAL LABORATORY LAYOUT DESIGN - A method for solving the facility layout problem using a heuristic approach allows for multiple, highly efficient solutions to be automatically generated even when dealing with medium and large scale environments. Inputs to the method include a number of facilities each having a discipline and a dimension that must be placed in a laboratory area having a dimension and an entrance. The method sorts and begins to place facilities to generate a number of partial solutions, and each partial solution can be expanded until a final solution is reached or a termination criteria is satisfied. Expanded solutions that reach a final solution are reduced to a diverse set of solutions using a diversity measure. The reduced set of diverse solutions may then be improved upon using an optimization algorithm with less concern about efficiency. | 2021-11-25 |
20210365602 | DYNAMIC GENERATION AND MODIFICATION OF A DESIGN MODEL OF A BUILDING FOR A CONSTRUCTION PROJECT - The present disclosure provides systems, methods, and computer-readable storage devices for automatic generation of a design model of a building. To illustrate, a computing device may generate a design model, such as a three-dimensional model of a building, based on criteria and layout information. The design model may indicate a layout of one or more rooms (or other spaces), locations of one or more hallways, doors, windows, furniture, fixtures, or a combination thereof, within the building. The computing device may perform a load analysis based on the design model and enable selection of equipment to be included in the building based on the load analysis. Virtual models of the equipment, and connections between the equipment, may be automatically added to the design model by the computing device, thereby reducing user input and cost, and improving speed, associated with the building design process. | 2021-11-25 |
20210365603 | ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR INTERIOR FURNISHING - Systems and methods for generating a furnishing plan for a property are disclosed. An exemplary system includes a communication interface configured to receive a floor plan of the property, at least one candidate furnishing item to be placed in the property and attributes of the candidate furnishing item, and a first neural network model. The system further includes at least one processor configured to generate a mask based on the floor plan of the property and the attributes of the candidate furnishing item and generate proposals for placing the candidate furnishing item in the property based on the mask and the attributes of the candidate furnishing item. The at least one processor is further configured to determine a probability for each proposal using the first neural network model. The first neural network model is trained with a position query algorithm; select one or more proposals having the highest probabilities. The at least one processor is also configured to generate the furnishing plan for the property based on the one or more proposals. | 2021-11-25 |
20210365604 | TRACKING CAD OBJECTS - A plugin can allow for tracking objects within a computer-aided design (“CAD”) application. In one example, the user can select an object or family of objects to track. The plugin can set a parameter of the tracker to match that of the selected object(s). The tracker can be joined to the selected object to form a new assembly, such as by embedding the tracker within the object. A user can define areas, such as rooms or floors, within the layout. The plugin can poll the trackers, which report which areas the corresponding object is within. The plugin can compile this information and display quantities of object types per area. | 2021-11-25 |
20210365605 | OPTIMIZATION DEVICE, OPTIMIZATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING OPTIMIZATION PROGRAM - An optimization method includes: identifying, for each of a plurality of replicas each of which has a plurality of state variables, an amount of change in strength of interaction that corresponds to a change in a distance between the replica and another replica in a state space in a case where a value of a first state variable among the plurality of state variables of the replica is updated, the state space indicating a space which a combination of values of the plurality of state variables is able to take; and determining whether or not to update the value of the first state variable, based on a proposal probability that corresponds to the amount of change in the strength of interaction in the case where the value of the first state variable is updated and based on an acceptance probability that corresponds to a target probability distribution. | 2021-11-25 |
20210365606 | QUANTUM COMPUTING METHOD FOR EXPRESSWAY TRAFFIC FLOW DISTRIBUTION SIMULATION CONSIDERING DESTINATION SELECTION - The present invention discloses a quantum computing method for expressway traffic flow distribution simulation considering destination selection. The method comprises the following steps. (1) Construct an expressway exit and entrance network structure. (2) Use a complex number to represent direction-and-flow superposition states of vehicles. (3) Construct a model and setting parameters. (4) Simulate a quantum random walk. (5) Perform model check and time-space matching. and (6) Fit and compare the quantum random walk with real flow data. The present invention can simulate the characteristics of quasi-periodic oscillation and irregularity in expressway traffic flow, closely integrate traffic observation data and reveal the deep characteristics of traffic behavior from a new perspective, thus increasing the accuracy and efficiency of expressway traffic flow simulation. | 2021-11-25 |
