49th week of 2021 patent applcation highlights part 49 |
Patent application number | Title | Published |
20210382965 | PHARMACY MANAGEMENT AND ADMINISTRATION WITH BEDSIDE REAL-TIME MEDICAL EVENT DATA COLLECTION - Methods and systems for automatically establishing an enhanced electronic health record (EHR) for a patient include an automatic data collection facility that collects data of a medically related event in proximity to a patient upon occurrence of the event. The collected data may include medication administration data such as medication, time of administration, administration of a dosage of medication, reaction data, and the like. The collected data is communicated to a real-time data integration facility that automatically integrates the data with a patient's electronic health record to establish an enhanced electronic health record. | 2021-12-09 |
20210382966 | HANDLING MANAGEMENT DEVICE - A system is provided, with which various information relating to a traded object can be managed efficiently. | 2021-12-09 |
20210382967 | USING GLASS WEAVE MARKER STRUCTURE TO AUTHENTICATE PRINTED CIRCUIT BOARDS - An apparatus includes a printed circuit board (PCB) that includes a woven glass laminate layer. The woven glass laminate layer includes a plurality of glass bundles woven together, where a marker structure including at least one marker is defined within the woven glass laminate layer. A security chip is coupled with the PCB and includes memory that stores an authentication identifier of the PCB, where the authentication ID includes a representation of the marker structure. | 2021-12-09 |
20210382968 | SECURE ACCESS DEVICE WITH MULTIPLE AUTHENTICATION MECHANISMS - A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem. | 2021-12-09 |
20210382969 | BIOMETRICS AUTHENTICATION METHOD AND APPARATUS USING IN-VEHICLE MULTI CAMERA - A method of performing biometrics authentication based on an image required for biometrics. The method includes setting a region of interest for a user in a vehicle based on an image photographed by a first camera in a vehicle system, setting the region of interest for a face and/or a hand of the user, adjusting a view angle of a second camera based on the region of interest, acquiring an image for the biometrics for the user using the second camera, and performing the biometrics authentication based on the image. Implementations may reduce costs of implementing an in-vehicle biometrics authentication system. At least one of an autonomous vehicle, a user terminal, and a server may be linked with an artificial intelligence module, a drone (unmanned aerial vehicle (UAV)), a robot, an augmented reality (AR) device, a virtual reality (VR) device, devices related to 5G services and the like. | 2021-12-09 |
20210382970 | BIOMETRICS-BASED USER AUTHENTICATION METHOD AND DEVICE - According to an embodiment of the disclosure, there is provided a biometrics-based user authentication method including: obtaining a user's biometric image, obtaining a shallow biometric feature from the user's biometric image by using a first neutral network of a learning network model, obtaining a deep biometric feature from the user's biometric image by using a second neutral network of the learning network model, determining a similarity between the shallow and deep biometric features and a valid user's biometric features stored in advance, and determining whether the user matches the valid user, based on the determined similarity. | 2021-12-09 |
20210382971 | BATTERY MANAGEMENT SYSTEM AND BATTERY MANAGEMENT METHOD - The time and effort of the user when exchanging batteries can be minimized, and security can be sufficiently ensured in user authentication. A battery exchanger ( | 2021-12-09 |
20210382972 | Biometric Authentication Using Voice Accelerometer - Techniques for biometric authentication using a voice accelerometer and an acoustic transducer includes receiving a first signal representing an output by a voice accelerometer of a device and a second signal representing an output by an acoustic transducer of the device. Characteristics of each of the first signal and the second signal are compared with stored biometric characteristics for a user of the device. The user of the device is then authenticated based on the comparison. | 2021-12-09 |
20210382973 | DETECTION DEVICE AND AUTHENTICATION METHOD - A detection device includes an input unit configured to receive an operation of a user, and a sensor provided in the input unit and configured to detect biological information of the user when the user operates the input unit. | 2021-12-09 |
20210382974 | SYSTEM AND METHOD FOR AN IMPROVED PERSONAL VAPORIZATION DEVICE - A vape device system including a payload reservoir that is identified by a payload identifier and that is configured to hold a substance for atomization. A processor is configured to determine an operational setting based on at least one of the payload identifier and a secondary data, which may include user information, prescription information, location information, payload information, historical vape device usage information, and historical payload reservoir information. A vape device system, and method of using the same, that includes a vape device and a computing device that includes the processor. A method of controlling a vape device including determining an operational setting of the vape device based on the payload identifier and/or secondary data. The operational settings may include a duty cycle setting, a temperature setting, an operational time duration, a dosage setting, and a security setting. | 2021-12-09 |
20210382975 | ACCESS AUTHORIZATION BY MEANS OF PERSONAL ACCESS MODULE - Provided is a method for authenticating users on a packaging industrial system having at least two operator interfaces, including the following steps: login of a user to a personal portable item, wherein the personal item including a memory with login credentials of the user for the at least two operator interfaces, wherein login credentials for the operator interfaces being different from each other, activation of the memory for a period of time, detecting the user when he is in a predefined spatial area around the operator interfaces, connecting the personal item to an operator interface when the user is detected in the associated spatial area, authentication of the user at this operator interface with the login credentials stored in the memory via the connection of the personal item to the operator interface. | 2021-12-09 |
20210382976 | DEVICE FOR TRANSMITTING AUTHENTICATION INFORMATION BY USING ULTRASONIC WAVES - A device for transmitting authentication information is disclosed. A device for transmitting authentication information, according to one embodiment of the present invention, comprises: a storage unit for storing authentication information and frequency information corresponding to letters or numbers included in the authentication information; a control unit for generating sound wave signals having a frequency corresponding to the letters or numbers included in the authentication information; and a sound wave output unit for outputting the sound wave signal, wherein the control unit sequentially generates, in the order in which the letters or numbers are enumerated, sound wave signals having a frequency corresponding to the letters or numbers included in the authentication information, and repeatedly generates, a preset number of times, a sound wave signal having a frequency corresponding to each letter or number. | 2021-12-09 |
20210382977 | AUTOMATED DEVICE ACCESS - A method of unlocking a locked device includes receiving a device identifier over a wireless communication protocol, determining if the device identifier is associated with a list of trusted devices, transmitting a request to generate an acoustic signal over the wireless communication protocol based on the determination, receiving the acoustic signal as an audio sound generated external to the locked device, estimating a distance between a source of the audio sound and the locked device, and unlocking the locked device based on the estimation. | 2021-12-09 |
20210382978 | METHOD FOR CONTROLLING INTELLIGENT ELECTRONIC DEVICE AND COMPUTER-READABLE MEDIUM INCLUDING PROGRAM CODE FOR PERFORMING THE METHOD - Disclosed is a method of controlling an intelligent electronic device including initiating implicit continuous authentication, obtaining sensor data from at least one sensor, classifying a security level of the intelligent electronic device into at least two states having different security on the basis of the sensor data, and determining an authentication period of the implicit continuous authentication according to the classified security level, wherein the at least one sensor is continuously activated on the basis of the determined authentication period. | 2021-12-09 |
20210382979 | SIGNED CHANGE REQUESTS TO REMOTELY CONFIGURE SETTINGS - An example computing device includes a memory accessible at startup of the computing device, a buffer, and a set of instructions. The memory stores a configuration setting that is configurable by the application of a change request. The memory also stores a first public key and a second public key. The buffer stores change requests submitted by a remote entity, including a first change request to make a first setting change and a second change request to make a second setting change. The first change request is signed by a first private key corresponding to the first public key, and the second change request is signed by a second private key corresponding to the second public key. The set of instructions retrieves a change request from the buffer, determines whether the change request is authenticated by a public key, and if authenticated, applies the change request. | 2021-12-09 |
