49th week of 2020 patent applcation highlights part 51 |
Patent application number | Title | Published |
20200380098 | HVAC AUTHENTICATON SYSTEM AND METHOD - An authentication method and system for an HVAC system are provided. Embodiments of the present disclosure generally relate to an access-control or authentication system for an HVAC system, in which access to certain functions of the HVAC system is conditioned on a user performing certain basic operational instructions for the HVAC system in a provided sequence, thereby providing evidence that the user has authorization to access and operate the HVAC system wirelessly. | 2020-12-03 |
20200380099 | VARIABLE ACCESS BASED ON FACIAL EXPRESSION CONFIGURATION - A computer-implemented method for controlling access to a computing device based on one or more facial expression configurations of a user. The method captures the one or more facial expression configurations of the user, and matches the captured one or more facial expression configurations of the user with one or more defined facial expression configurations, wherein the one or more defined facial expression configurations are associated with one or more access permissions, or actions to be performed by the computing device. The method further grants the one or more access permissions to the user based on the match, and/or performs the action associated with the match. In additional embodiments, the method may further create one or more user profiles of the user, wherein each of the one or more user profiles is configured to include one or more access permissions. | 2020-12-03 |
20200380100 | METHOD AND APPARATUS FOR TURNING ON SCREEN, MOBILE TERMINAL AND STORAGE MEDIUM - Provided are a method and apparatus for turning on a screen, a mobile terminal and a storage medium. The method comprises that: when a change in a moving state of a mobile terminal meets a preset unlocking condition, a structured light image sensor is activated for imaging; a depth map obtained by the imaging of the structured light image sensor is acquired; a face depth model is constructed according to the depth map; a position of pupils is identified from the face depth model; and when the position of the pupils is within a specified region of eyes, the screen of the mobile terminal is controlled to turn on. | 2020-12-03 |
20200380101 | REGISTRATION APPARATUS, AUTHENTICATION APPARATUS, PERSONAL AUTHENTICATION SYSTEM, AND PERSONAL AUTHENTICATION METHOD, AND PROGRAM AND RECORDING MEDIUM - In a personal authentication system based on seat pressure, a registration apparatus adjusts parameters by means of feature computation using, as training data, a time series pressure distribution data piece of a would-be registrant and time series pressure distribution data pieces of a plurality of other persons, and back propagation based on a difference between the results of the feature computation and training signals, and stores the adjusted parameters as a personal identification data piece. The authentication apparatus determines the personal identification value by means of computation on a time series pressure distribution data piece of an authentication object person, using, as parameters, a personal identification data piece for each registered person, and performs authentication. The feature computation includes computations for extracting a physical feature and a behavioral feature. It is possible to perform registration of a personal identification data piece, or personal authentication based on data obtained when the user is behaving naturally. | 2020-12-03 |
20200380102 | DUAL FINGERPRINT SENSOR CREDENTIALING - A credential authorization device having a first fingerprint sensor, configured to detect first sensor data representing one or more elements of a finger from a first person in contact with the first fingerprint sensor; a second fingerprint sensor, configured to detect second sensor data representing one or more elements of a finger from a second person in contact with the second fingerprint sensor; and one or more processors, configured to determine an authorization for a transaction based on an authentication of the first sensor data and the second sensor data. | 2020-12-03 |
20200380103 | APPARATUS, METHOD, AND STORAGE MEDIUM - In a case where at least two login functions of a face authentication login function and a simple login function are enabled in an apparatus, the apparatus performs login processing based on a face authentication result indicating that a condition for allowing a user to log in to the apparatus is satisfied and displays a screen after login, and the apparatus displays a button corresponding to each of one or more candidates obtained from the face authentication result on a login screen based on the face authentication result indicating that the condition for allowing the user to log in to the apparatus is not satisfied, performs login processing upon selection of a button, and displays a screen after login. | 2020-12-03 |
20200380104 | Radar-Based Behaviometric User Authentication - A first behaviometric user profile for a first user is generated and stored, by detecting a position and velocity of the first user relative to the mobile device based on a received response from a radar transmission while the first user uses the mobile device, the received response over time indicating a position and velocity of the first user. Based on further received responses of additional radar transmissions an additional behavioral pattern of an unknown user is determined. The additional behavioral pattern is then compared to the first behaviometric user profile, and based on the comparison, a measure of similarity between the first behaviometric user profile and the additional behavioral pattern, measuring if the first user and the unknown user are a same user is heuristically determined. As a result of the comparison, operation or access to at least some data stored on the mobile device is prevented. | 2020-12-03 |
20200380105 | SYSTEM AND METHOD FOR REAL WORLD BIOMETRIC ANALYTICS THROUGH THE USE OF A MULTIMODAL BIOMETRIC ANALYTIC WALLET - A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. The biometric wallet further comprises a biometric analytic interface configured to communicate the biometric data to one or more devices. | 2020-12-03 |
20200380106 | System and Method For Unlocking Devices Associated With A Carrying Bag - A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric reader is received by an authentication system. The biometric reader is located on a pull mechanism of a sliding fastening device for a carrying bag. The user is authenticated by verifying the validity of the biometric information. The authenticated user is associated with the carrying bag. Based on a set of pre-defined permissions, one or more devices associated with the carrying bag are unlocked. | 2020-12-03 |
20200380107 | SHORT-DISTANCE NETWORK ELECTRONIC AUTHENTICATION - Methods of short-distance network electronic authentication are described. In one embodiment, a method includes storing encrypted authentication data for a user and a corresponding encryption key on a mobile device; establishing electronic communication between the mobile device and a computer via a short distance network; detecting a request for user-specific authentication data from a third-party application running on the computer; requesting, via an authentication client on the computer, authentication credentials from an authentication service running on the mobile device; accessing, via the authentication service, in response to the requesting step, the encrypted authentication data and encryption key; decrypting the authentication data using the encryption key via the authentication service; transmitting the decrypted authentication data to the authentication client on the client computer; passing the decrypted authentication data from the authentication client to the third-party application; and authenticating the user in the third-party application. | 2020-12-03 |
20200380108 | SYSTEMS AND METHODS FOR PROXIMITY SINGLE SIGN-ON - A method and apparatus of a device that endorses a proximity authorization for an authorization requesting device is described. In an exemplary embodiment, the device receives a proximity authorization request from the authorization requesting device, wherein the authorization requesting device is in proximity with the authorization endorsing device. The device additionally presents a local authorization request to a user of the authorization endorsing device and receives a set of user credentials for the local authorization request. The device further performs a local authorization on the device using at least the set of user credentials. In addition, the device sends a server authorization request to an identity management server, receives an authorization response from the identity management server, and returns the authorization response. | 2020-12-03 |
20200380109 | EFFICIENT AND SECURE PROVISIONING AND UPDATING OF IDENTITY CREDENTIALS - Disclosed embodiments relate to systems and methods for securely and seamlessly provisioning credentials for use by personal computing devices. Techniques include obtaining a session identifier; making available an encoded representation to a personal computing device, the encoded representation encoding the session identifier; wherein the personal computing device is configured to: decode the encoded representation, access an identity credential stored on the personal computing device, encrypt the identity credential using a first cryptographic key, and send, to a mediator resource, the session identifier and the encrypted identity credential; receiving, from the mediator resource, the session identifier and the encrypted identity credential; and storing the encrypted identity credential. | 2020-12-03 |