20210365607 | PHOTOVOLTAIC AND OPTOELECTRONIC DEVICES BASED ON PHOTON CONFINEMENT EFFECT - A photon confinement theoretical model is proposed, and a solar cell structure model is designed based on the theoretical model, thereby providing a photonically-confined solar cell and optoelectronic device to effectively reduce the probability of photons escaping from the cell. The theoretical model is established by the following steps: obtaining a relationship between a photocurrent density and an incident photon energy; obtaining a relationship between a radiative recombination photocurrent density and the incident photon energy; determining a relationship between the radiative recombination photocurrent density and a total recombination photocurrent density; obtaining a relationship between the photocurrent density generated by the standard spectral irradiance, the total recombination photocurrent density and an external current density of the solar cell; obtaining an output open-circuit voltage of the cell; obtaining an output short-circuit current density of the cell; obtaining a fill factor (FF); and obtaining a maximum power conversion efficiency (PCE). | 2021-11-25 |
20210365608 | DISTINCT ELEMENT ROCK BLASTING MOVEMENT METHODS, APPARATUSES, AND SYSTEMS - A blast modeling system may generate a site model based on blast input data. The blast input data may include blasthole data, bench information, and geology input data. The site model may comprise a plurality of distinct elements representing rock masses. Each element may have a geometric outline formed by connecting endpoints of one or more lines with arcs such that the endpoints of the one or more lines are indirectly coupled via the arcs. The blast modeling system may simulate a blast using the plurality of elements. | 2021-11-25 |
20210365609 | INTEGRATED CIRCUITS AS A SERVICE - Systems and methods are disclosed for automated generation of integrated circuit designs and associated data. These allow the design of processors and SoCs by a single, non-expert who understands high-level requirements; allow the en masse exploration of the design-space through the generation processors across the design-space via simulation, or emulation; allow the easy integration of IP cores from multiple third parties into an SoC; allow for delivery of a multi-tenant service for producing processors and SoCs that are customized while also being pre-verified and delivered with a complete set of developer tools, documentation and related outputs. Some embodiments, provide direct delivery, or delivery into a cloud hosting environment, of finished integrated circuits embodying the processors and SoCs. | 2021-11-25 |
20210365610 | PROCEDURAL WORLD GENERATION USING TERTIARY DATA - Procedural world generation using tertiary data is described. In an example, a computing device can receive road network data associated with the real environment and a road mesh associated with a real environment. The computing device can associate the road network data with the road mesh to generate a simulated environment. Additionally, the computing device can associate supplemental data with the road network data and the road mesh to enhance the simulated environment (e.g., supplementing information otherwise unavailable to the sensor data due to an occlusion). The computing device can output the simulated environment for at least one of testing, validating, or training an algorithm used by an autonomous robotic computing device for at least one of navigating, planning, or decision making. | 2021-11-25 |
20210365611 | PATH PRESCRIBER MODEL SIMULATION FOR NODES IN A TIME-SERIES NETWORK - A method of creating and executing action pathways for time series data may include accessing a model of a system, where the system is represented by a hierarchy of nodes in a data structure representing time series of data. The method may also include simplifying the model by removing relationships between the nodes that affect parent nodes less than a threshold amount, and simulating the model to identify a node comprising a time series of data that risks missing a predefined target value. The method may further include generating a pathway of actions for changes to driver nodes that cause the time series of data to move within a threshold distance of the predefined target value in the future, and causing the pathway of actions to be executed. | 2021-11-25 |
20210365612 | VIRTUAL REALITY SYSTEM FOR DESIGNING BRASSIERE - A virtual reality system for designing brassiere includes a wearable device, a head-mounted device, a cloud server, an intelligent terminal, an application program, and a designer, which makes it possible for a user to experience the effects of tightened or loosened brassiere, uplifting, compression, enlargement of the breast, and breast massage in a virtual reality environment with physical interaction with objects in real world. Afterwards, relevant data will be transferred to the cloud server via a built-in transducer, and an expected brassiere will be designed accordingly. | 2021-11-25 |
