50th week of 2019 patent applcation highlights part 41 |
Patent application number | Title | Published |
20190377805 | User Interface for Shared Documents - A method may include receiving a request, from a document authoring application, for a list of documents shared by a user, the request including a user identification; retrieving the list of documents based on the user identification; for each respective document in the list of documents; retrieving an aggregation of views of the respective document by other users within a period of time; retrieving a number of unique viewers of the respective document within the period of time; determining a set of suggested contacts to share the respective document with according to communication signals between the suggested contacts and the user; transmitting, to the document authoring application in response to the request, the list of documents and their respective total views, unique views, and set of suggested contacts for presentation to the user. | 2019-12-12 |
20190377806 | CRYPTOGRAPHICALLY SECURE MULTI-TENANT DATA EXCHANGE PLATFORM - A method for a server to manage data in a peer-to-peer blockchain network is described herein. The method includes generating, by a multi-tenant web server, an exchange object for the peer-to-peer blockchain network, wherein the exchange object includes a set of exchange fields and a mapping between each exchange field in the set of exchange fields and a field of a physical object associated with each peer in the peer-to-peer blockchain network; generating, by the multi-tenant web server, a transaction object based on the exchange object, wherein the transaction object includes the set of exchange fields and proposes an alternation to a physical object; and making, by the multi-tenant web server, the transaction object available to the peers in the peer-to-peer blockchain network to attempt to obtain consensus for the alteration. | 2019-12-12 |
20190377807 | TRANSFORMING DATA FOR A TARGET SCHEMA - Embodiments generally relate transforming data for a target schema. In some embodiments, a method includes receiving input data, where the input data includes a plurality of segments, and where the segments include a plurality of source fields containing target data. The method further includes characterizing the input data based at least in part on a plurality of predetermined metrics, where the predetermined metrics determine a structure of the input data. The method further includes mapping the target data in the source fields of the segments to a plurality of target fields of a target schema based at least in part on the characterizing. The method further includes populating the target fields of the target schema with the target data from the source fields based at least in part on the mapping. | 2019-12-12 |
20190377808 | System and Method for Using Object References as a Data Type - Described herein is a system and method for using object references as a data type. In response to a request for an object reference for an object by a consuming application, the object reference is generated by a source application. The object reference comprises a data structure comprising an activation uniform resource identifier for activating the referenced object, information for visually representing the object reference, and, optionally, metadata that describes the referenced object. The generated object reference is provided to an operating system component by the source application which provides the object reference to a consuming application. The consuming application can display information regard the object reference in accordance with the information for visually representing the object reference included in the object reference. The user can request reactivation of the object referenced by the object reference. | 2019-12-12 |
20190377809 | RESOLVING VERSIONS IN AN APPEND-ONLY LARGE-SCALE DATA STORE IN DISTRIBUTED DATA MANAGEMENT SYSTEMS - One embodiment provides for a method including processing transactional operations on a key used to determine whether existing data is found for that key. A first time index is updated using unique keys and a start time field of a first appearance of each key from the transactional operations. A deferred update of prior versions of the key is performed for non-recent data upon determining that recent data in the transactional operations is found for the key. | 2019-12-12 |
20190377810 | OPTIMIZED DATA STRUCTURE - A computer implemented method for storing and retrieving data elements in a computer memory comprises configuring, by a processor, the computer memory according to a data structure, the data structure including: a data element array including a plurality of sorted data elements, each data element associated with a position in the data element array; and a cluster element array including one or more cluster elements, each cluster element defined by one of one data element from the data element array or a plurality of continuous data elements from the data element array, wherein each cluster element is associated with a cluster code for determining the position of one or more data elements in the data element array, the cluster code correlating each data element defining the cluster element with the position of the data element in the data element array. | 2019-12-12 |