20200380110 | RECORDING MEDIUM, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING TERMINAL - A non-transitory computer-readable recording medium having computer-readable instructions stored thereon, which when executed, cause an information processing apparatus including a memory and processing circuitry, to execute a method including managing a first account and a second account for a service provided by the information processing apparatus, registering a second user corresponding to the second account as a user capable of recovering the first account, in response to receiving a request from a first information processing terminal corresponding to a first user corresponding to the first account, determining whether authentication is successful based on authentication information of the first user received from a second information processing terminal corresponding to the second user, and providing the first user access to the service based on the determination. | 2020-12-03 |
20200380111 | ENSURING AUTHENTICITY OF AT LEAST ONE VALUE OF A DEVICE PROPERTY - The invention relates to a method for ensuring the authenticity of at least one value of a device property wherein the device property is a characteristic of a device ( | 2020-12-03 |
20200380112 | VERIFICATION OF ACCESS TO SECURED ELECTRONIC RESOURCES - Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources. In one example, a decisioning computer system evaluates, based on a passive-dimension decision process, an access request, received from a user device, for a secured electronic resource. The passive-dimension decision process can evaluate dimensions associated with the access request, such as identity or device characteristics, to determine whether the dimensions of the access request are outside of norms for the user. Based on the passive-dimension decision model, the decisioning computing device may communicate to the user device an access decision, the access decision describing one or more of an access authorization, a denial of access, or a supplemental authentication challenge. | 2020-12-03 |
20200380113 | System and Method for Authenticating a Mobile Device - In a mobile device including an image capturing device having an imaging element (CCD), and an illumination element, capturing an image of an object and sending the image of the object to a server for authenticating the image and authorizing a transaction. | 2020-12-03 |
20200380114 | SYSTEM FOR SECURITY ANALYSIS AND AUTHENTICATION ACROSS DOWNSTREAM APPLICATIONS - Embodiments of the present invention provide a system for security analysis and authentication. The system can generate a one time password (OTP) signature for a user using a neural network machine learning system. This OTP signature can be analyzed by multiple applications that each utilize different certain authentication verification matching requirements, such that security concerns and strengths of varied downstream applications are taken into account on an individual application basis. Each application determines an authentication value for the user based on the OTP signature, and access or other permissions are granted in response to the authentication value meeting or exceeding a threshold value for that application. | 2020-12-03 |
20200380115 | USER INTERFACES FOR MANAGING USER ACCOUNT PASSWORDS - In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface. | 2020-12-03 |
20200380116 | SECURE ENVIRONMENT IN A NON-SECURE MICROCONTROLLER - A secure engine method includes providing an embedded microcontroller in an embedded device, the embedded microcontroller having internal memory. The method also includes providing a secure environment in the internal memory. The secure environment method recognizes a boot sequence and restricts user-level access to the secure environment by taking control over the secure environment memory. Taking such control may include disabling DMA controllers, configuring at least one memory controller for access to the secure environment, preventing the execution of instructions fetched from outside the secure environment, and only permitting execution of instructions fetched from within the secure environment. Secure engine program instructions are then executed to disable interrupts, perform at least one secure operation, and re-enable interrupts after performing the at least one secure operation. Control over the secure environment memory is released, which can include clearing memory, re-enabling DMA controllers, and restoring memory controller parameters. | 2020-12-03 |
20200380117 | AGGREGATING ANOMALY SCORES FROM ANOMALY DETECTORS - In some examples, a system determines a dependency among a plurality of anomaly detectors, the determining comprising clustering anomaly detectors of the plurality of anomaly detectors into clusters of anomaly detectors. The system aggregates anomaly scores produced by anomaly detectors in a first cluster of anomaly detectors, to generate a first aggregate anomaly score, and detects an anomaly using the first aggregate anomaly score. | 2020-12-03 |
20200380118 | Post-Training Detection and Identification of Human-Imperceptible Backdoor-Poisoning Attacks - This patent concerns novel technology for detecting backdoors of neural network, particularly deep neural network (DNN), classifiers. The backdoors are planted by suitably poisoning the training dataset, i.e., a data-poisoning attack. Once added to input samples from a source class (or source classes), the backdoor pattern causes the decision of the neural network to change to a target class. The backdoors under consideration are small in norm so as to be imperceptible to a human, but this does not limit their location, support or manner of incorporation. There may not be components (edges, nodes) of the DNN which are dedicated to achieving the backdoor function. Moreover, the training dataset used to learn the classifier may not be available. In one embodiment of the present invention which addresses such challenges, if the classifier is poisoned then the backdoor pattern is determined through a feasible optimization process, followed by an inference process, so that both the backdoor pattern itself and the associated source class(es) and target class are determined based only on the classifier parameters and a set of clean (unpoisoned attacked) samples from the different classes (none of which may be training samples). | 2020-12-03 |
20200380119 | ANTI-IMPERSONATION TECHNIQUES USING DEVICE-CONTEXT INFORMATION AND USER BEHAVIOR INFORMATION - Anti-impersonation techniques using device-context information and user behavior information from a session. The session can include a time period where a user of the client computer is performing an activity on the client computer (e.g., the session includes the user logging into an account online). The behavior information can include information on ways the user uses user input devices during the session. The device-context information can include HTTP session information. The techniques can include generating feature vector(s) for the received information, and comparing the feature vector(s) against model(s) of related historical information. The comparisons can provide level(s) of deviation of the feature vector(s) from the model(s). Also, the techniques can include determining whether the session is anomalous or normal according to the level(s) of deviation, and performing a security action in response to determining the session is anomalous. | 2020-12-03 |
20200380120 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a sending unit and a receiving unit. The sending unit sends a work to a determining unit that determines legitimacy of the work. The receiving unit receives, from the determining unit, the work to which a result of determination made by the determining unit is added. | 2020-12-03 |
20200380121 | SNOOPING INVALIDATION AND SNOOPING DETECTION DEVICE AND METHOD - A snooping invalidation module is implemented at the network interface for a given core, or processing element, of a multicore or manycore device, e.g., NoC device, to discard packets with invalid header flits (e.g., duplicate packets) from being injected into the device, e.g., by a malicious hardware trojan implemented in the network interface. In some embodiments, a data-snooping detection circuit is implemented to detect a source of an on-going attack. | 2020-12-03 |
20200380122 | ELLIPTIC CURVE POINT MULTIPLICATION OPERATION METHOD AND APPARATUS - Disclosed are an elliptic curve point multiplication operation method and apparatus. The elliptic curve point multiplication operation method comprises ordered point multiplication and point addition operations. In a point addition operation process, when scanning that a current bit of a scalar K is not 0, a true point addition operation is executed, and when scanning that the current bit of the scalar K is 0, an equivalent point conversion operation is executed; the result of the true point addition operation and the result of the equivalent point conversion operation are stored in an identical register file, the register file comprising multiple registers. According to the elliptic curve point multiplication operation method and apparatus, side channel analysis and security error attack can be effectively resisted. | 2020-12-03 |
20200380123 | FAST IDENTIFICATION OF TRUSTWORTHY DEEP NEURAL NETWORKS - A system and method including receiving a set of deep neural networks (DNN) including DNNs trained with an embedded trojan and DNNs trained without any embedded trojan, each of the trained DNNs being represented by a mathematical formulation learned by the DNNs and expressing a relationship between an input of the DNNs and an output of the DNNs; extracting at least one characteristic feature from the mathematical formulation of each of the trained DNNs; statistically analyzing the at least one characteristic feature to determine whether there is a difference between the DNNs trained with the embedded trojan and the DNNs trained without any embedded trojan; generating, in response to the determination indicating there is a difference, a detector model to execute the statistical analyzing on deep neural networks; and storing a file including the generated detector model in a memory device. | 2020-12-03 |
20200380124 | PROTOCOL MODEL LEARNING AND GUIDED FIRMWARE ANALYSIS - The present disclosure describes a firmware analysis system and method that can generate a collection of protocol constraints from known firmware and apply the collection of protocol constraints towards an unknown firm to recognize protocol relevant fields and detect functionality within the unknown firmware. | 2020-12-03 |