20210382980 | PROCESSING DEVICE, SYSTEM, AND AUTHENTICATION DEVICE - To provide a structure capable of performing more secure authentication between devices. | 2021-12-09 |
20210382981 | SERVICE PROVIDING SYSTEM, APPLICATION USAGE METHOD, AND INFORMATION PROCESSING SYSTEM - A service providing system, an application usage method, and an information processing system. The service providing system receives from the terminal device, a request for registering a user to a second tenant in which the user can use the application, the request designating identification information of the user registered in the first tenant and identification information of the application, and registers the user and the application in the second tenant as a user who can use the application. | 2021-12-09 |
20210382982 | DIGITAL INSTANT ISSUANCE WITH INSTANT PROCESSING - An entity may generate digital account credentials when a new account is approved for generation by an authorizing entity that controls or issues new accounts. A user may contact an authorizing entity to open a new account with the authorizing entity. The authorizing entity may authenticate the user and may approve a new account to be generated for the user. The user may wish to conduct transactions immediately upon approval. However, the authorizing entity may not immediately generate a physical identification device along with an actual account identifier associated with the new account. An intermediary entity may generate digital account credentials for the new account immediately after the authorizing entity approves generation of the new account, provide the digital account credentials to the account holder, and process transactions using the digital account credentials. | 2021-12-09 |
20210382983 | INFORMATION PROCESSING DEVICE AND METHOD FOR MANAGING HISTORY INFORMATION OF INFORMATION PROCESSING DEVICE - An information processing device includes: an operation processor; a storage in which an initial password being an initial setting of an administrator password is prestored; a logger that logs details of operations inputted using the operation processor, in the storage as operation history information; a password entry monitor that confirms whether or not the administrator password has been entered; a password changer that changes, upon a confirmation that a password differing from the initial password has been entered, the administrator password and stores the entered password as a new administrator password; and a log presenter that presents the operation history information when the administrator password has been changed. | 2021-12-09 |
20210382984 | AUTOMATIC PASSWORD RESET USING A SECURITY SYSTEM - A system and method for modification of a passcode for accessing the system are provided. The system includes a premises control unit. The premises control unit including control processing circuitry configured to: receive an expected code message, the expected code message instructing an initiation to monitor for an input from a user, receive a input code that is input by the user, determine whether the input code matches a predefined verification code, and if the input code matches the predefined verification code, cause transmission of a verification message to a monitoring server, the verification message indicating the input code matched the predefined verification code and triggering the monitoring server to allow a passcode for accessing the system to be modified. | 2021-12-09 |
20210382985 | Virus immune computer system and method - A method and apparatus prevents hacker code from infecting an application program by requiring decryption of the application program prior to running the application program on a computer. The method includes steps of: providing a security device that is a separate unit from components necessary to operate the computer; storing a symmetric private key on the security device; using the device symmetric private key to produce an encrypted application program upon first installation; thereafter decrypting that part of the encrypted application program needed implement a command to run the application program; and, decrypting, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program. | 2021-12-09 |
20210382986 | Dynamic, Runtime Application Programming Interface Parameter Labeling, Flow Parameter Tracking and Security Policy Enforcement - A dynamic API security policy is enforced at runtime. This can be done without having access to the API specification or code. A flow of execution initiated by the API is tracked at runtime, and a data object used by the API is identified. Specific data labels are assigned to specific fields of the data object used by the API. The specific data labels consistently identify data fields of specific types. The API security policy that is enforced prohibits specific actions concerning data fields of specific types, which are also consistently identified in the security policy. Actions in the tracked flow of execution that violate the API security policy are detected at runtime, and security actions are taken in response. In some implementations, these dynamic API security techniques are supplemented with static API security analysis of an API specification and a set of rules concerning API risk assessment. | 2021-12-09 |
20210382987 | PROCESSOR EXTENSIONS TO PROTECT STACKS DURING RING TRANSITIONS - A processor implementing techniques for processor extensions to protect stacks during ring transitions is provided. In one embodiment, the processor includes a plurality of registers and a processor core, operatively coupled to the plurality of registers. The plurality of registers is used to store data used in privilege level transitions. Each register of the plurality of registers is associated with a privilege level. An indicator to change a first privilege level of a currently active application to a second privilege level is received. In view of the second privilege level, a shadow stack pointer (SSP) stored in a register of the plurality of registers is selected. The register is associated with the second privilege level. By using the SSP, a shadow stack for use by the processor at the second privilege level is identified. | 2021-12-09 |
20210382988 | ROBUST MONITORING OF COMPUTER SYSTEMS AND/OR CONTROL SYSTEMS - A system and method are provided for monitoring the operational status of a computer system and/or control system. The method includes detecting at least one time-variable signal in the computer system and/or control system and forwarding it to a hardware module operating independently of the computer system and/or control system. The method also includes forming a summary statistics of the signal by the hardware module over a predetermined period of time and checking an extent of the summary statistics relative to a normal state and/or nominal state of the computer system and/or control system. The method also includes evaluating an operating state of the computer system and/or control system based on the checking. | 2021-12-09 |
20210382989 | MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM - A system and a method provide multilevel consistency check for a cyber attack detection in an automation and control system wherein the multilevel consistency check of sensor measurements, commands and settings on different automation devices on a plant floor is able to provide end-to-end intrusion detection on exchanged data. The multilevel consistency check includes a measurement consistency check and a commands and settings consistency check to enable a cyber security solution for industrial control systems (ICS). An alarm is set when detecting a first value inconsistent from a second value. An anomaly is detected based on at least one of the measurement consistency or the commands and settings consistency and it is identified as an intrusion detection. | 2021-12-09 |
20210382990 | DYNAMIC MONITORING AND SECURING OF FACTORY PROCESSES, EQUIPMENT AND AUTOMATED SYSTEMS - A system including a deep learning processor receives one or more control signals from one or more of a factory's process, equipment and control (P/E/C) systems during a manufacturing process. The processor generates expected response data and expected behavioral pattern data for the control signals. The processor receives production response data from the one or more of the factory's P/E/C systems and generates production behavioral pattern data for the production response data. The process compares at least one of: the production response data to the expected response data, and the production behavioral pattern data to the expected behavioral pattern data to detect anomalous activity. As a result of detecting anomalous activity, the processor performs one or more operations to provide notice or cause one or more of the factory's P/E/C systems to address the anomalous activity. | 2021-12-09 |