20210365613 | SYSTEM AND METHOD FOR DETECTING EXCESSIVE VIBRATION IN A CONSUMER DEVICE USING COMPUTERIZED MODELING - Systems and methods are provided for evaluating a device design to reduce audio speaker generated vibrational energy transfer between adjoining components of a device. The method performs a system-level modal analysis on the design to extract a natural frequency and a mode shape and thereafter create an analysis monitoring point on the design between two adjacent components defining a relative distance. Simulation inputs are fed into a linear dynamics finite element analysis (FEA) solver to solve system equations for a relative displacement of the two adjacent components at the analysis monitoring point, and if the solved relative displacement causes the relative distance to be equal to or less than a zero-relative distance value, then the device design is modified by at least one value of an element from one of the two adjacent components. | 2021-11-25 |
20210365614 | MACHINE LEARNING BASED DESIGN FRAMEWORK - A computer-implemented method for a machine learning based design framework includes receiving input data, generating a design proposal based on the input data using a machine learning model, receiving feedback for the design proposal from a designated reviewer of the design proposal, updating a user preference profile associated with the designated reviewer using data generated by a different machine learning model based on the feedback for the design proposal, updating the design proposal to replace the candidate design with a new candidate design based on the user preference profile, and generating a final design based on the design proposal. Various other methods, systems, and computer-readable media are also disclosed. | 2021-11-25 |
20210365615 | MAGNETIC PARAMETER VALUE ESTIMATION METHOD AND DEVICE USING DEEP LEARNING - Disclosed is a magnetic parameter value estimation method using deep learning, the magnetic parameter value estimation method including creating a simulated magnetic domain image corresponding to a spin configuration of a two-dimensional magnetic system created through computer simulation, modeling a deep neural network using the simulated magnetic domain image, and estimating a magnetic parameter value of an observed magnetic domain image using the modeled deep neural network. | 2021-11-25 |
20210365616 | Simulation by substitution of a model by physical laws with an automatic learning model - A method for simulating the behavior of a system ( | 2021-11-25 |
20210365617 | DESIGN AND OPTIMIZATION ALGORITHM UTILIZING MULTIPLE NETWORKS AND ADVERSARIAL TRAINING - A method of design optimization includes training adversarial combined networks including a discriminator network and a generator network. The method is capable of performing multi-objective optimization and may be more efficient than existing methods for certain problems. | 2021-11-25 |
20210365618 | MONTE CARLO MOLECULAR SIMULATION METHOD FOR EFFICIENT CALCULATION OF THE INTERFACIAL TENSION OF WATER/BENZENE LIQUID PHASE BY IMPROVING EWALD SUM - The disclosure provides an efficient Monte Carlo molecular simulation method for calculating the liquid phase interfacial tension between benzene and water by improving Ewald sum, including the following steps: Step A: Initialize the simulation: two simulation boxes were prepared, both with the size (30×30×45 Å)-(35×35×55 Å), and 1200-2000 water molecules and 230-380 benzene molecules were respectively put on the grid point of the two boxes; Step B: Select the force field used for simulation; Step C: Perform Monte Carlo simulations on the two boxes separately under the canonical ensemble; Step D: Join the water box and the benzene box along the z direction to form a large box of (30×30×90 Å)-(35×35×110 Å), and run 50000-80000 Monte Carlo cycles to make the system reach equilibrium; Step E: After the system reaches equilibrium, the data was collected during the production period. | 2021-11-25 |
20210365619 | METHOD FOR DYNAMIC STATE ESTIMATION OF NATURAL GAS NETWORK CONSIDERING DYNAMIC CHARACTERISTICS OF NATURAL GAS PIPELINES - Provided is a method for a dynamic state estimation of a natural gas network considering dynamic characteristics of natural gas pipelines. The method can obtain a result of the dynamic state estimation of the natural gas network by establishing an objective function of the dynamic state estimation of the natural gas network, a state quantity constraint of a compressor, a state quantity constraint of the natural gas pipeline and a topological constraint of the natural gas network, and using a Lagrange method or an interior point method to solve a state estimation model of the natural gas network. The method takes the topological constraint of the natural gas network into consideration, and employs a pipeline pressure constraint in a frequency domain to implement linearization of the pipeline pressure constraint, thereby obtain a real-time, reliable, consistent and complete dynamic operating state of the natural gas network. | 2021-11-25 |
20210365620 | CONSTRAINT DETERMINATION SYSTEM AND METHOD FOR SEMICONDUCTOR CIRCUIT - A method, for determining constraints related to a target circuit, includes following operations. First circuit speed results of the target circuit under different candidate constraint configurations are accumulated. Breakthrough probability distributions relative to each of the candidate constraint configurations are determined according to the first circuit speed results. First selected constraint configurations are determined from the candidate constraint configurations by sampling the breakthrough probability distributions. A first budget distribution is determined among the first selected constraint configurations. In response to that the first budget distribution is converged, the first selected constraint configurations in the first budget distribution is utilized for implementing the target circuit and generating an updated circuit speed result of the target circuit. | 2021-11-25 |