20200380125 | Method for Detecting Libraries in Program Binaries - This document discloses a solution for detecting, by a computer apparatus, computer program library in a binary computer program code. A method according to an embodiment of the solution comprises in the computer apparatus: acquiring a reference computer program library file in a binary form; and determining at least one signature set of binary data from a read-only section of the reference computer program library, wherein the at least one signature set of binary data is determined to contain constant binary data that is unique to the reference computer program library; the method further comprising a testing phase comprising: acquiring binary computer program code and at least one signature set of binary data associated with each reference computer program library to be searched for; searching the binary computer program code for said at least one signature set of binary data; and upon determining that a signature set of binary data has been detected in the binary computer program code, determining that the binary computer program code comprises the computer program library associated with the detected signature set of binary data. | 2020-12-03 |
20200380126 | DETECTION OF HARMFUL PROCESS INTENT IN AN INTENT-BASED PRODUCTION PROCESS - A method for detection of harmful process intent in an intent-based production process includes: providing a machine-readable production model linking an intent model, correlating to process intent, including production process functions, constraints on measurable properties on the production process functions, and/or production process function sequences required for the production process, and a process model, correlating to process knowledge comprising a production process behavior; determining a safety library of at least one safety process intent, the safety library being protected by security mechanisms to be maintained outside of regular intent-based engineering mechanisms and operation mechanisms; evaluating changes of process intent in view of potentially harmful process intent dependent on the at least one safety process intent; and providing a report of potentially harmful process intent for auditing based on the potentially harmful process intent. | 2020-12-03 |
20200380127 | DETECTION OF EXPLOITATIVE PROGRAM CODE - The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from. | 2020-12-03 |
20200380128 | SIGNATURE GENERATING DEVICE, SIGNATURE GENERATING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING PROGRAM - A signature generating device ( | 2020-12-03 |
20200380129 | ROOTKIT DETECTION SYSTEM - A system and method (referred to as the system) detect infectious code. The system injects a repetitive software code that causes malware in a monitored device to render a detectable direct current power consumption profile. A guide wave generator generates a guide wave signal that establishes an observational window that is applied to data that represent a direct current source power consumption of the monitored device. An extraction device extracts a portion of the data that represent the direct current source power consumption of the monitored device. A deviation engine identifies the malware on the monitored device without processing data associated with a prior identification of the malware or identifying a source of the malware or identifying a location of the malware on the monitored device. | 2020-12-03 |
20200380130 | IDENTIFYING AND RESPONDING TO A SIDE-CHANNEL SECURITY THREAT - A method for managing memory within a computing system. The method includes one or more computer processors identifying a range of physical memory addresses that store a first data. The method further includes determining whether a second data is stored within the range of physical memory addresses that stores the first data. The method further includes responding to determining that the second data is stored within the range of physical memory addresses that store the first data, by determining whether a process accessing the second data is identified as associated with a side-channel attack. The method further includes responding to determining that the process accessing the second data is associated with the side-channel attack, by initiating a response associated with the process accessing the second data. | 2020-12-03 |
20200380131 | SYSTEM AND PROCESSES FOR DETECTING MALICIOUS HARDWARE - A system for detecting malicious hardware on a data communication network, such as a vehicle CAN bus, is provided. The system includes a teleprocessing device, an AC signal generating device, and an impedance measuring device. In a preliminary step, a set of impedance measurements of N reference AC signals is formed, and a threshold value is set. The signal generating device injects a set of N AC signals into the network bus and the bus impedance for each of the N frequencies is measured, where a set of impedance values of N RT-signals is formed. Then, each of the impedance values of the RT-signals and the impedance values of the respective reference AC signal are statistically compared, to thereby form a set of N comparison-results. Upon determining that any of the impedance values of the RT-signals is greater than the threshold, an alert is activated. | 2020-12-03 |
20200380132 | METHOD AND SYSTEM FOR DATA SECURITY AND APPARATUS FOR EXECUTING THE SAME - A computing device according to an embodiment includes one or more processors, a memory in which one or more programs to be executed by the one or more processors are stored, a queue manager configured to receive a security detection request including a detection target file, a plurality of detectors configured to perform a security detection operation on the target detection file, and an operation distributor configured to acquire detection policy information related to the detection target file and distribute the detection target file received from the queue manager to one or more of the plurality of detectors based on the detection policy information. | 2020-12-03 |
20200380133 | Method for Updating Selinux Security Policy and Terminal - A method for updating a SELinux security policy and a terminal. The method includes receiving, by the terminal, a security policy file sent by a server. The method further includes, performing, by the terminal in a power-on status, storing the security policy file in preset storage space by using a first service or process, modifying, by the terminal, a value of a preset attribute value from a first value to a second value by using the first service or process, reading, when it is detected that the value of the preset attribute value is changed from the first value to the second value, the security policy file from the preset storage space by using a second service or process and writing the security policy file into a memory, and loading, by the terminal, the security policy file in the memory by using the second service or process. | 2020-12-03 |
20200380134 | SCALE OUT FILE SYSTEM USING REFS AND SCALE OUT VOLUME - Some storage systems are configured with VDL (valid data length) type controls that are implemented on a per cluster basis and, in some instances, on a sub-cluster basis, rather than simply a per file basis. In some instances, per-cluster VDL metadata for the storage clusters is stored and referenced at the edge data volume nodes of a distributed network for the storage system rather than, and/or without, storing or synchronizing the per-cluster VDL metadata at a master node that manages the corresponding storage clusters for the different data volume nodes. Sequence controls are also provided and managed by the master node and synchronized with the edge data volume nodes to further control access to data contained in the storage clusters. | 2020-12-03 |
20200380135 | INTEGRATED CIRCUIT AND CONTROL METHOD OF INTEGRATED CIRCUIT - An integrated circuit includes a data processing part, a data management part. The data processing part processes data. The data management part manages security of the data processing part. The security management part includes a set value holding part, a start control part and a state control part. The set value holding part holds a set value of security strength. The start control part starts the integrated circuit by secure boot which performs signature verification on a boot program in a case where the security strength shown by the set value is over a predetermined level. The state control part resets the data processing part when falsification of the boot program is detected by the signature verification in the secure boot. | 2020-12-03 |
20200380136 | DATA DRIVEN PARSER SELECTION FOR PARSING EVENT LOGS TO DETECT SECURITY THREATS IN AN ENTERPRISE SYSTEM - A method includes obtaining an incoming event log, splitting the incoming event log into a set of tokens, and identifying a subset of the tokens as anchor tokens. The method also includes utilizing an ordered list of the anchor tokens to traverse through a set of anchor token trees and, responsive to identifying a path from (i) a root node of a given one of the anchor token trees to (ii) a given leaf node of the given anchor token tree corresponding to the ordered list of the anchor tokens, selecting a given parser associated with the given leaf node. The method further includes extracting data from the incoming event log utilizing the given parser, detecting one or more security threats affecting at least one asset in an enterprise system based on the extracted data, and applying at least one remediation action to mitigate the detected security threats. | 2020-12-03 |
20200380137 | METHOD AND CONFIRMATION DEVICE FOR CONFIRMING THE INTEGRITY OF A SYSTEM - A method for computer-aided testing and confirmation of at least one system state of a first system by a confirmation device, is provided. After the testing of a first item of integrity information, which is provided by the first system, the confirmation device provides a second, combined item of integrity information and confirms the same cryptographically. The second item of integrity information includes at least part of the first item of integrity information and can be transmitted to a second system, in order to confirm the integrity of the first system to the latter. A confirmation device, to a first system, to a second system and to a computer program product in order to carry out the steps of the method is also provided. | 2020-12-03 |