20190377811 | Method For Registration Of Data In A Blockchain Database And A Method For Verifying Data - The invention comprises a method for registration of data in a blockchain database, in which database transactions are constructed of standard data containers which may have a fixed size, in a system comprising one or more storage nodes for storing at least part of the blockchain database, one or more approval nodes for approving transactions in said blockchain database and a first computer for generating transactions in said blockchain database, said computer having access to said blockchain database and having access to a first private key. The invention further comprises a method for verifying data based on the aforementioned method for registration and a computer program product comprising program code stored on a computer readable medium, said program code comprising computer instructions for performing the method. | 2019-12-12 |
20190377812 | Method and System for Tracking Virtual Reality Experiences - Embodiments disclosed herein generally relate to a system and method for tracking virtual reality experiences. A computing system receives a plurality of location coordinates of a user during a VR simulation. The computing system uploads the plurality of location coordinates to a database. The computing system prompts a client device that an API linking the client device of the user to functionality of the database is available. The computing system receives a query via the API. The computing system translates the received query to a query compatible with the database. The computing system queries the database using the received query for according to criteria set forth in the received query to retrieve a set of location information. The computing system generates a heat map based on the retrieved location information. The computing system prompts the remote client device that the heat map is available for display. | 2019-12-12 |
20190377813 | Systems, Methods, And Devices For Managing Data Skew In A Join Operation - Systems, methods, and devices, for managing data skew during a join operation are disclosed. A method includes computing a hash value for a join operation and detecting data skew on a probe side of the join operation at a runtime of the join operation using a lightweight sketch data structure. The method includes identifying a frequent probe-side join key on the probe side of the join operation during a probe phase of the join operation. The method includes identifying a frequent build-side row having a build-side join key corresponding with the frequent probe-side join key. The method includes asynchronously distributing the frequent build-side row to one or more remote servers. | 2019-12-12 |
20190377814 | ANNOTATED DATASET BASED ON DIFFERENT SENSOR TECHNIQUES - During an annotation technique, an electronic device may receive an optical image associated with an object and other sensor information associated with the object, where the optical image and the other sensor information have associated timestamps that are concurrent or in close temporal proximity. Then, the electronic device may identify the object based at least in part on the optical image and/or the other sensor information. Moreover, the electronic device may extract a signature associated with the object from the other sensor information. The signature may include: a range to the object, a first angle to the object along a first axis, Doppler information associated with the object and/or a second angle to the object along a second axis. Next, the electronic device may store annotation information associated with the identified object and the extracted signature in a data structure in memory. | 2019-12-12 |
20190377815 | STORING DATA ITEMS AND IDENTIFYING STORED DATA ITEMS - In one aspect, a data item is written to a data chunk of a stream segment. The stream segment includes a stream segment header and a plurality of data chunks. A first identifier of the data item is written to the stream segment header of the stream segment. A second identifier of the data item is written to a header of the data chunk of the stream segment. In another aspect, a stream segment header of a stream segment is queried with a query identifier. The querying identifies if any of the data items in the data chunks of the stream segment have the query identifier. If any of the data items in the data chunks of the stream segment have the query identifier, the data chunks of the stream segment are queried with the query identifier to identify which data chunks of the stream segment have the query identifier. | 2019-12-12 |
20190377816 | Tool for Creating and Deploying Configurable Enrichment Pipelines - A computing system may receive, from a data source, a stream of messages. In turn, the computing system may input each of at least a plurality of the messages in the stream into an enrichment pipeline comprising at least a first enricher and a second enricher. Each enricher may be configured to receive a message, produce a respective enrichment for the message, append the enrichment to the message, and output an updated version of the message containing at least the respective enrichment. The computing system may then produce an enriched stream of messages in which each of at least a plurality of the messages in the enriched stream includes the respective enrichment and output the enriched stream of messages to a data sink. | 2019-12-12 |