20210365621 | METHOD AND SYSTEM FOR DETERMINING EQUIVALENCE OF DESIGN RULE MANUAL DATA AND DESIGN RULE CHECKING DATA - The present disclosure provides a method and a system for determining the equivalence of the DRM data set and the DRC data set. The system retrieves a DRM data set and a DRC data set, and transforms the DRM data set and the DRC data set into a first data structure node and a second data structure node respectively. The system determines whether the first data structure node and the second data structure node are equivalent according to a data structure node comparison model. | 2021-11-25 |
20210365622 | NOISE MITIGATION THROUGH QUANTUM STATE PURIFICATION BY CLASSICAL ANSATZ TRAINING - A computer-implemented method produces a representation of a pure quantum state from a classical model. The classical model has a plurality of parameters. The method includes: (A) selecting a set of outcomes from a library of outcomes of a quantum circuit, wherein the library of outcomes comprises a plurality of measurement pairs sampled from the quantum circuit, each measurement pair comprising a quantum measurement and a corresponding measurement basis; and (B) updating values of the plurality of parameters of the classical model to minimize a value of a distance measure between the classical model and the set of outcomes, thereby producing the updated classical model, wherein the updated classical model has the updated values of the plurality of parameters. | 2021-11-25 |
20210365623 | STANDARD CELL AND SEMICONDUCTOR DEVICE INCLUDING ANCHOR NODES AND METHOD OF MAKING - A semiconductor device includes a first cell. The first cell includes a first functional feature, a first sensitivity region, at least one anchor node, wherein each of the at least one anchor node is different from the first functional feature, and a number of anchor nodes of the at least one anchor node linked to the first functional feature is based on a position of the first functional feature relative to the first sensitivity region. The semiconductor device further includes a second cell abutting the first cell. The second cell includes a second functional feature, wherein the second functional feature satisfies a minimum spacing requirement with respect to the first functional feature. | 2021-11-25 |
20210365624 | STATIC VOLTAGE DROP (SIR) VIOLATION PREDICTION SYSTEMS AND METHODS - Systems and methods are provided for predicting static voltage (SIR) drop violations in a clock-tree synthesis (CTS) layout before routing is performed on the CTS layout. A static voltage (SIR) drop violation prediction system includes SIR drop violation prediction circuitry. The SIR drop violation prediction circuitry receives CTS data associated with a CTS layout. The SIR drop violation prediction circuitry inspects the CTS layout data associated with the CTS layout, and the CTS layout data may include data associated with a plurality of regions of the CTS layout, which may be inspected on a region-by-region basis. The SIR drop violation prediction circuitry predicts whether one or more SIR drop violations would be present in the CTS layout due to a subsequent routing of the CTS layout. | 2021-11-25 |
20210365625 | TEST PATTERN GENERATION SYSTEMS AND METHODS - Systems and methods are provided for generating test patterns. In various embodiments, systems and methods are provided in which machine learning is utilized to generate the test patterns in a manner so that the test patterns conform with design rule check (DRC) specified for a particular semiconductor manufacturing process or for particular types of devices. A test pattern generation system includes test pattern generation circuitry which receives a noise image. The test pattern generation generates a pattern image based on the noise image, and further generates a test pattern based on the pattern image. The test pattern is representative of geometric shapes of an electronic device design layout that is free of design rule check violations. | 2021-11-25 |
20210365626 | DOCUMENT ARCHITECTURE WITH FRAGMENT-DRIVEN ROLE BASED ACCESS CONTROLS - A document production system may construct a document from fragments based on a theme associated with the document. The theme may contain section(s), each section having an access control list (ACL) associated therewith. The ACL may specify role-based user group(s) and permission(s) for the role-based user group(s). The system may evaluable rules applicable to the document. At least one rule may pertain to the ACL(s). The evaluation may include, at least in part, utilizing user login information received over a network from a client device. In constructing the document, the system may assemble the document in accordance with the rules and utilizing the fragments and meta information that describes the document. The system may render the document thus assembled utilizing the ACL, generate a view of the document, and communicate the view of the document over the network to the client device for presentation on the client device. | 2021-11-25 |