20200380138 | Systems and Methods for Automated Threat Modeling of an Existing Computing Environment - Automated threat modeling methods include providing one or more servers and one or more data stores communicatively coupled with the server(s). The data store(s) may include a plurality of threat model components stored therein (stored components) and a plurality of threats stored therein (stored threats), each stored threat associated through the data store(s) with at least one of the stored components. Using one or more input fields displayed on one or more computing devices communicatively coupled with at least one of the server(s), one or more inputs are received, the input(s) including access credentials associated with an existing computing environment and one or more inputs configured to initiate, using the server(s) and the access credentials, automatic generation of a relational diagram (diagram) of the existing computing environment and automatic generation of a threat report. Automated modeling systems include systems configured to carry out automated modeling of an existing computing environment. | 2020-12-03 |
20200380139 | SYSTEM AND METHOD FOR ENHANCING VEHICLE OCCUPANT VOICE DATA PRIVACY - A microphone controller includes a processor programmed to receive voice input from one or more microphones to be utilized in a voice recognition session initiated by the microphone controller. Further the microphone controller includes a key store including one or more keys configured to encrypt the received voice input to an encrypted voice data. | 2020-12-03 |
20200380140 | PROBABILISTIC MEMORY SAFETY USING CRYPTOGRAPHY - A chip for securing storage of information includes a manager to access a pointer and a cipher engine to decrypt stored data. The pointer includes a first area and a second area. The first area includes an address indicating a storage location of the data and the second area includes a safety tag. The cipher engine decrypts the data output from the storage location based on a key and the safety tag in the second area of the pointer. These and other operations may be performed based on metadata that indicate probabilities that a correct safety tag was used to decrypt the data. in another embodiment, the manager may be replaced with an L1 cache. | 2020-12-03 |
20200380141 | PRIVATE DATA PROCESSING - A method includes storing, in one or more databases amongst a plurality of databases by one or more nodes in a distributed database system, data for one or more of network-enabled devices. The data for each network-enabled device includes encrypted private data, and metadata associated with the private data. The metadata may include permissions data, time period validation data, and encryption parameters. In addition, the method may include locating the encrypted first private data and determining using first permissions data associated with the encrypted first private data and using the second network-enabled device identifier if the second network-enabled device is authorized to access the first private data. The method includes providing the first private data to the second network-enabled device. The second network-enabled device obtains and decrypts the encrypted first private data to obtain the first private data. | 2020-12-03 |
20200380142 | DYNAMIC ENCRYPTED ON-DEVICE STORAGE FOR SESSION QUALITY-AGNOSTIC MOBILE BUG EVIDENCE PRESERVATION - A system and a method are disclosed for on-device storage at a mobile bug of data of a one-way communications session where quality deteriorates. In an embodiment, a mobile bug receives a request to establish a one-way communications session, and responsively transmits data to a database for storage while refraining from storing the transmitted data subsequent to the transmission of the data. The mobile bug detects a deterioration in the one-way communications session that prevents, at least in part, the transmission of the data. Responsive to detecting the deterioration, while the deterioration is detected, the mobile bug stores the data in an encrypted format. The mobile bug detects a request for the data stored at the mobile bug, and responsively transmits the data to the database and deletes the data from the mobile bug. | 2020-12-03 |
20200380143 | PROVIDING USER INFORMATION IN ASSOCIATION WITH MESSAGING - A device implementing a system for providing information corresponding to a user in association with messaging includes a processor configured to receive, by a messaging application on the device, a message and associated metadata from a second device, the associated metadata comprising a record identifier of a data record stored on a server, the data record comprising identifying information corresponding to a user of the second device. The processor is further configured to send, to the server, a request for the data record, the request comprising the record identifier, and obtain, in response to the sending, the data record. The processor is further configured to display the identifying information of the user contained in the data record, together with content of the message in a user interface of the messaging application. | 2020-12-03 |
20200380144 | QUICK ACTIONS FOR DID ATTESTATION USER INTERFACE ELEMENTS - Embodiments disclosed herein are related to computing systems and methods for generating attestation User Interface (UI) elements based on signed attestations for use by a DID owner. Attestation UI elements are rendered by a DID management module. The attestation UI elements are based underlying DID signed attestations that provide information about the DID owner from various third party entities. The management module may receive physical input from the DID owner. In response to receiving the physical input, the DID owner may be provided access to the rendered attestation UI elements. | 2020-12-03 |
20200380145 | METHOD FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS OF A TRAINED MACHINE LEARNING NETWORK MODEL USING DIGITAL WATERMARKING BY ADDING, ON PURPOSE, AN ANOMALY TO THE TRAINING DATA - The invention provides a method for marking a machine learning model, said method comprising providing a training dataset, adding at least one anomaly to said training dataset, and training said machine learning model using said training dataset. This can for instance help to protect property rights on trained neural networks. | 2020-12-03 |
20200380146 | Enforcing sensitive data protection in security systems - A security system that monitors requests to a protected resource is configured to determine that a syntactically-invalid language statement in a request is one that should be treated as a “security high risk” statement (SHRS) because it has a probability of containing sensitive data. A machine language that defines the structure and syntax of the language statements used by a client-server application may have multiple SHRSs. SHRSs are identified in advance by syntactical analysis of the language statements that comprise the machine language. The security system stores (or can otherwise obtain) a representation of each of the set of these high risk statements. In response to detecting that a request has a syntactically-invalid language statement, the system determines whether the invalid language statement has a measure of similarity sufficiently close to any of statement in the SHRS set. Upon a positive determination, an appropriate security action is taken to ensure sensitive data is not exposed. | 2020-12-03 |
20200380147 | Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers - Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a first reader-writer system, a first data access request. Based on receiving the first data access request, the computing platform may authenticate the first reader-writer system using a first data container object. After authenticating the first reader-writer system, the computing platform may rotate a first data track comprising a plurality of datasets to align a first dataset of the plurality of datasets with the first data container object. After rotating the first data track, the computing platform may retrieve first information from the first dataset using the first data container object. Subsequently, the computing platform may send, to the first reader-writer system, the first information retrieved from the first dataset using the first data container object. | 2020-12-03 |
20200380148 | METHOD AND SYSTEM FOR AGGREGATING USERS' CONSENT - A method and a system for aggregating users' consents for use of automotive data by data services are provided herein. The method may include the following steps: obtaining, from a plurality of data sources, a plurality of automotive data records associated with connected vehicles having respective users; determining for each request for automotive data made by said data services, which of the data records require consent; aggregating consent data for each data records, responsive to an indication that the respective user have been authenticated by the data sources; and providing the data services with access to automotive data based on the aggregated consent data. The system may implement the aforementioned steps in a form of a server on a computer network. | 2020-12-03 |
20200380149 | SEPARATION OF MANAGED AND UNMANAGED DATA IN A COMPUTING DEVICE - Techniques are disclosed relating to securely storing data at a computing device that is managed by an external entity. In some embodiments, a computing device maintains a first file system volume having data that is accessible to a user of the computing device and that is not managed by an entity external to the computing device. The computing device receives, from the entity external, a first request to configure the computing device to store data that is accessible to the user and managed by the external entity. In response to the first request, the computing device creates a second distinct file system volume to store the data managed by the external entity. In response to a second request from the external entity, the computing device subsequently removes the second file system volume. | 2020-12-03 |