20210382991 | RESPONSE TO OPERATING SYSTEM INTRUSION - The disclosure relates to a data processing apparatus. The data processing apparatus may comprise a memory storing a candidate service level response to an intrusion to an operating system having a plurality of operating system services. The data processing apparatus may comprise processing circuitry coupled to the memory. The data processing apparatus may comprise an output coupled to the processing circuitry. It may be that the processing circuitry is to, depending on an alert indicative of the intrusion: select from the memory, for an operating system service of the said plurality of operating systems, the said operating system service being related to the alert, the candidate service level response to the intrusion; and provide a signal to the output depending on the candidate service level response selected in respect of the said operating system service. | 2021-12-09 |
20210382992 | Remote Analysis of Potentially Corrupt Data Written to a Storage System - An illustrative method includes a storage system detecting an anomaly associated with data written to the storage system; providing, based on the detecting of the anomaly, the data to a data analysis system remote from the storage system, the data analysis system configured to perform a corruption analysis of the data; and performing, based on the corruption analysis of the data, an operation with respect to the data. | 2021-12-09 |
20210382993 | System and Method for Detecting a Malicious File - A system and a method for analyzing files using visual cues in the presentation of the file is provided. These visual aids may be extracted using a convolutional neural network, classified, and used in conjunction with file metadata to determine if a provided document is likely to be malicious. This methodology may be extended to detect a variety of social engineering-related attacks including phishing sites or malicious emails. A method for analyzing a received file to determine if the received file comprises malicious code begins with generating an image that would be displayed if the received file is opened by the native software program. Then the image is analyzed, and output is generated. Metadata is also extracted from the received file. Then, a maliciousness score is generated based on the output, the metadata, and a reference dataset. | 2021-12-09 |
20210382994 | METHODS AND APPARATUS FOR INTERFERING WITH MALWARE USING DISPLACED DISPLAY ELEMENTS - Methods and apparatus for interfering with malware using displaced display elements are disclosed. In an example, a processor is configured to change a location of a displayed pointer by a first offset vector from a hidden true pointer. The processor is also configured to change a location of at least one application display element, such as a website “Submit” button, by a second offset vector from a hidden true application element. The first offset vector may have a similar magnitude as the second offset vector but an opposite direction Changing a location of a pointer and the application element by the offsets enables a user to interact with the application normally. However, the offsets prevent malware or a malicious application from interacting with the application. | 2021-12-09 |
20210382995 | Host Anomaly-Based Generation of Snapshots - An illustrative method includes a data protection system detecting a request provided by a host to perform an operation with respect to a storage system, detecting, based on the request, an anomaly associated with the host, and directing, based on the detecting the anomaly associated with the host, the storage system to generate a recovery dataset for data maintained by the storage system. | 2021-12-09 |
20210382996 | ACCESS TO FIRMWARE SETTINGS WITH ASYMMETRIC CRYPTOGRAPHY - An example computing device includes a user interface, a network interface, a non-volatile memory, a processor coupled to the user interface, the network interface, and the non-volatile memory, and a set of instructions stored in the non-volatile memory. The set of instructions, when executed by the processor, is to perform a hardware initialization of the computing device according to a setting, establish a local trust domain and a remote trust domain, use a local-access public key to issue a challenge via the user interface to grant local access to the setting, and use a remote-access public key to grant remote access via the network interface to remote access to the setting. | 2021-12-09 |
20210382997 | METHOD AND APPARATUS FOR PROVIDING VISIBILITY OF SECURITY INTO CONTAINER IMAGES - A method and apparatus for providing security visibility into a container image. The method includes generating a software list by analyzing layers forming a container image, generating a vulnerability check result based on the software list, and generating a container image content report based on the software list and the vulnerability check result. | 2021-12-09 |
20210382998 | SYSTEM FOR MONITORING NETWORKED COMPUTING DEVICES WITH INTEGRATED ELECTRONIC DATA ENCRYPTION AND DECRYPTION MECHANISM - A system for monitoring networked computing devices with integrated electronic data encryption and decryption mechanism is provided. In particular, the system may comprise one or more host applications which may interact with an API layer to transmit encrypted host-related data through a secure data rails to a consolidated data repository. One or more downstream monitoring applications may retrieve and decrypt the host-related data from the consolidated data repository for analysis. In this way, the system may provide a secure, scalable way to monitor host computing systems and flow of sensitive electronic data. | 2021-12-09 |
20210382999 | SECURITY SYSTEM AND METHOD FOR PROTECTING A VEHICLE ELECTRONIC SYSTEM - Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious messages at ECUs, in particular at the safety critical ECUs. The security system includes a filter which prevents illegal messages sent by any system or device communicating over a vehicle communications bus from reaching their destination. The filter may, at its discretion according to preconfigured rules, send messages as is, block messages, change the content of the messages, request authentication or limit the rate such messages can be delivered, by buffering the messages and sending them only in preconfigured intervals. | 2021-12-09 |
20210383000 | METHOD, SERVER AND SYSTEM FOR SECURING AN ACCESS TO DATA MANAGED BY AT LEAST ONE VIRTUAL PAYLOAD - A first server launches, under control of a device user, an execution of a first virtual payload by using a predetermined service provider interface or a first predetermined application programming interface that is associated with the first virtual payload executed by the first server. The first virtual payload generates a first random nonce. The first virtual payload launches an execution of a second virtual payload by using an associated second predetermined application programming interface. The second virtual payload is executed by the first or a second server. The first virtual payload exchanges with the second virtual payload the first random nonce, so as to establish a first secure channel. The invention also relates to corresponding first server and system. | 2021-12-09 |
20210383001 | METHOD AND APPARATUS FOR MULTI-CHANNEL SECURE COMMUNICATION AND DATA TRANSFER - A method, apparatus and computer program product are disclosed to provide for the selective establishment and use of secure communication channels to facilitate the exchange of data objects containing potentially sensitive information in a network environment. In some example implementations, upon detection that the processing of a network entity request implicates the exchange of non-public information amongst one or more other network entities, one or more secure communication channels are established between a secure transfer system and the relevant network entities such that non-public information neither passes to nor resides on system components associated with non-secure network entities. | 2021-12-09 |
20210383002 | INTELLIGENT PLATFORM - An Intelligent Platform (“IP”) comprises a Platform that employs an instance of a Software Defined Device (I-SDD) such that the Values of a set of Variables in an I-SDD shall reflect the Device State of interest at any given time. Whenever the Value of a Variable in I-SDD is changed, it could cause the Device to change to a different Device State. | 2021-12-09 |
20210383003 | GEOGRAPHICALLY CO-DEPENDENT DOCUMENT CONTAINERS - Embodiments of the present invention provide a method, system and computer program product for co-dependent document container management. Co-dependent document container management includes loading into memory of a computer, a document container encapsulating a document, a co-dependency rule assigning a dependency of access to the document upon a specific geographic location, and co-dependency document access program code. The program code of the container may be executed in the memory of the computer causing the retrieval of a geographic position of the computer, the application of the co-dependency rule to the retrieved geographic position and, on condition that the geographic position of the computer satisfies the co-dependency rule, the location of a document viewer registered in the computer to render the document and the direction of the computer to launch the document viewer with the document as input to the document viewer. | 2021-12-09 |