20210365627 | System And Method For Contextual Service Delivery Via Mobile Communication Devices - A computer automated system and method comprising configuring a single or plurality of mobile devices over a network, validating the configured devices, and communicating contextual information to the configured devices. The devices are authenticated and the authentication is sent to a server over the network, when a contextual service, controlled/offered by the server through a contextual service point in communication with the server, is invoked by the configured mobile device in the vicinity of the contextual service point. The mobile device is then enabled to consume a contextual service, offered by and delivered at the contextual service point, either from within the mobile device or over the network. | 2021-11-25 |
20210365628 | EXTRACTING AUDIOVISUAL FEATURES FROM DIGITAL COMPONENTS - Systems and methods for extracting audiovisual features from images and other digital components. A data processing system can extract image data and image features from an input image. The data processing system can match the image features to the image features of a plurality of image to identify candidate images. A second image can be selected from the candidate images based on a request that the data processing system received with the input image. | 2021-11-25 |
20210365629 | ONLINE REAL-TIME INTERACTIVE COLLABORATIVE DOCUMENT SYSTEM - A system and method for facilitating annotation of a digital document between first and second computing devices is provided. The system comprises a database/server that receives the digital document from the first computing device and communicates the digital document to the second computing device. The second computing device receives and displays the digital document for annotation. The annotation produces an annotated digital document which includes the original document data and annotated document data overlaying the original document without modification to the original document data. | 2021-11-25 |
20210365630 | DOMAIN-SPECIFIC LANGUAGE INTERPRETER AND INTERACTIVE VISUAL INTERFACE FOR RAPID SCREENING - A domain-specific language interpreter and live updating visual interface for rapid interactive exploration, filtering, and analysis of a dynamic data set. It includes a multi-line editor that allows a user to enter and edit input on any line at any time, and a grid view display. As the user enters an expression in the multi-line editor, it continually parses and executes the expression with respect to the domain-specific language, recognizing data tags and operations. Each data tag is associated with values for identifiers of the data set, and each operation can be applied to the values. The grid view display updates with a live display of identifiers and result values for the input expression according to the current contents of the multi-line editor user input interface. | 2021-11-25 |
20210365631 | DIGITAL PROCESSING SYSTEMS AND METHODS FOR CONTEXT BASED ANALYSIS DURING GENERATION OF SUB-BOARD TEMPLATES IN COLLABORATIVE WORK SYSTEMS - Systems, methods, and computer-readable media for automatic generation of customized lower-level table templates based on data in an associated higher-level table structure are disclosed. The systems and methods may involve maintaining the higher-level table structure having first rows, first columns, and first cells at intersections of first rows and first columns; receiving an input for triggering generation of a lower-level table template tied to the higher-level table structure; analyzing at least one higher-level table characteristic including higher-level table type, higher-level table grouping, higher-level table content, higher-level table size, higher-level particular column heading, higher-level particular item label, or higher-level author; determining a customization of the lower-level table template; associating the customization with the lower-level table template to form a customized lower-level table structure; and causing the lower-level table structure to be displayed in association with the higher-level table structure. | 2021-11-25 |
20210365632 | TEXT AUTOCOMPLETE USING PUNCTUATION MARKS - A dataset comprising text-based messages can be accessed. Tokens for words and punctuation marks contained in the text-based messages can be generated. Each token corresponds to one word or one punctuation mark. A vector representation for each of a plurality of the tokens can be generated using natural language processing. A sequence of tokens corresponding to the text-based message can be generated for each of a plurality of the text-based messages in the dataset. Ones of the tokens that represent punctuation marks can be identified. An artificial neural network can be trained to predict use of the punctuation marks in sentence structures. The training uses the generated sequence of tokens and the vector representations for the tokens, in the sequence of tokens, that represent the punctuation marks. | 2021-11-25 |
20210365633 | Token Packing for Sequence Models - Embodiments of the present disclosure include systems and methods for packing tokens to train sequence models. In some embodiments, a plurality of datasets for training a sequence model is received. Each dataset in the plurality of datasets includes a sequence of correlated tokens. A set of training data is generated that includes a subset of a sequence of tokens from a first dataset in the plurality of datasets and a subset of a sequence of tokens from a second, different dataset in the plurality of datasets. The sequence model is trained using the set of training data. | 2021-11-25 |