20200380150 | METHOD OF ENCODING AND DECODING MEMORY DATA FOR SOFTWARE SECURITY, RECORDING MEDIUM AND APPARATUS FOR PERFORMING THE METHOD - Disclosed is a method of encoding and decoding memory data for software security, which is executed by a computer processor, and a recording medium and an apparatus for performing the method. The method of encoding and decoding memory data for software security includes: encoding the memory data using a machine language into which an encoding function is injected and storing the encoded memory data in the memory area; and decoding the encoded memory data in the memory area using a machine language into which a decoding function is injected and branching the decoded memory data to an address designated by a value of the memory data. | 2020-12-03 |
20200380151 | TIME-BASED FUNCTIONALITY RESTRICTIONS - Time-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify time periods during which the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules. | 2020-12-03 |
20200380152 | SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE - Embodiments of systems and methods for implementing data sovereignty safeguards in a distributed services network architecture are disclosed. Embodiments of a distributed services system may have a number of distributed nodes that each implements a set of services. When a user requests a service at a particular node of a distributed services system, the node is configured to determine if that node is not (or is) data sovereign for a region associated with the user. If the node is not data sovereign for the user's region, the user may be directed to a corresponding service at a node of the distributed service system that is data sovereign for the user's region. | 2020-12-03 |
20200380153 | DISTRIBUTED DATA RIGHTS MANAGEMENT FOR PEER DATA POOLS - Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs. The DTRS receives the data entry and its metadata from the data integrity service and performs steps to update all data pool of the DTRS, in an embodiment. | 2020-12-03 |
20200380154 | BLOCKCHAIN ENDORSEMENT WITH APPROXIMATE HASH VERIFICATION - An example operation may include one or more of transmitting, from a client application, a proposed storage request to a plurality of endorser nodes of a blockchain, receiving a first endorsement of the storage request from a first endorser node, the first endorsement comprising a full-step hash verification of the proposed storage request, receiving a second endorsement of the storage request from a second endorser node, the second endorsement comprising a reduced-step hash verification of the storage request, and transmitting a storage proposal including the full-step hash endorsement and the reduced-step hash endorsement to an ordering node of the blockchain. | 2020-12-03 |
20200380155 | AUTOMATIC ENFORCEMENT OF DATA USE POLICY FOR MACHINE LEARNING APPLICATIONS - Techniques and solutions are described for restricting data that is provided to a machine learning application. Restrictions can be based on use status information, such as use status information associated with a retention manager and indicating whether data is blocked from use. Data identifiers used by a cloud-based system can be correlated with archiving objects of a local system so that the cloud-based system can receive use status information to avoid using blocked data. Restrictions can include restricting data based on whether a data subject has provided consent that allows the data to be used by the machine learning application. A data view can be defined that filters query results to those where consent exits. The data view can join, such as an inner join, a table providing consent information with a data having data subject data. | 2020-12-03 |
20200380156 | SYSTEM AND METHOD FOR MAINTAINING GRAPHS HAVING A POLICY ENGINE AND BLOCKCHAIN - Aspects of the subject disclosure may include, for example, a processing system including a processor and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations. The operations include: identifying a set of one or more graphs in a blockchain ledger, wherein each graph of the set of one or more graphs comprises a set of one or more nodes and a graph permission level, wherein each node in the set of one or more nodes comprises a unique identifier, a node permission level, data and zero or more edges, wherein each edge in the zero or more edges defines a relationship between the node and another node in the set of one or more nodes, wherein the node permission level defines a prerequisite to access the data, the node permission level, or the zero or more edges, and wherein the graph permission level defines a prerequisite to access the set of one or more nodes; receiving a request from equipment utilized by a user to access first data in one or more nodes in a first graph, comparing a user permission of the user to a first permission level of the first graph to ensure that the user permission meets or exceeds the first permission level; applying rules of a rules engine to ensure that the user permission meets or exceeds a second permission level defined by the rules; and providing security keys to the equipment utilized by the user responsive to the user permission meeting or exceeding the first permission level and the second permission level, wherein the security keys provide access to the first data. Other embodiments are disclosed. | 2020-12-03 |
20200380157 | CONTENT AGGREGATION SYSTEM FOR INTELLIGENT SEARCHING OF INDEXED CONTENT BASED ON EXTRACTED SECURITY IDENTIFIERS - Systems and methods are provided for a content aggregation system for intelligent searching of indexed content based on extracted security identifiers. An example method includes obtaining content items from content providers based on authorization information associated with one or more users. Collectors are configured to transform content items into articles representing a normalized form associated with a content item. The method includes obtaining a plurality of articles and storing them in one or more databases. The method includes assigning security identifiers to the articles. A security identifier represents an abstraction of a discrete access right or permission associated with user access to an article. The method includes generating respective indexing messages for execution. The indexing messages are included in a queue and each indexing message includes a reference to an article. A method includes indexing the articles referenced in the indexing messages to enable searching of the indexed articles. | 2020-12-03 |
20200380158 | SYSTEMS AND METHODS FOR MANAGING DATA EXPECTATIONS - Systems and methods for executing a containerized computer code from a remote are disclosed. A controller module receives the request and applies data expectation rules to the request. The request must meet the requirements of the data expectation rules before the controller module will execute the containerized computer code. The controller module is configured to access data not necessarily accessible by the requesting application for use with executing the containerized computer code. | 2020-12-03 |
20200380159 | SYSTEMS AND METHODS FOR PRIVACY-ENHANCING TRANSFORMATION OF A SQL QUERY - Systems and methods for obtaining a SQL query, translating the SQL into a modified SQL query incorporating a privacy mechanism, and outputting the modified SQL query incorporating the privacy mechanism. In some embodiments, the modified SQL query incorporating the privacy mechanism is forwarded to a SQL database. | 2020-12-03 |
20200380160 | DATA SECURITY CLASSIFICATION SAMPLING AND LABELING - Cybersecurity and data categorization efficiency are enhanced by providing reliable statistics about the number and location of sensitive data of different categories in a specified environment. These data sensitivity statistics are computed while iteratively sampling a collection of blobs, files, or other stored items that hold data. The items may be divided into groups, e.g., containers or directories. Efficient sampling algorithms are described. Data sensitivity statistic gathering or updating based on the sampling activity ends when a specified threshold has been reached, e.g., a certain number of items have been sampled, a certain amount of data has been sampled, sampling has used a certain amount of computational resources, or the sensitivity statistics have stabilized to a certain extent. The resulting statistics about data sensitivity can be utilized for regulatory compliance, policy formulation or enforcement, data protection, forensic investigation, risk management, evidence production, or another classification-dependent or classification-enhanced activity. | 2020-12-03 |
20200380161 | STANDARD COMPLIANT DATA COLLECTION DURING A COMMUNICATION SESSION - Disclosed are systems, methods, and non-transitory computer-readable media for standard compliant collection of sensitive data during a communication session. A standard compliant data collection system is used to provide the standard compliant collection of sensitive data. For example, in response to receiving an indication that a user is to provide sensitive data during an active communication session between the user and an agent, a standard compliant data collection mode is invoked. As a result, communication within the active communication session is routed between the user and the standard compliant data collection system via a secure connection, during which sensitive data is collected in a standard compliant manner. Once collection of the user's sensitive data has been completed, the standard compliant data collection mode is ended, and communication within the active communication session is routed between the user and the agent. | 2020-12-03 |