20210383004 | SYSTEMS AND METHODS FOR MANAGING ACCESS RIGHTS FOR A COPY OF AN ORIGINAL DIGITAL DOCUMENT - Embodiments of the present disclosure provide systems and methods for managing access rights for a copy of an original digital document. The method performed by a server system includes receiving a request for generating a copy of an original document. The method includes performing an authorization of the request for generating the copy of the original document based on the access rights associated with the original document. Further, the method includes generating a copy document of the original document upon successful authorization. The method includes determining the access rights defined for the copy document in the original document. The method further includes transmitting the access rights to the copy document. The method includes sending the copy document with the access rights. The access rights set on the copy document facilitate the user to perform document-related operations on the copy document. | 2021-12-09 |
20210383005 | METHODS AND SYSTEMS FOR TENANCY IN A MULTITENANT ENVIRONMENT - Systems, methods and computer program products for controlling access to an organization's data in a multitenant environment are provided. An organization hierarchy is defined at a multitenant platform, the organization hierarchy comprising an organization and a plurality of sites owned by the organization, each of the plurality of sites representing a data isolation boundary for the organization's data. The sites are associated with subscriptions to applications of the multitenant platform. The organization can designate user partitions within the sites, each user partition designating a corresponding set of site users and a corresponding authentication service. the multitenant platform enables access to each subscription of a site only if a site user is authenticated by the authentication service designated in the user partition corresponding to the site user. | 2021-12-09 |
20210383006 | DISTRIBUTION OF USER SPECIFIC DATA ELEMENTS IN A REPLICATION ENVIRONMENT - Aspects include receiving a notification that a value of a data element stored in a source storage location in a source format has been changed to an updated value. The change is replicated to a plurality of target storage locations. The replicating includes, for each of the plurality of target storage locations, determining a target format of the data element in the target storage location. The target format is one of a plurality of different formats, including the source format. Each of the different formats provide a different level of data protection for the data element. In response to determining that the target format is not the same as the source format, the updated value of the data element is converted into the target format, and the updated value of the data element is stored in the target format at the target storage location. | 2021-12-09 |
20210383007 | DATA DELETION AND OBFUSCATION SYSTEM - Systems and methods for obfuscating and/or deleting data records are provided. In one implementation, a method for obfuscating data includes a step of receiving a request from a client to obfuscate data records associated with the client. The data records are stored in one or more databases throughout a network. The method also includes searching for one or more occurrences of the data records appearing throughout the network. Upon determining that the data records can be obfuscated without causing undesirable consequences elsewhere in the network, the method includes obfuscating the one or more occurrences of the data records. | 2021-12-09 |
20210383008 | METHODS AND SYSTEMS FOR ALTERING ACCESS RIGHTS SET ON DIGITAL DOCUMENTS BASED ON TEMPORAL EVENTS - Methods and systems for altering access rights set on a digital document, based on the triggering temporal events are described. The method performed by server system includes accessing access rights information associated with a digital document stored by the publisher in a database. The access rights information includes one or more access rights set on the digital document and access rights alteration rules. The method includes restricting access to the digital document for one or more recipients in response to receiving access requests from one or more recipients based, at least in part, on one or more access rights. The method includes monitoring occurrences of a plurality of the triggering temporal events based, at least in part, on a machine learning (ML) model. The method further includes altering one or more access rights set on the digital document based, at least in part, on the access rights alteration rules. | 2021-12-09 |
20210383009 | Controlling Access To Datasets Described In A Cryptographically Signed Record - In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset. | 2021-12-09 |
20210383010 | Measurement Interval Anomaly Detection-based Generation of Snapshots - An illustrative method includes a data protection system determining a metric associated with operations performed with respect to a storage system during a measurement interval, determining that the metric deviates by more than a threshold amount from a historical baseline metric associated with the storage system, and directing, based on the determining that the metric deviates by more than the threshold amount from the historical baseline metric, the storage system to generate a recovery dataset for data maintained by the storage system. | 2021-12-09 |
20210383011 | HEADPHONES WITH TIMING CAPABILITY AND ENHANCED SECURITY - Presented here is an audio device, such as a headphone, that can create, maintain and use secure data. The secure data can include an amount of time that the user has used the audio device and/or an amount of time allocated to the user. When the amount of time the user has used the audio device exceeds the amount of time allocated to the user, the audio device can stop emitting the audio. The secure data can also include a hearing profile of the user, which ca uniquely identify the user. The secure data associated with the headphone can be encrypted to prevent tampering. | 2021-12-09 |
20210383012 | SYSTEMS AND METHODS FOR IN MEMORY PATTERN MATCHING LANGUAGE TRANSFORMATION - Systems and methods described herein optimize use of computing resources to perform file transformations by using in memory pattern matching. A computing device receives a configuration file for transforming data reports from a data source, creates object instances for commands in the configuration file; and obtains a source document generated from the data source. The computing device performs a single character-by-character scan of the source document and creates an ordered list of matching terms corresponding to the objet instances. Each of the matching terms identifies a location within the source document. The computing device allocates, based on the ordered list of matching terms, a RAM block for transforming the source document and performs operations of the object instances in reverse order of the ordered list of matching terms. The operations include memory move operations within the allocated RAM block. The performing creates a transformed source document for a user. | 2021-12-09 |
20210383013 | COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR QUERYING RESTRICTED-ACCESS DATASOURCES - A computer-implemented method for propagating queries across a plurality of datasources that includes receiving user input via an administrative user interface. The input at least in part defines a plurality of asset paths within the datasources. A plurality of adapters corresponding to the datasources is automatically invoked and the input is automatically consolidated via the adapters for collective invocation in response to queries. A search query is received via an application user interface and the datasources are automatically queried at least in part by invoking the adapters and passing the input and the search query to the adapters. Responsive results for the search query from at least one of the datasources are automatically presented at an end user computing device. | 2021-12-09 |
20210383014 | DEEP LEARNING-BASED DETECTION AND DATA LOSS PREVENTION OF IMAGE-BORNE SENSITIVE DOCUMENTS - The technology disclosed relates to distributing a trained master deep learning (DL) stack with stored parameters to a plurality of organizations, to detect organization sensitive data in images, referred to as image-borne organization sensitive documents, and protecting against loss of the image-borne organization sensitive documents. Disclosed is providing organizations with a DL stack update trainer, under the organizations' control, configured to allow the organizations to perform update training to generate updated DL stacks, without the organizations forwarding images of organization-sensitive training examples, and to save non-invertible features derived from the images, ground truth labels for the images, and parameters of the updated DL stacks. In particular, the technology disclosed relates to receiving, from a plurality of the DL stack update trainers, organization-specific examples including the non-invertible features of the organization-sensitive training examples and the ground truth labels, and using the received organization-specific examples to update the trained master DL stack. | 2021-12-09 |
20210383015 | SHARING INFORMATION ON A NETWORK-BASED SOCIAL PLATFORM - A system and method for sharing information on a network-based social platform is provided. An indication is received from a first user to share information regarding an item on a network-based social platform. The network-based social platform is a platform that allows the first user to communicative couple with other users of the network-based social platform. Profile information of the first user is accessed. A determination of whether the first user is authorized to share the information is made. Based on the first user being authorized, an identifier for the item is added to a list of recommended items that is accessible view the network-based social platform. | 2021-12-09 |