20210365634 | BUILDING ANALYTICAL PLATFORM TO ENABLE DEVICE FABRICATION - This disclosure relates generally to methods and systems for building an intelligent analytical platform to enable a device fabrication in material science. Material engineers and design engineers may face various challenges with existing knowledge, as more time and efforts are required in finding a relevant knowledge from the existing knowledge, mainly due to the unstructured form, for fabricating new devices. The present disclosure solves the technical problem of finding the relevant knowledge out of the existing knowledge, in a structured form by building an analytical platform. The unstructured format of the existing knowledge of the fabrication process is transformed into a structured format in terms of operation sequence knowledge graphs, using a set of artificial intelligence (AI) and machine learning models, and a knowledge representation model of the fabrication process. The structured format of the existing knowledge is hierarchically arranged to build the analytical platform. | 2021-11-25 |
20210365635 | JOINT INTENT AND ENTITY RECOGNITION USING TRANSFORMER MODELS - Systems described herein may use transformer-based machine classifiers to perform a variety of natural language understanding tasks including, but not limited to sentence classification, named entity recognition, sentence similarity, and question answering. The exceptional performance of transformer-based language models is due to their ability to capture long-term temporal dependencies in input sequences. Machine classifiers may be trained using training data sets for multiple tasks, such as but not limited to sentence classification tasks and sequence labeling tasks. Loss masking may be employed in the machine classifier to jointly train the machine classifier on multiple tasks simultaneously. The user of transformer encoders in the machine classifiers, which treat each output sequence independently of other output sequences, in accordance with aspects of the invention do not require joint labeling to model tasks. | 2021-11-25 |
20210365636 | USING A JOINT DISTRIBUTIONAL SEMANTIC SYSTEM TO CORRECT REDUNDANT SEMANTIC VERB FRAMES - A computer-implemented method, according to one embodiment, is for performing review of semantic role labeling resources. The computer-implemented method includes: receiving pairs of automatically projected semantic verb frames, and computing a similarity score for each of the pairs of semantic verb frames. A joint distributional semantic system is trained using the computed similarity scores. Moreover, a determination is made as to whether to merge each pair of the semantic verb frames, by applying the joint distributional semantic system to that pair. In response to determining that a given pair of semantic verb frames should be merged, an indication is provided to a recipient that the given pair of semantic verb frames should be merged. | 2021-11-25 |
20210365637 | NATURAL SOLUTION LANGUAGE - A computer-implemented method that effectively replaces ‘programming code’ in conveying application or solution logic to the computer using a natural language-based design. Without taking any reference to alien symbols or keywords, NSL uses standard and familiar natural-language-like constructs (any natural language, not just English) using a computer-implemented method to technically convey complex operating, application, and solution logic to the machine agents (computers) in a user-friendly way. Using the same computer-implemented methodologies, it has the power to translate or reverse engineer all existing programming code into NSL. Fundamentally, NSL requires no ‘programming code’ expertise. Users can quickly and easily convey the logic directly to the computer or recruit available solution components with ease. In addition, the elimination of artificial barriers between information and processes, and merging them, solution logic embedded in computer programs and applications is brought into the purview of information search principles. | 2021-11-25 |
20210365638 | AUTOMATIC COMPLIANCE TOOLS - A facility for representing a mandate occurring in an authority document with a control is described. For each of one or more controls in a set of existing controls, the facility determines a similarity score measuring the similarity of the mandate and the control; where the similarity score exceeds a similarity threshold, the facility links the mandate to the control. Where the mandate is not linked to any control in the set of controls, the facility adds a control to the set of controls that is based on the mandate, and links the mandate to the added control. | 2021-11-25 |
20210365639 | INTENT RECOGNITION OPTIMIZATION PROCESSING METHOD, APPARATUS, AND STORAGE MEDIUM - This application discloses an intent recognition optimization processing method, apparatus, device and storage medium, and relates to the field of internet technology. The implementation scheme of specific method includes: acquiring a first intent set and at least one original corpus; acquiring a first recognition result of each original corpus, where the first recognition result of any one of the original corpus includes a first intent corresponding to the original corpus recognized by the intent recognition model; acquiring a second recognition result of each original corpus, where the second recognition result of any one of the original corpus includes a second intent corresponding to the original corpus obtained through artificial recognition; and performing optimization processing on the first intent set to obtain a second intent set according to the first recognition result and the second recognition result of each original corpus. | 2021-11-25 |