20200380162 | METHODS AND APPARATUS FOR SECURELY DISPLAYING DIGITAL IMAGES - The invention provides methods and apparatus for securing personalized or sensitive information appearing in digital images. Digital images containing information to be secured is processed and divided into a plurality of image cells. At least one image cell from the plurality of image cells is selected and redacted or altered to render the information to be secured with the selected image cells indecipherable. The invention also provides methods and apparatus for transmitting or streaming unredacted image cells alone or in combination with redacted image cells for secured viewing on a user browser or computer. | 2020-12-03 |
20200380163 | PROCESS FOR COLLECTING ELECTRONIC PROTECTED HEALTH INFORMATION WITHOUT A LOGIN - An efficient and secure process by which users may enter sensitive information into an electronic information system. When information is required from a user, the electronic information system may be configured to generate a unique access link (uniform resource locator, or URL) for that user. The link may be sent to the user via electronic communication, such as a text message or email. When the user follows the link with a web browser, the system prompts the user to enter an additional piece of personal information that is not known to the general public. Once identity is verified, the user may be required to electronically sign agreements. The user is then prompted to enter the required information. This may allow a user to deposit sensitive information into the system without requiring the user to provide full login credentials. | 2020-12-03 |
20200380164 | PROTECTING USER DATA - A method, computer system, and computer program product for protecting user data while performing third-party account registration. The method may include receiving, from a third party, a request for personal data of a user. The method may request the user to authenticate the request for personal data. In response to receiving from the user the authentication, the method may include providing the third party the personal data of the user. A portion of the personal data of the user that is provided to the third party may be altered and may be mapped to the user. The method may store identifying information about the third party. The method may also include receiving, from the user, a parameter respecting use of the portion of the personal data that is altered. The parameter may limit the third party from obtaining information from the portion of the personal data that is altered. | 2020-12-03 |
20200380165 | SYSTEMS, METHODS, AND DEVICES FOR OBFUSCATION OF BROWSER FINGERPRINT DATA ON THE WORLD WIDE WEB - Systems, methods, and devices for obfuscation of browser fingerprint data are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method may include: (1) receiving an electronic communication from an electronic device to a destination; (2) identifying a raw device fingerprint value in the electronic communication from an electronic device; (3) selecting at least one replacement value for the raw device fingerprint value; (4) replacing the raw device fingerprint value with the replacement value in the electronic communication; and (5) sending the electronic communication with the replacement value to the destination. | 2020-12-03 |
20200380166 | PROVIDING OBFUSCATED USER IDENTIFIERS FOR MANAGING USER-SPECIFIC APPLICATION STATE ON MULTI-USER DEVICES - A device implementing a system for associating a profile with an active user account includes a processor configured to receive, from an application running on a device, a request to identify an active user account on the device. The processor is further configured to generate, in response to the request, a unique identifier corresponding to the active user account on the device, the unique identifier being distinct from a user account identifier of the active user account. In addition, the processor is configured to provide the unique identifier to the application for differentiation, by the application, of the active user account on the device relative to at least one other account on the device. | 2020-12-03 |
20200380167 | INFORMATION BARRIERS FOR SENSITIVE INFORMATION - Disclosed are embodiments for information barriers that are conditional on the type of information being communicated. Information barrier polices provided by the disclosed embodiments selectively allow communication between accounts or groups based on characteristics of the content of the communication. For example, communication between a marketing department and an engineering department may be conditional on the communication not including any sensitive information. The determination of whether the communication includes sensitive information is further designed to provide good performance even in environments that maintain substantial portions of data in an offsite or cloud environment, where latencies associated with searching large datastores can be prohibitive. | 2020-12-03 |
20200380168 | Image Access Management Device, Image Access Management Method, and Image Access Management System - In a case of receiving an access request to a target image, an image access management device can provide an appropriate access right holder with an appropriate range of information by determining a browsing level with respect to the target image according to an access authority or purpose included in the access request to the target image, by an access management unit, by generating a final image that corresponds to the access authority by processing the feature vector according to the browsing level, and providing the generated final image as a response to the access request, by an image generation unit. | 2020-12-03 |
20200380169 | VIRTUAL DATA LAKE SYSTEM CREATED WITH BROWSER-BASED DECENTRALIZED DATA ACCESS AND ANALYSIS - A virtual data lake system created with browser-based decentralized data access and analysis is disclosed herein. As contemplated by the present disclosure, the system provides a single interface that allows a user to access and analyze multiple enterprise data storage locations remotely and simultaneously while presenting and reporting information from the multiple sources in a single, uniform display. Such a solution allows a user to analyze and cross-reference data stored in multiple locations in real time without requiring the actual data files to be displaced or combined. The system further implements interactive artificial intelligence, natural language processing, and workflow-based operations for improved user access and functionality. | 2020-12-03 |
20200380170 | SYSTEMS, METHODS, AND DEVICES FOR PRIVACY-PROTECTING DATA LOGGING - Systems, methods, and devices for privacy-protecting data logging that can log user behavior (e.g., web browsing) without creating a user-specific list of browsed URLs are disclosed. In one embodiment, in an information processing apparatus comprising at least a token server, a privacy service, and a data store, a method for privacy logging may include: (1) providing, by the token server, a token to a privacy application executed on an electronic device and to a privacy service; (2) receiving, by the privacy service, browsing traffic from a browser or application executed by the electronic device; (3) associating, by the privacy service, the browsing traffic with the token; and (4) storing, by the data store, the associated browsing traffic with the token. | 2020-12-03 |
20200380171 | SYSTEMS AND METHODS FOR MANAGING PRIVACY POLICIES USING MACHINE LEARNING - Systems, methods, and devices for managing privacy policies are disclosed. In one embodiment, a method for management of a user's privacy preferences may include: identifying a computer application installed on a user electronic device, or a website accessed using a browser executed by the user electronic device; retrieving a privacy policy document analysis for a privacy policy document associated with the computer application or the website, the privacy policy document analysis comprising a valuation of a plurality of privacy policy segments within the privacy policy document; receiving a privacy preference analysis for the user, the privacy preference analysis comprising a valuation of a plurality of privacy preferences for the user; identifying a recommended action in response to the valuation of one of the privacy policy segments being outside the scope of the valuation of one of the plurality of privacy preferences; and executing the recommended action. | 2020-12-03 |
20200380172 | DATA INTEGRITY - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, that protect analytics for resources of a publisher from traffic directed to such resources by malicious entities. An analytics server receives a first message that includes an encrypted token and analytics data for a publisher-provided resource. The token includes a portion of the analytics data and a trust score indicating a likelihood that activity on the resource is attributed to a human (rather than an automated process). The analytics server decrypts the token. The analytics server determines a trustworthiness measure for the analytics data included in the first message based on the trust score (in the decrypted token) and a comparison of the analytics data in the first message and the portion of the analytics data (in the decrypted token). Based on the measure of trustworthiness, the analytics server performs analytics operations using the analytics data. | 2020-12-03 |
20200380173 | IMPROVED SYSTEM AND METHOD FOR CORRECTION OF MEMORY ERRORS - A self-correcting memory system comprising an integrated circuit including memory and memory content authentication functionality, which is operative to compare content to be authenticated to a standard and to output “authentic” if the content to be authenticated equals the standard and “non-authentic” otherwise; and error correction functionality which is operative to apply at least one possible correction to at least one erroneous word entity in said memory, yielding a possibly correct word entity, call said authentication for application to the possibly correct word entity, and if the authentication's output is “authentic”, to replace said erroneous word entity in said memory, with said possibly correct word entity thereby to yield error correction at a level of confidence derived from the level of confidence associated with the authentication. | 2020-12-03 |