20210383016 | SYSTEMS AND METHODS FOR OBTAINING ANONYMIZED INFORMATION DERIVED FROM DATA OBTAINED FROM EXTERNAL DATA PROVIDERS - Techniques are described for providing access to anonymized user data derived from external data providers. A persona management system generates a searchable data store containing metadata related to a plurality of users of the persona management system. The metadata includes entries indicating: a first identifier of a user of the plurality of users of the persona management system, a second identifier of an external data provider of a plurality of external data providers that possess data related to users of the persona management system, a third identifier of an algorithm that is used to transform data possessed by the external data provider related to the user of the persona management system into one or more transformed data values, and the one or more transformed data values. In response to requests from various data consumers, the persona management system uses the metadata to identify users matching specified search criteria. | 2021-12-09 |
20210383017 | Method and Device for Protecting Data Entered by Means of a Non-Secure User Interface - In the field of payment terminals, a new generation of feature-rich payment terminals is emerging. These payment terminals are mass-produced and the level of security provided for data entry operations is low because the primary function of these communication terminals is not the entry of sensitive data. As a result, the data relating to payment transactions entered via these payment terminals are entered with a level of security that is not adequate as regards the sensitivity of the data entered. Accordingly, a communication terminal is provided, which secures data entered via a user interface of a communication terminal, by transmitting them among a stream of dummy data, and by encrypting all data, those actually entered by a user and the dummy data, before the transmission thereof to a secure data processing device. | 2021-12-09 |
20210383018 | METHOD AND DEVICE FOR PARTIALLY UNMASKING AN OBJECT IN A VIDEO STREAM - A method for partially unmasking an object in a video stream comprises: displaying a first video stream in which objects are covered by privacy masks; receiving user input regarding a selection of an object being covered by a privacy mask, wherein the object has a first portion being associated with a first privacy level and a second portion being associated with a second, higher, privacy level; checking that a permission associated with the user input grants access to video data depicting object portions being associated with the first privacy level; giving access to video data depicting the first portion of the object; and displaying a second video stream which differs from the first video stream in that it includes the video data depicting the first portion of the object, while the second portion of the object is still covered by a privacy mask. | 2021-12-09 |
20210383019 | DYNAMIC SECURITY CONTROLS FOR DATA SHARING BETWEEN SYSTEMS - In an aspect, the present application may describe a method. The method may include: receiving, from a remote computing device, a first indication of consent for an authenticated entity to share data with a first third party server, the first indication of consent associated with a first sharing permission defining a first sharing scope; in response to receiving the first indication of consent: configuring a server to share data for the authenticated entity with the first third party server based on the sharing permission; identifying a first safety score, the first safety score associated with the first third party server; and updating a risk score for the authenticated entity based on the first safety score and the first sharing permission; and sending the updated risk score for the authenticated entity to the remote computing device for display thereon. | 2021-12-09 |
20210383020 | CONTENT CONTROL THROUGH THIRD-PARTY DATA AGGREGATION SERVICES - Aspects include receiving a request from a user to access data that was acquired by a third-party from a data owner, the data in an encrypted format unreadable by the user. In response to receiving the request from the user to access the data, a third-party key from the third-party is requested and a data owner key from the data owner is requested. The third-party key and the data owner key are applied to the data in the encrypted format to generate the data in an unencrypted format readable by the user. The user is provided with access to the data in the unencrypted format. | 2021-12-09 |
20210383021 | ANONYMIZED INTERFACE FOR TICKET BASED AUTHENTICATION - Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time. | 2021-12-09 |
20210383022 | METHOD AND APPARATUS FOR TRAJECTORY ANONYMIZATION BASED ON A TRAJECTORY EXCHANGE TWIST - An approach is provided for data-preserving trajectory anonymization. The approach involves, for example, processing a plurality of location trajectories to determine one or more exchange twists. The plurality of location trajectories are respectively a sequence of locations points determined by a location sensor of a device, and the one or more exchange twists are one or more locations at which at least two trajectories of the plurality of location trajectories match based on a matching criterion. The approach also involves initiating a swapping of one or more trajectory identifiers among the plurality of location trajectories based on the one or more exchange twists to generate anonymized trajectory data. The approach further involves providing the anonymized trajectory data as an output to a location-based service. | 2021-12-09 |
20210383023 | SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT OF PRIVATE DATA - Systems and methods of dynamic management of private data during communication between a remote server and a user's device, including receipt of a request for retrieval of at least one data packet from the user's device, wherein the user's device is configured to provide a response corresponding to the received request, determination of at least one communication data type of the at least one data packet corresponding to the received request, receipt of a privacy preference for the user's device, wherein the privacy preference comprises a list of allowed data packet communication types for sharing during communication, modification of data packets corresponding to requests for sharing of responses that are not compatible with the received privacy preference and maintenance of communication between the remote server and the user's device, with sharing of the modified data packet. | 2021-12-09 |
20210383024 | METHOD AND SYSTEM OF PROVIDING PERSONAL INFORMATION BASED ON BLOCKCHAIN - Provided are a method and system of providing personal information on the basis of a blockchain. The blockchain-based personal information providing method includes making a data privacy-related contract with a user and providing user data, which corresponds to personal information of the user according to the data privacy-related contract, to a service for accessing the user data using a contract with the service. | 2021-12-09 |
20210383025 | Security Systems and Methods for Encoding and Decoding Content - Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content. | 2021-12-09 |
20210383026 | INTEGRITY VERIFICATION OF PRE-COMPILED ARTIFICIAL INTELLIGENCE MODEL BLOBS USING MODEL SIGNATURES - Systems, apparatuses and methods include technology that generates a signature based on one or more characteristics of an artificial intelligence (AI) model. The AI model is in a source code. The technology generates a compiled blob based on the AI model and embeds an identifier based on the signature into a metadata field of the compiled blob. | 2021-12-09 |
20210383027 | SECURE DATA EXTRACTION FROM COMPUTING DEVICES USING UNIDIRECTIONAL COMMUNICATION - A micro data capture device can be configured to operate as a unidirectional connection from a first computing device to a second computing device. The micro data capture device can include a data capture side comprising a first universal serial bus (USB) interface configured to connect to the first computing device so as to extract data from the first computing device. The micro data capture device can further include a monitoring apparatus comprising an interceptor configured to copy data from the data capture side so as to define the unidirectional connection. Further, the micro data capture device can define a data storage side comprising a second USB interface configured to connect to the second computing device so as to transfer data to the second computing device. The data storage side can be configured to receive data from the data storage side via the monitoring apparatus. In some cases, the data capture side has only volatile memory, and the data storage side includes non-volatile memory. Further, the data capture side can be physically separate from the data storage side. | 2021-12-09 |
20210383028 | ANTI-PEEP PATCH - An anti-peep patch includes a privacy protection film and a magnetic area. The privacy protection film (or privacy filter) stands for an anti-peep film for protecting a user's privacy, and the privacy protection film is provided for controlling a light exit at a predetermined angle to protect a message displayed on screen, so that a message or an image displayed on the screen can be seen from the front side, but cannot be seen clearly from the left and right sides, and the magnetic areas on both left and right sides of the privacy protection film magnetically attract an iPad or a mobile device, and the anti-peep patch can be attached onto or removed from the iPad or the mobile device instantly. | 2021-12-09 |