20210365640 | METHOD AND APPARATUS FOR CUSTOMIZING NATURAL LANGUAGE PROCESSING MODEL - A method for model customization according to an embodiment includes providing a user with prediction results of each of a plurality of pre-trained natural language processing models for a document subjected to analysis selected from a document set including a plurality of documents, acquiring user feedback on the prediction results from the user, generating a plurality of augmented documents from at least one of the plurality of documents based on data attributes of each of the plurality of documents and the user feedback; and retraining at least one of the plurality of natural language processing models, using training data including the plurality of augmented documents. | 2021-11-25 |
20210365641 | SPEECH RECOGNITION AND TRANSLATION METHOD AND TRANSLATION APPARATUS - There are a speech recognition and translation method as well as a translation apparatus. The method includes: entering a speech recognition state in response to the translation button being pressed, and collecting a voice of a user through the sound collecting device; importing the collected voice into each of a plurality of speech recognition engines through the processor to obtain a confidence of the voices corresponding to a plurality of different candidate languages, and determining a source language used by the user based on the confidence and a preset determination rule; exiting the speech recognition state in response to the translation button being released in the speech recognition state, and converting the voice of the source language to a target voice of a preset language through the processor; and playing the target voice through the sound playback device. | 2021-11-25 |
20210365642 | METHOD AND SYSTEM FOR PROCESSING MULTILINGUAL USER INPUTS USING SINGLE NATURAL LANGUAGE PROCESSING MODEL - The disclosure relates to system and method for processing multilingual user inputs using a Single Natural Language Processing (SNLP) model. The method includes receiving a user input in a source language and translating the user input to generate a plurality of translated user inputs in an intermediate language. The method includes using the SNLP model configured only using the intermediate language to generate a plurality of sets of intermediate input vectors in the intermediate language. The method includes processing the plurality of sets of intermediate input vectors in the intermediate language using at least one of a plurality of predefined mechanisms to identify a predetermined response. The method includes translating the predetermined response to generate a translated response that is rendered to the user. | 2021-11-25 |
20210365643 | NATURAL LANGUAGE OUTPUTS FOR PATH PRESCRIBER MODEL SIMULATION FOR NODES IN A TIME-SERIES NETWORK - A method of generating natural language outputs may include accessing a model of a system, where the system may be represented by a hierarchy of nodes in a data structure, and nodes in the hierarchy of nodes may include time series of data. The method may also include identifying a time series represented by a node in the data structure that will generate a future anomaly; accessing a template corresponding to a type of the time series; populating semantic tags in the template using data from the time series; sending a phrase from the template to a natural language model; receiving a plurality of similar phrases from the natural language model; selecting one of the plurality of similar phrases and replacing the phrase in the template; and causing language from the template to be displayed on a display device. | 2021-11-25 |
20210365644 | ADAPTIVE LANGUAGE TRANSLATION USING CONTEXT FEATURES - A user input in a source language is received. A set of contextual data is received. The user input is encoded into a user input feature vector. The set of contextual data is encoded into a context feature vector. The user input feature vector and the context feature vector are used to generate a fusion vector. An adaptive neural network is trained to identify a second context feature vector, based on the fusion vector. A second user input in the source language is received for translation into a target language. The adaptive neural network is used to determine, based on the second context feature vector, a second user input feature vector. The second user input feature vector is decoded, based on the source language and the target language, into a target language output. A user is notified of the target language output. | 2021-11-25 |
20210365645 | SOCIAL SAFE METHOD AND SYSTEM OF LANGUAGE TRANSLATION - The present invention provides a social safe method of language translation, a device having a software program therefor, and a system comprising a having the software program. | 2021-11-25 |