20190377817 | Tool for Creating and Deploying Configurable Pipelines - A computing system may provide an interface for creating a data processing pipeline through which the computing system may receive configuration information for a given pipeline that is configured to receive streaming messages from a given data source, process each of the streaming messages, and then output a processed version of at least a subset of the streaming messages to a given data sink. The given pipeline may comprise a chain of two or more operators, which may take the form of enrichers, routers, and/or transformers. The computing system may then use the received configuration information to create the given pipeline. In turn, the computing system may deploy the given pipeline for use in processing streaming messages received from the given data source. | 2019-12-12 |
20190377818 | DATA VISUALIZATION PLATFORM FOR EVENT-BASED BEHAVIOR CLUSTERING - A platform for processing event traces to generate clusters of journey maps for an interactive user display. The clustering can be implemented using a genetic process. The clustering can be implemented using a distance measures. Other clustering techniques can be used. The platform can use the clustering results to generate interactive dynamic visualizations with interactive selectable portions. The platform can integrate processing mining and journey maps to generate interactive dynamic visualizations. | 2019-12-12 |
20190377819 | MACHINE LEARNING SYSTEM TO DETECT, LABEL, AND SPREAD HEAT IN A GRAPH STRUCTURE - Machine learning models, semantic networks, adaptive systems, artificial neural networks, convolutional neural networks, and other forms of knowledge processing systems are disclosed. An ensemble machine learning system is coupled to a graph module storing a graph structure, wherein a collection of entities and the relationships between those entities forms nodes and connection arcs between the various nodes. A hotfile module and hotfile propagation engine coordinate with the graph module or may be subsumed within the graph module, and implement the various hot file functionality generated by the machine learning systems. | 2019-12-12 |
20190377820 | DEVELOPMENT AND PRODUCTIVE USE OF SYSTEM WITH PARALLEL USE OF PRODUCTION DATA AND ZERO DOWNTIME OF SOFTWARE CHANGES - Methods, systems, and computer-readable storage media for replicating, within a database server, an access schema to provide a clone access schema, during production use of the single system, the access schema providing access to a data schema storing production data, and a configuration schema storing configuration data, providing, within the database server, a clone local repository, a test data schema, and a clone configuration schema, the clone access schema accessing at least a portion of the production data within the data schema through a test union view, and test data within the test data schema through the test union view, and after completion of the test use, switching production use of the system to the clone access schema, the clone configuration schema, and the clone local repository. | 2019-12-12 |
20190377821 | SYSTEM AND METHOD FOR PERSISTENCE AND REPLICATION OF CHANGES TO A DATA STORE - A database replication system comprises a plurality of replica data nodes and a master data node. The master data node is configured with an acknowledgement requirement that comprises an acknowledgement threshold that is less than a total number of data nodes in a plurality of data nodes. The master data node is configured to send, to the plurality of replica data nodes, a transaction log record that includes an update to data in the master database that has not been committed to the master database, receive acknowledgements of the transaction log records and based on a determination that the received acknowledgements of the transaction log record meet the acknowledgement requirement, set the transaction log record as a master node last acknowledged transaction log record in a master node transaction log. The last acknowledged transaction log record can be used to control recovery. | 2019-12-12 |
20190377822 | MULTIPLE CACHE PROCESSING OF STREAMING DATA - A computer provides a first cache area and a second cache area on a cache memory in a data processing system comprising a database repository and the cache memory for the database repository. The computer receives, in a first time window, streaming data and writing the streaming data on the first cache area. The computer prohibits, in the first time window, carrying out synchronization between the first cache area and the database repository. The computer enables, in at least part of the first time window, synchronization between the database repository and the second cache area. The computer enables, upon elapse of the first time window, synchronization between the first cache area and the database repository. | 2019-12-12 |
20190377823 | UNSUPERVISED CLASSIFICATION OF DOCUMENTS USING A LABELED DATA SET OF OTHER DOCUMENTS - Systems and methods for associating an unknown subject document with other documents based on known features of the other documents. The subject document is passed through a feature extraction module, which represents the features of the subject document as a numeric vector having n dimensions. A matching module receives that vector and reference data. The reference data is pre-divided into n groupings, with each grouping corresponding to at least one specific feature. The matching module compares the features of the subject document to features of the reference data and determines a matching grouping for the subject document. The subject document is then associated with that matching grouping. | 2019-12-12 |