20210383029 | INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING METHOD - An information processing program including: operating on one terminal device; transmitting an approval confirmation requesting approval of external output of an image to one or multiple other terminal devices other than the one terminal device; and outputting the image externally on the basis of a response to the approval confirmation from the other terminal device. | 2021-12-09 |
20210383030 | AUTOMATED IDENTIFICATION OF COOLING HOLES AND TOOLPATH GENERATION - A method of processing a part includes: identifying ( | 2021-12-09 |
20210383031 | COMPUTER IMPLEMENTED METHODS FOR GENERATING 3D GARMENT MODELS - The invention relates to computer implemented methods for generating a garment finish preset comprising assembly instructions for a garment finish for a garment to be fabricated, for automatically generating a garment finish preset comprising assembly instructions for a garment finish for a garment to be fabricated, and for automatically determining at least one candidate from a plurality of garment finish presets, each of said garment finish presets comprising assembly instructions for a garment finish for a garment to be fabricated from garment panels. | 2021-12-09 |
20210383032 | SPOOL RUN ROUTE FINDING IN CAD SYSTEMS - A system can receive selection of endpoints for a spool on a graphical user interface (“GUI”) and attempt to assemble a spool based on the endpoints. To do so, a plugin can execute a route-finding process that traverses routes from the endpoints. The routes can be determined by retrieving connectors from the endpoints and, for each connector, determining what parts are connected. For each connected part, the process can repeat so long as the connected part is not one of the endpoints or already in another route or spool. When the routes are complete, the connected parts can be treated as an assembly of the spool. The GUI can generate a spool sheet that uses the assembly as the spool. | 2021-12-09 |
20210383033 | STRUCTURAL CONSTRUCTION SYSTEM EMPLOYING ARCHITECTURAL MODELING - A method for providing a structure is provided. The method includes determining a set of building requirements applicable to the structure, establishing an architectural plan for the structure using a computing device including establishing on a grid sets of modularized structural and nonstructural walls, establishing doors and windows, and establishing locations for plumbing fixtures such that plumbing fixtures are placed in positions avoiding conflict with structural elements in the set of modularized structural walls. The design also calls for dividing the architectural plan into a series of component parts transportable from a remote location to a property, thereby producing a modularized architectural plan and comparing at least one of the architectural plan and modularized architectural plan to the set of building requirements and assessing whether at least one plan aspect fails to satisfy the set of building requirements. | 2021-12-09 |
20210383034 | AUTOMATED STEEL STRUCTURE DESIGN SYSTEM AND METHOD USING MACHINE LEARNING - The present disclosure may relate to a steel structure design system including an automated design unit having a basic structural analysis model for a steel structure generated by a structural analysis program, the automated design unit being configured to output automatic design result values under an input basic design condition, a machine learning unit configured to machine-learn the automatic design result values to generate a prediction model for the steel structure, and an extended database formed as the result of storing prediction result values under an extended design condition more than the automatic design result values output by the prediction model. | 2021-12-09 |
20210383035 | COMPUTER-IMPLEMENTED METHOD FOR THE PROBABILISTIC ESTIMATION OF A PROBABILITY OF FAILURE OF A COMPONENT, A DATA PROCESSING SYSTEM, A COMPUTER PROGRAM PRODUCT AND A COMPUTER-READABLE STORAGE MEDIUM - A computer-implemented method for probabilistic quantification of probability of failure of a component, especially a gas turbine component, which during operation is subjected to cyclic stress, wherein the component is divided virtually in one or more domains. The method includes: providing or determining for at least one domain, a domain probability density function for crack initiation and providing or determining for the considered domains a domain probability density function for subsequent crack propagation induced failure. Determining for each considered domain a combined domain cumulative distribution function for failure or its probability density function is done by convoluting either both the considered domain probability density functions for crack initiation induced failure and the respective domain probability density function for subsequent crack propagation induced failure, or their integral function. Alternatively, numerical methods for said component failure probabilities include domain-based Monte-Carlo schemes. | 2021-12-09 |
20210383036 | AGRICULTURAL WATER-SAVING PLANNING METHOD BASED ON REMOTELY-SENSED EVAPOTRANSPIRATION - An agricultural water-saving planning method based on a remotely-sensed ET includes the following steps: S | 2021-12-09 |
20210383037 | STRUCTURAL DESIGN SYSTEMS AND METHODS TO DEFINE AREAS OF INTEREST FOR MODELING AND SIMULATION-BASED SPACE PLANNING - Structural design systems, methods, and computer readable media for selective simulation of coverage in a floor plan are disclosed. The system may include a processor configured to: access a floor plan demarcating multiple rooms; perform a machine learning method, semantic analysis, or geometric analysis on the floor plan to identify at least one opening associated with at least one room from the multiple rooms; access a functional requirement associated with the at least one opening; access at least one rule associating the functional requirement with the at least one opening; define at least one area of interest or disinterest using the at least one rule and the functional requirement; access a technical specification associated with the functional requirement; generatively analyze the at least one room, the technical specification and the area of interest or disinterest to define a solution that conforms to the functional requirement; and output the solution. | 2021-12-09 |
20210383038 | METHOD FOR THE THEORETICAL ANALYSIS OF A PROCESS APPARATUS THROUGH WHICH FLUID FLOWS - The present invention relates to a method for the theoretical analysis of a process apparatus through which fluid flows, wherein a theoretical, in particular numerical simulation of the apparatus or of at least one part of the apparatus is carried out, wherein at least one element of the apparatus which does not comprise concrete as a material is replaced in the theoretical simulation by at least one concrete element which is manufactured from concrete, and wherein a load analysis of the apparatus is carried out with the aid of the theoretical simulation. | 2021-12-09 |
20210383039 | METHOD AND SYSTEM FOR MULTILAYER MODELING - A method and a system for multilayer modeling are provided. The system includes a processing unit and a model building and training unit. The processing unit is configured to obtain an original data from a storage unit, obtain plural data sets of the fundamental combinations, plural data sets of the partial combinations and a data set of the full combination from the original data according to plural categorical variables of the original data, and divide the data set of each of the fundamental combinations, the data set of each of the partial combinations and the data set of the full combination into a training data set, a validation data set and a testing data set to obtain plural training data sets, plural validation data sets and plural testing data sets. The model building and training unit is configured to build plural models respectively according to the training data sets. | 2021-12-09 |
20210383040 | APPARATUS AND METHOD FOR DETERMINING FRICTION COEFFICIENT OF BRAKE FRICTION MATERIAL - An apparatus and a method can accurately estimate and determine a friction coefficient of a brake friction material in real time taking into consideration current driving conditions of a vehicle. The apparatus includes a model generation device configured to generate a friction coefficient meta model to determine the friction coefficient based on information of an operation state of a brake using raw data acquired through a preceding test evaluation process. | 2021-12-09 |