20210365646 | ANALOG VECTOR-MATRIX MULTIPLICATION CIRCUIT - An analog vector-matrix multiplication circuit is achieved by using a programmable storage device array. In a programmable semiconductor device array, gates of all of programmable semiconductor devices of each row are all connected to the same analog voltage input end. M rows of programmable semiconductor devices are correspondingly connected to M analog voltage input ends. Drains (or sources) of all of programmable semiconductor devices of each column are all connected to the same bias voltage input end. N columns of programmable semiconductor devices are correspondingly connected to N bias voltage input ends. Sources (or drains) of all of programmable semiconductor devices of each column are all connected to the same analog current output end. The N columns of programmable semiconductor devices are correspondingly connected to N analog current output ends. Threshold voltages of the programmable semiconductor devices are controlled, such that each programmable semiconductor device can be regarded as a variable equivalent analog weight, thereby achieving the matrix multiplication function. | 2021-11-25 |
20210365647 | Bioptic Scanner Optical Arrangement with Single Sensor Split Four Ways - A bioptic scanner optical arrangement with a single sensor split four ways is disclosed herein. An example bioptic scanner optical arrangement includes a housing, an imaging assembly having a primary FOV, a decode module, a generally horizontal window supported by the housing, a generally upright window supported by the housing, and a mirror arrangement positioned within the interior region. The mirror arrangement is configured to divide the primary FOV into a plurality of subfields, to redirect at least two of the plurality of subfields through the generally horizontal window, and to redirect at least another two of the plurality of subfields through the generally upright window. The bioptic barcode reader has no other imaging assembly communicatively coupled to the decode module and used to process images for decoding indicia. | 2021-11-25 |
20210365648 | ANTENNA SWITCHING - A switching device can provide a pass-through connection between a first set of reader inputs and antenna inputs. The switching device can disconnect the pass-through connection between the first set of reader inputs from a first reader and the plurality of antenna inputs. The switching device can generate a tuned signal based on the antenna inputs. The switching device can provide the tuned signal to a second set of reader inputs for a second reader. | 2021-11-25 |
20210365649 | SYSTEM AND METHOD FOR ACCURATE BULK SCANNING OF RFID TAGS - A system to accurately and consistently read Radio-Frequency Identification (RFID) information from RFID tags placed upon objects. The system features a moving antenna or antenna array pointed toward a target detection zone. In some embodiments, a portal is constructed having electromagnetic shielding properties and containers carrying RFID tagged objects are loaded through the portal. In other embodiments, multiple antenna arrays are installed within the portal. Movement of antenna arrays may be provided using a non-electronic motor or actuator to suppress potential electromagnetic interference. A method of accurately and consistently reading RFID information from RFID sources by providing the antenna(s) and portal passing objects having RFID tags proximate the antenna(s) and through the portal, and optimizing the angle by which the antennas and/or antenna arrays may best read the RFID signals upon a target detection zone via movement of the antenna(s). | 2021-11-25 |
20210365650 | SCANNING APPARATUS AND MODULAR POWER SOURCE - A scanning apparatus and associated charging system are provided that include a universal power interface configured to receive a removable power source connected thereto where the removable power source includes a power storage unit and a charging circuit. The scanning apparatus further includes scanning circuitry that is in electrical communication with the universal power interface and is configured to scan a target. The scanning apparatus further includes a processor communicably coupled with the scanning circuitry and the universal power interface. In an instance in which the universal power interface receives the removable power source, the processor is configured to determine a type of the removable power source, select one or more parameters based on the determined type of the removable power source, and operate at least one of the scanning apparatus or the charging circuit in the removable power source based on the one or more selected parameters. | 2021-11-25 |
20210365651 | IDENTIFICATION METHOD OF AN INTEGRATED CIRCUIT CHIP AND IDENTFICATION SYSTEM OF AN INTEGRATED CIRCUIT CHIP - An identification method of an integrated circuit chip of the present invention includes identifying a surface structure or an internal structure of an integrated circuit chip, generating a structural information set according to the surface structure or internal structure, converting the structural information set into an identification information set. The identification information set generated by the above-mentioned identification method can be stored in a digital file, and a chip manufacturer requires no visible information printed on an outer surface of the integrated circuit chip such that factory information of the integrated circuit chip can be concealed. When retrieving the malfunctioned or defective integrated circuit chip, the manufacturer can acquire a new generated identification information set by identify the integrated circuit chip and compare the new generated identification information set and the generated identification information set stored in the file to obtain the factory information of the retrieved integrated circuit chip. | 2021-11-25 |