20200380174 | DATA SCANNING AND REMOVAL FOR REMOVABLE STORAGE DEVICE - Techniques for data scanning and removal for a removable storage device are described herein. An aspect includes a removable storage device comprising an embedded processor configured to boot from an embedded read-only memory (ROM) of the removable storage device. Another aspect includes scanning an internal storage of the removable storage device to identify a first file in the internal storage that matches removal criteria defined in the embedded ROM. Another aspect includes removing the identified first file from the internal storage of the removable storage device. | 2020-12-03 |
20200380175 | ONE-CHIP SYSTEM FOR A VEHICLE - The present disclosure relates to a one-chip system for a control device of a vehicle with at least one bus, at least one control unit connected to the at least one bus for controlling a peripheral device assigned to the at least one control unit and several processors connected to the at least one bus. | 2020-12-03 |
20200380176 | DIGITAL DISAPPEARING INK - Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for implementing digital disappearing ink. An example method includes receiving portions of a data stream transmitted from a source and analyzing the portions of the data stream. Based on the analysis, the method includes performing an action with respect to an object tag according to the analysis. | 2020-12-03 |
20200380177 | PERSONALIZED FIT AND FUNCTIONAL DESIGNED MEDICAL PROSTHESES AND SURGICAL INSTRUMENTS AND METHODS FOR MAKING - Methods, devices and systems for virtual, remote and real-time collaboration between surgeons and engineers using system learning and intelligent and timely disbursement of design and performance information to engineering teams embarking on the preliminary design event of a personalized orthopaedic implant or personalize surgical instrument utilizing a case-based reasoning expert system. Additive manufacturing technology and statistically controlled advanced manufacturing processes quickly produce personalized medical devices worldwide. | 2020-12-03 |
20200380178 | TRACKING SAFETY CONDITIONS OF AN AREA - Methods and apparatus for electronically quantifying conditions of a person and an environment containing the person, as well as a sequence of positions occupied by the person and a direction the person faced at those positions. Wireless communications track a series of positions over time and provide user interfaces indicating where a person has been and who the person has come within a minimum distance of. In addition, sensors provide ongoing evaluation of a condition of the person, such as a body temperature and heartrate which may trigger an alarm state if the body temperature rises above a specified value. Ongoing environmental conditions may also be quantified and presented in the user interface. | 2020-12-03 |
20200380179 | DEVICE AND METHOD FOR BUILDING LIFE CYCLE SUSTAINABILITY ASSESSMENT USING PROBABILISTIC ANALYSIS METHOD, AND RECORDING MEDIUM STORING THE METHOD - A device and method for building life cycle sustainability assessment using probabilistic analysis method, the device and method being capable of assessing and predicting building life cycle sustainability, and a recording medium storing the method. The device includes: a first storage unit storing a reference environmental impact assessment value of a reference building, and first and second environmental impact coefficient groups; an input unit receiving area information, amounts of building materials and energy sources; a probability distribution calculating unit storing a set value, and deducing probability distributions of the building materials and the energy sources; a first arithmetic unit calculating probability distributions of first and second environmental impact assessment values, and a probability distribution of a life cycle environmental impact assessment value; and a first output unit deducing a probability distribution of an environmental impact index, and outputting the deduced probability distribution of the environmental impact index. | 2020-12-03 |
20200380180 | METHOD OF DESIGNING AND PRODUCING A TURBINE - A turbine with multiple gas inlets is designed by a process of, for a given engine, obtaining time series data characterizing the power bias of the engine, obtaining an isentropic power associated with each data point of the time series, and using the isentropic powers to obtain a design point. The turbine is then designed based on the design point, such as by optimising one or more design parameters of the turbine based on the design point. | 2020-12-03 |
20200380181 | SYSTEMS AND METHODS FOR GENERATING A DESIGN FOR A GLIDING BOARD - Systems and methods are provided for generating a design for a gliding board. The methods involve operating a processor to: define a desired carved turn of the gliding board; define a desired global curvature profile; generate a desired deformed shape of the gliding board during the desired carved turn; generate a sidecut profile of the gliding board; generate a width profile of the gliding board; generate a camber profile of the gliding board; generate at least one stiffness design variable profile; generate a total load profile; modify at least the width profile, the sidecut profile and at least one of the at least one stiffness design variable profile at least once; and define the design for the gliding board based at least on the width profile, the camber profile, and the at least one stiffness design variable profile. | 2020-12-03 |
20200380182 | Signal Flow-Based Computer Program With Direct Feedthrough Loops - A method for controlling the course of a signal flow-based computer program having interconnected software components and at least one DF loop. The following method steps are performed: a) identifying the at least one DF loop and the DF components, each DF component instantaneously imaging at least one DF input signal present at at least one component input onto at least one output signal present at at least one component output, b) determining the maximum possible change of the values of the DF input signals for each unit of time from at least one property of the respective DF input signal, c) activating a delay element in front of the component input where a DF input signal is present whose value has the smallest maximum possible change, and d) running the computer program in accordance with the connection of the software components ascertained in steps a) to c). | 2020-12-03 |
20200380183 | DECOUPLED SCALABLE DATA ENGINEERING ARCHITECTURE - Provided is a process including: writing classes using object-oriented modelling of modeling topics; scanning the classes to determine class definition information; receiving from a subscribing modeling object a request for a subscription to a given modeling topic in a given modeling topic class, the subscription request including a modeling topic filter to select the given modeling topic from a plurality of modeling topics described by the given modeling topic class; registering a modeling topic accessor associated with the subscribing modeling object and a modeling topic mutator associated with the subscribing modeling object; processing, through the modeling topic filter a modeling topic that is accessed through an accessor and is described by the modeling topic class, the modeling topic being received from a modeling publisher object; notifying the subscribing object of the received modeling topic through a registered modeling topic listener; and mutating the received modeling topic. | 2020-12-03 |
20200380184 | SYSTEM AND METHOD FOR ESTIMATING ALWAYS-ON ENERGY LOAD OF A BUILDING WITH THE AID OF A DIGITAL COMPUTER - Improved energy conservation, including realization of a ZNET (Zero Net Energy including Transportation) paradigm, can be encouraged by providing energy consumers with a holistic view of their overall energy consumption. Current energy consumption in terms of space heating, water heating, other electricity, and personal transportation can be modeled by normalizing the respective energy consumption into the same units of energy. In addition, the passive always-on electricity consumption caused by inactive devices that contributes to the baseload of a building can be identified and addressed by the consumer, as appropriate by expressing baseload as a compound value that combines constant always-on loads and regularly-cycling loads. The baseload is estimated as the peak occurrence in a frequency distribution of net load data, after which the always-on load can be determined by subtracting out any regularly-cycling loads. | 2020-12-03 |
20200380185 | ROAD SURFACE STATE DETERMINATION METHOD - A time series waveform of detected vibration of a tire during travel is multiplied by a window function of a prescribed time width and a time series waveform for each time window is extracted to calculate a feature vector from the time series waveform for each time window. Thereafter, when determining the state of the road surface during travel using the feature vector for each time window and road surface models, a plurality of the aforementioned road surface models is constructed depending on the magnitude of a braking/driving force, the braking/driving force acting on the aforementioned tire is estimated, and the state of the road surface is determined using the road surface models, which depend on the aforementioned feature vector and the magnitude of the estimated braking/driving force. The aforementioned road surface models are constructed with learning data comprising time series waveform data of tire vibration obtained by causing a vehicle mounted with a tire provided with an acceleration sensor to travel on road surfaces in multiple road surface states. | 2020-12-03 |