20210383041 | IN-SITU THERMODYNAMIC MODEL TRAINING - Using processes and methods described herein, a digital twin of a physical space can train itself using sensors and other information available from the building. In some embodiments, a system to be controlled comprises a controller that is connected to sensors. This controller also has a thermodynamic model of the system to be controlled within memory associated with the controller. The thermodynamic model has neurons that represent distinct pieces of a controlled space, such as a piece of equipment or a thermodynamically coherent section of a building, such as a window. The neurons represent these distinct pieces of the controlled space using parameter values and equations that model physical behavior of state with reference to the distinct piece of the controlled state. A machine learning process refines the thermodynamic model by modifying the parameter values of the neurons, using sensor data gathered from the system to be controlled as ground truth to be matched by behavior of the thermodynamic model. The thermodynamic model may be warmed up by running the model using state data as input. | 2021-12-09 |
20210383042 | CREATING EQUIPMENT CONTROL SEQUENCES FROM CONSTRAINT DATA - A structure thermodynamic model, which models the physical characteristics of a controlled space, inputs a constraint state curve which gives constraints, such as temperature, that a controlled space is to meet; and outputs a state injection time series which is the amount of state needed for the controlled space to optimize the constraint state curve. The state injection time series curve is then used as input into an equipment model, which models equipment behavior in the controlled space. The equipment model outputs equipment control actions per control time (a control sequence) which can be used to control the equipment in the controlled space. Some embodiments train the models using training data. | 2021-12-09 |
20210383043 | METHOD AND SYSTEM FOR PROCESSING VEHICLE TEST DATA OF A VEHICLE - A method for processing vehicle test data of a vehicle, in which a cloud-based storage and computing device that is communicatively connected to the vehicle via a data network is provided with a multiplicity of modelling vehicle test data that are provided by a plurality of control devices and/or sensor devices of the vehicle. The cloud-based storage and computing device analyzes the received modelling vehicle test data and takes these modelling vehicle test data as a basis for generating test-case-specific edge analytics algorithms in an automated manner and transmits the algorithms to an edge analytics computing device inside the vehicle via the data network. The edge analytics computing device receives a multiplicity of vehicle test data from the control devices and/or the sensor devices during the performance of test or trial drives by the vehicle and evaluates the data by way of the edge analytics algorithms. | 2021-12-09 |
20210383044 | System And Method For Testing The Technical Applicability Of Intellectual Property Rights - A system for testing the technical applicability of intellectual property rights having a computational linguistics module, which is designed to receive chains of technical graphemes and/or digitized symbolic images of intellectual property right specifications as input information, and to mechanically transfer the input information into an information model, an ontology memory, which is designed to store taxonomies, which are linked via inference rules, of conceptual classified object types, a semiotics module, which is coupled to the computational linguistics module and the ontology memory and which is designed to instantiate semiotic signs included in the information model, which is generated by the computational linguistics module, using conceptual classified object types stored in the ontology memory, and to create a contextualized information model, a construction module, which is coupled to the semiotics module and which is designed to generate a CAD model from the contextualized information model created by the semiotics module, and a 3D printing device, which is coupled to the construction module and which is designed to additively manufacture a product, which is encoded by the CAD model. | 2021-12-09 |
20210383045 | INTEGRATED SIMULATOR AND ANALYSIS AND OPTIMIZATION ENGINE - A signoff process includes: accessing circuit information of a circuit; performing, using an analysis and optimization engine, power analysis and optimization on the circuit to generate an optimized circuit, the power analysis and optimization being performed using an input pattern; performing, using a simulator, a simulation on at least a portion of an optimized circuit, the simulation being performed using the same input pattern; and outputting a simulation result to the analysis and optimization engine; wherein the analysis and optimization engine and the simulator are integrated. | 2021-12-09 |
20210383046 | Systems and Methods for Multi-Bit Memory With Embedded Logic - Systems and method are provided that include a standard cell with multiple input and output storage elements, such as flip flops, latches, etc., with some combination logic interconnected between them. In embodiments, the slave latches on input flip flops are replaced with a fewer number latches at a downstream node(s) of the combination logic resulting in improved performance, area and power, while maintaining functionality at the interface pins of the standard cell. The process of inferring such a standard cell from a behavioral description, such as RTL, of a design or remapping equivalent sub-circuits from a netlist to such a standard cell is also described. | 2021-12-09 |
20210383047 | GUIDING SAMPLE SIZE CHOICE IN ANALOG DEFECT OR FAULT SIMULATION - A method of evaluating sampling sizes for circuit simulation comprises generating a plurality of coverage scenarios based on a defect universe, determining a coverage amount for each of the plurality of coverage scenarios, and associating the plurality of coverage scenarios with a plurality of bins based on the coverage amount for each of the plurality of coverage scenarios. The method further comprises sampling, with a first sampling size, each of the coverage scenarios to determine first sampled coverage scenarios, and determining an error value for each of the plurality of coverage scenarios based on the coverage amount of each of the plurality of coverage scenarios and a coverage amount of a respective one of the first sampled coverage scenarios. Further, the method comprises generating, with a processor and for the first sampling size, a confidence score for each of the plurality of bins based on the error value for each of the plurality of coverage scenarios, and outputting the confidence score for each of the plurality of bins. | 2021-12-09 |
20210383048 | MEMORY DEVICE, INTEGRATED CIRCUIT DEVICE AND METHOD - A memory device includes at least one bit line, at least one word line, and at least one memory cell comprising a capacitor and a transistor. The transistor has a gate terminal coupled to the word line, a first terminal, and a second terminal. The capacitor has a first end coupled to the first terminal of the transistor, a second end coupled to the bit line, and an insulating material between the first end and the second end. The insulating material is configured to break down under a predetermined break-down voltage or higher applied between the first end and the second end. | 2021-12-09 |
20210383049 | METHODS AND APPARATUS FOR REDUCING RELIABILITY DEGRADATION ON AN INTEGRATED CIRCUIT - An integrated circuit with programmable logic circuitry is provided. The integrated circuit may include quiet regions, toggling regions, or unused regions. An integrated circuit may also include heavily-used metal routing paths, lightly-used metal routing paths, and unused metal routing paths. Circuit design tools may be used to generate multiple configuration images that replace the quiet regions with toggling or unused regions, that swap the heavily-used metal routing paths with lightly-used or unused metal routing paths, or that use random fitter seeds of improve the usage coverage to statistically reduce the always quiet regions on the integrated circuit. The multiple configuration images implement the same design and can be used to reconfigure the integrated circuit upon startup to reduce aging effects and improve circuit performance. | 2021-12-09 |
20210383050 | Circuit Layout Techniques - Various implementations described herein are directed to an apparatus having a processor and memory having instructions stored thereon that, when executed by the processor, cause the processor to identify conductive paths in a physical layout of an integrated circuit having nodal features that define a connective structure of the integrated circuit. The instructions may cause the processor to traverse the conductive paths to detect valid metals and redundant metals. The valid metals may refer to valid conductive paths between the nodal features that conjoin the nodal features. The redundant metals may refer to unused conductive paths that provide disjointed paths from the nodal features. The instructions may cause the processor to indicate the valid metals as marked with a first indicator and to indicate the redundant metals as unmarked with a second indicator that is different than the first indicator. | 2021-12-09 |
20210383051 | Automatic Identification Of Hierarchical Cells Based On Selected Properties For Layout Verification - A circuit design in a hierarchical description is analyzed. The analysis comprises identifying electrical properties of circuit blocks in the circuit design. Circuit components of the circuit design are associated with geometric elements of a layout design. Then instances of each of the circuit blocks are classified into groups of instances based on the electrical properties. Rule checking is performed on one or more groups in the groups of instances for each of the circuit blocks by analyzing geometric elements associate with components of one instance for each of the one or more groups. | 2021-12-09 |