20200380186 | Modeling Fluid Flow In A Wellbore For Hydraulic Fracturing Pressure Determination - A method for modeling fluid flow in a wellbore is provided. Hydraulic fracturing is an effective technique to improve well productivity by forming high permeable pathways for hydrocarbons to flow from the rock formation to the wellbore. Fluid flow for hydraulic fracturing is modeled using separated flow components, including a wellbore component (modeling the wellbore(s)), a perforation component (modeling the perforations(s)), a fracture component (modeling the fracture(s)) and a rock component (modeling the rock). Each respective component may be selected independently from a plurality of available components. Further, the respective components may be coupled to one another only at their interfaces, such as at a wellbore-perforation interface, a perforation-fracture interface, and a fracture-rock interface, for continuity of fluid kinematics and properties (such as pressure and density). In this way, the modeling of the subsurface may be tailored to the respective components in order to effectively predict the fracturing treatment. | 2020-12-03 |
20200380187 | COMPENSATION DESIGN OF POWER CONVERTERS - A method for compensation network design in a power converter design system is provided that includes computing optimal values for compensation components in a compensation network based on a plurality of loop specifications comprising crossover frequency (Fco), phase margin (PM), Gain Margin (GM), and low frequency gain (LFG), and applying changes to a power converter design comprising the compensation network based on the optimal values. | 2020-12-03 |
20200380188 | AUTOMATED CIRCUIT GENERATION - Automated circuit generation is disclosed. In some embodiments, parameters are received and a circuit schematic is generated automatically by software. In some embodiment, parameters are received and a circuit layout is generated automatically by software. In some embodiments, a design interface may be used to create a behavioral model of a circuit. Software may generate a circuit specification to generate a schematic. In various embodiments, circuit component values may be determined and generated. Certain embodiments pertain to automating layout of circuits. Software may receive parameters for functional circuit components and generate a circuit schematic and/or a layout. The present techniques are particularly useful for automatically generating analog circuits. | 2020-12-03 |
20200380189 | CIRCUIT CORRECTION SYSTEM AND METHOD FOR INCREASING COVERAGE OF SCAN TEST - A method for increasing coverage of a scan test, executed by at least one processor, includes following operations: analyzing a first netlist file and a second netlist file to acquire a change of a circuit structure, in which the first netlist file corresponds to a first scan chain circuitry, and the second netlist file corresponds to a second scan circuitry wherein the second netlist file is generated by processing the first netlist file with executing an engineering change order (ECO); repairing the second scan chain circuitry according to at least one predetermined criterion; evaluating a candidate node of the repaired second scan chain circuitry, to connect a new flip flop circuit generated after executing the ECO to the candidate node; and storing the second netlist file being processed as a third netlist file, to fabricate an integrated circuit. | 2020-12-03 |
20200380190 | DESIGN ASSISTANCE SYSTEM, DESIGN ASSISTANCE METHOD, AND PROGRAM RECORDING MEDIUM - A design assistance system including: a logic synthesis unit that receives input of an operation description file of the programmable logic integrated circuit, logically synthesizes the inputted operation description file, and generates a net list by using logic elements included in the programmable logic integrated circuit; an arrangement wiring unit that generates resource information of the programmable logic integrated circuit, arranges the logic elements included in the net list on the basis of the generated resource information, and virtually generates a signal path by laying wires among the arranged logic elements; and a reliability control unit that generates configuration information of the programmable logic integrated circuit on the basis of at least two reliability modes, and outputs the generated configuration information. | 2020-12-03 |
20200380191 | AUTOMATED CIRCUIT GENERATION - Automated circuit generation is disclosed. In some embodiments, parameters are received and a circuit schematic is generated automatically by software. In some embodiment, parameters are received and a circuit layout is generated automatically by software. In some embodiments, a design interface may be used to create a behavioral model of a circuit. Software may generate a circuit specification to generate a schematic. In various embodiments, circuit component values may be determined and generated. Certain embodiments pertain to automating layout of circuits. Software may receive parameters for functional circuit components and generate a circuit schematic and/or a layout. The present techniques are particularly useful for automatically generating analog circuits. | 2020-12-03 |
20200380192 | AUTOMATED CIRCUIT GENERATION - Automated circuit generation is disclosed. In some embodiments, parameters are received and a circuit schematic is generated automatically by software. In some embodiment, parameters are received and a circuit layout is generated automatically by software. In some embodiments, a design interface may be used to create a behavioral model of a circuit. Software may generate a circuit specification to generate a schematic. In various embodiments, circuit component values may be determined and generated. Certain embodiments pertain to automating layout of circuits. Software may receive parameters for functional circuit components and generate a circuit schematic and/or a layout. The present techniques are particularly useful for automatically generating analog circuits. | 2020-12-03 |
20200380193 | PIN ACCESS HYDRID CELL HEIGHT DESIGN - A method includes arranging a first cell having a first cell height in a first row. The method further includes arranging a second cell having a second cell height in a second row abutting the first row, wherein the second cell height is different from the first cell height. The method further includes placing a plurality of first cell pins within the first cell, wherein each of the plurality of first cell pins extends along a corresponding routing track. The method further includes placing a plurality of second cell pins over a plurality of selected via placement points in the second cell, wherein at least one second cell pin of the plurality of second cell pins extends along a second routing track across a boundary of the second cell and into the first cell. | 2020-12-03 |
20200380194 | METHOD AND SYSTEM OF GENERATING A LAYOUT DIAGRAM - A method (of generating a layout diagram) includes: identifying, in the layout diagram, a group of three or more cells which violates a horizontal constraint vector (HCV) and is arranged so as to exhibit two or more vertically-aligned edge-pairs (VEPs); each VEP including two members representing at least partial portions of vertical edges of corresponding cells of the group; relative to a horizontal direction, the members of each VEP being disposed in edgewise-abutment and separated by a corresponding actual gap; and the HCV having separation thresholds, each of which has a corresponding VEP and represents a corresponding minimum gap in the horizontal direction between the members of the corresponding VEP; and for each of at least one but fewer than all of the separation thresholds, selectively moving a given one of cells corresponding to one of the members of the corresponding VEP thereby to avoid violating the HCV. | 2020-12-03 |
20200380195 | SYSTEM AND METHOD OF AUTOMATIC RE-LOCALIZATION AND AUTOMATIC ALIGNMENT OF EXISTING NON-DIGITAL FLOOR PLANS - A system and method of automatic re-localization of a handheld scanning device in a previously mapped environment is provided. The system includes a two-dimensional (2D) scanner and one or more processors operably coupled to the 2D scanner. The one or more processors are responsive to non-transitory executable instructions for performing operations that include determining a current location of the 2D scanner in the environment relative to a location in a previously generated 2D image of the environment that was generated based on an image of a non-digital floorplan. The operations also include generating a new 2D image of at least a subset of the environment. The at least a subset of the environment includes the current location of the 2D scanner and at least one other location in the environment. The operations further include overlapping portions of the previously generated 2D image and the new 2D image. | 2020-12-03 |
20200380196 | METHOD FOR SELF-ADAPTIVELY OPTIMIZING PARAMETERS OF A MAIN CIRCUIT IN A BBMC BASED ON A CURRENT RATING - Taking parameters of a main circuit in a BBMC as optimization objects, and a total harmonic distortion of an output voltage of the BBMC, a deviation between an actual output current and a corresponding rated output current as optimization objectives, a mathematical model between optimization objects and optimization objectives is established. A multi-objective optimization satisfaction function and a multi-objective optimization fitness function are established by selecting a current rating as a rated output current of the BBMC. An adaptive wolf pack optimization algorithm is adopted to obtain a set of optimal parameters of the main circuit. The rated output current is changed to obtain n sets of optimal parameters, and functional relationships between the optimal parameters of the main circuit in the BBMC are obtained using a numerical fitting method. Optimal parameters of the main circuit corresponding to different current ratings are determined according to the functional relationships. | 2020-12-03 |
20200380197 | METHOD FOR LAYOUT DESIGN AND SEMICONDUCTOR DEVICE MANUFACTURED BASED ON THE SAME - Disclosed is a computer-readable medium including a program code. The program code, when executed by a processor, causes the processor to place an electrically active pattern having a first width and a first least margin area, on a layer, to place a first dummy pattern having a second width wider than the first width and having a second least margin area, on the layer, and to place a second dummy pattern having a third width and a third least margin area, on the layer, based on whether a ratio of an area of the layer to areas of the electrically active pattern and the first dummy pattern is within a reference range. | 2020-12-03 |