20210383052 | METHOD OF CERTIFYING SAFETY LEVELS OF SEMICONDUCTOR MEMORIES IN INTEGRATED CIRCUITS - A method includes specifying a target memory macro, and determining failure rates of function-blocks in the target memory macro based on an amount of transistors and area distributions in a collection of base cells. The method also includes determining a safety level of the target memory macro, based upon a failure-mode analysis of the target memory macro, from a memory compiler, based on the determined failure rate. | 2021-12-09 |
20210383053 | CHECK TOOL AND CHECK METHOD FOR DESIGN RULE CHECK RULE DECK OF INTEGRATED CIRCUIT LAYOUT - Embodiments of the application disclose a check tool and a check method for a Design Rule Check (DRC) rule deck of an integrated circuit layout. The check tool ( | 2021-12-09 |
20210383054 | INTEGRATED CIRCUIT AND METHOD OF MANUFACTURING SAME - An integrated circuit includes a set of gates, a first, second and third conductive structure, and a first, second and third via. The set of gates includes a first, second and third gate. The first, second and third conductive structure extend in the first direction and are located on a second level. The first via couples the first conductive structure and the first gate. The second via couples the second conductive structure and the second gate. The third via couples the third conductive structure and the third gate. The first, second and third via are in a right angle configuration. The first and second gate are separated from each other by a first pitch. The first and third gate are separated from each other by a removed gate portion. The first and second conductive structure are separated from each other in the first direction. | 2021-12-09 |
20210383055 | SYSTEM AND METHOD OF PROVIDING LAYOUT INFORMATION FOR GENERATED IMAGES BASED ON A HYBRID APPLICATION - One or more non-transitory computer readable recording mediums configured to store an application program including instructions, which when executed by an information processing device that has a display part, causes the information processing device to transmit, to a server device, identification information of an object when the object displayed on a screen is selected. The information processing device is further configured to receive layout information relating to arrangement of the object from the server device. The information processing device is further configured to display the object on a screen displayed on the display part by executing a native program included in the application program. The information processing device is further configured to display, when the layout information is received, an object based on the layout information instead of the object displayed by the native program, using a web browser embedded in the application program. | 2021-12-09 |
20210383056 | CONSTRUCTING A PATH FOR CHARACTER GLYPHS - Techniques described herein take character glyphs as input and generate a text-on-a-path text object that includes the character glyphs arranged in a determined order along a path. For instance, a method described herein includes accessing character glyphs in input data. The method further includes determining an order for the character glyphs based on relative positions and orientations of the character glyphs in the input data. The method further includes generating a path for the character glyphs, based on the order, and associating the path with the character glyphs. Further, the method includes generating a text object that includes the set of character glyphs arranged in the order along the path. | 2021-12-09 |
20210383057 | SELECTION DEVICE AND SELECTION METHOD - A calculation unit ( | 2021-12-09 |
20210383058 | SYNCHRONIZATION AND TAGGING OF IMAGE AND TEXT DATA - A computing system accesses an image-based document and a text document having text extracted from the image-based document and provides a user interface displaying at least a portion of the image-based document. In response to selection of a text portion of the image-based document, the system determines an occurrence of the text portion within at least a portion of the image-based document and then applies a search model on the text document to identify the same occurrence of the text portion. Once matched, alignment data indicating a relationship between a selected tag and both the text portion of the image-based document and the text portion of the text document is stored. | 2021-12-09 |
20210383059 | Attribution Of Link Selection By A User - A method comprises: determining, at a web browser, to replace a URL in received webpage code of a first website based at least on an address in an address portion of the URL being to a predetermined tracking domain. The URL includes identification information enabling identification of an address of a second website. The method also comprises: generating a unique tracking value for the URL; replacing the URL in the webpage code with a replacement URL addressed to the second website and including the tracking value in a parameter portion of the replacement URL. The URL is such that a user selection event on a link associated with the replacement URL causes sending of a request including the tracking value to the second website. The second website is configured to extract the tracking value from the request and to provide the tracking value to an attribution system. The method also comprises setting an instruction to respond to the user selection event by causing at least the tracking value to be sent to the attribution system at which the tracking value received from the web browser can be associated with the tracking value received at the second website. | 2021-12-09 |
20210383060 | USER INTERFACE(S) RELATED TO SYNTHESIZING PROGRAMS IN A SPREADSHEET PROGRAMMING LANGUAGE - Techniques are described herein for automatically synthesizing programs that include one or more functions in a spreadsheet programming language. A method includes: receiving first user input in a first cell in a spreadsheet; automatically synthesizing a program using the first user input in the first cell as a first example, where the program includes at least one function in a spreadsheet programming language and, when the program is executed, the program generates output that matches the first example; determining at least one additional cell in the spreadsheet that is related to the first cell; determining that a display triggering condition is satisfied; and in response to the determining that the display triggering condition is satisfied, displaying, in each of the at least one additional cell, an output of the program corresponding to the additional cell. | 2021-12-09 |
20210383061 | NATURAL LANGUAGE PROCESSING SYSTEM, NATURAL LANGUAGE PROCESSING METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A natural language processing system includes a storage device and a processor. The storage device is configured to preload records of failure histories of semiconductor equipment, and the records of the failure histories of the semiconductor equipment include natural language. The processor is electrically connected to the storage device and is configured to perform a natural language process on the records of the failure histories of the semiconductor equipment to generate an abnormal model classification table. | 2021-12-09 |
20210383062 | METHOD FOR TRAINING READING COMPREHENSION MODEL, ELECTRONIC DEVICE, AND STORAGE MEDIUM - The present disclosure discloses a method for training a reading comprehension model, and relates to a field of natural language processing and deep learning technologies. The detailed implementing solution includes: respectively inputting a first training sample of the reference field into a reference reading comprehension model of a reference field and a target reading comprehension model of a target field, to obtain first output data output by the reference reading comprehension model and second output data output by the target reading comprehension model; and performing a first training process on the target reading comprehension model based on a difference between the first output data and the second output data. | 2021-12-09 |
20210383063 | TECHNOLOGY NAME/SERVICE NAME GENERATION DEVICE AND METHOD THEREFOR - Information indicating what technology and service are necessary to solve issues is provided. A technology name and service name generation device includes a synonym dictionary ( | 2021-12-09 |
20210383064 | TEXT RECOGNITION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM - The disclosure provides a text recognition method, an electronic device, and a storage medium. The method includes: obtaining N segments of a sample text; inputting each of the N segments into a preset initial language model in sequence, to obtain first text vector information corresponding to the N segments; inputting each of the N segments into the initial language model in sequence again, to obtain second text vector information corresponding to a currently input segment; in response to determining that the currently input segment has the mask, predicting the mask according to the second text vector information and the first text vector information to obtain a predicted word at a target position corresponding to the mask; training the initial language model according to an original word and the predicted word to generate a long text language model; and recognizing an input text through the long text language model. | 2021-12-09 |