20190377824 | SCHEMALESS SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING AND UTILIZING A CHATBOT KNOWLEDGE BASE OR THE LIKE - Schemaless systems and methods for automatically building and utilizing a chatbot knowledge base or the like. Textual analytics tools, such as natural language processing (NLP) and/or deep learning engines, are used to analyze the knowledge base and uncover and highlight gaps, which are turned into topics. Predetermined answers to these queries can then be prepared manually, or by an artificial intelligence (AI) algorithm with alternative database visibility. In this manner, new question-and-answer (Q&A) pairs are generated by the systems and methods in an automated manner, for later use by a chatbot, coaching system, or the like. These processes are iterative. Advantageously, transferring the processes from manual control to automated control greatly conserves resources. | 2019-12-12 |
20190377825 | TAXONOMY ENRICHMENT USING ENSEMBLE CLASSIFIERS - A taxonomy of categories, attributes, and values can be conflated with new data triplets by identifying one or more conflation candidates among the attribute-value pairs within a category of the taxonomy that matches the category of the data triplet, and determining a suitable merge action for conflating the data triplet with each conflation candidate. The task of determining merge actions may be cast as a classification problem, and may be solved by an ensemble classifier. | 2019-12-12 |
20190377826 | DISPLAYING VIDEOS BASED UPON SELECTABLE INPUTS ASSOCIATED WITH TAGS - One or more computing devices, systems, and/or methods for displaying videos based upon selectable inputs associated with tags are presented. For example, a video may be identified. A transcript, associated with the video, may be determined. The transcript may comprise a plurality of text segments. The transcript may be analyzed to generate a plurality of sets of tags associated with the transcript. A plurality of selectable inputs may be generated based upon the plurality of sets of tags. A video interface, comprising the plurality of selectable inputs, may be displayed on a first device. A selection of a first selectable input may be received via the video interface. The first selectable input may be associated with a first tag of the plurality of sets of tags and a first time of the video. A second device may display the video based upon the first time of the video. | 2019-12-12 |
20190377827 | METHOD AND SYSTEM FOR SCALABLE SEARCH USING MICROSERVICE AND CLOUD BASED SEARCH WITH RECORDS INDEXES - A method for searching for information in a relational database includes: identifying a subset of attributes from attributes for each record in the relational database, the subset of attributes including a plurality of search attributes and a plurality of search summary attributes; extracting the subset of identified attributes from each record; creating in a cloud-based non-relational database platform an index instance corresponding to each record in the relational database, wherein each index instance in the cloud-based non-relational database includes the subset of identified attributes indexed to a corresponding record in the relational database; and in response to receiving a search request that includes one or more search attributes, searching the index instances in the cloud-based non-relational database for corresponding records in the relational database; and providing search results that include information from corresponding records in the relational database, wherein the information is associated with the plurality of search summary attributes. | 2019-12-12 |
20190377828 | MANAGING CONTENT ON A SOCIAL NETWORK - Managing content on a social network may include maintaining a database of users of a social network provided over a network interface between a server computing device and the social network. The database records a bias each user has demonstrated with respect to at least one topic. Managing the content may include monitoring reactions to a first post on the social network, determining a first bias factor for the first post based on the reactions to the first post and a corresponding recorded bias from the database of each user that reacts to the first post, and filtering content of a first user's activity stream based on the bias factors of previous posts available for inclusion in the first user's activity stream. | 2019-12-12 |
20190377829 | HYPERLINK VISUAL INDICATOR - A method, computer system, and a computer program product for indicating a hyperlink record is provided. The present invention may include receiving a hyperlink. The present invention may also include searching a data structure including a repository of a plurality of hyperlinks stored in at least one user system, where each hyperlink in the repository of the plurality of hyperlinks includes a hyperlink record having at least one reference to the at least one user system. The present invention may then include identifying a record of the received hyperlink in the searched data structure. The present invention may further include, in response to identifying the record of the received hyperlink within the searched data structure, modifying the received hyperlink to indicate the at least one reference to the at least one user system. | 2019-12-12 |
20190377830 | ADVANCED WEB PAGE CONTENT MANAGEMENT - Controlling contents of interfaces may include receiving multiple interfaces presented on a display screen. The multiple interfaces may include at least one primary task interface and each of the multiple interfaces may present at least one content item. A user engagement level with respect to content items presented via the multiple interfaces may be estimated. A degree of user effectiveness with respect to progression toward completing a primary task presented via the primary task interface may be determined. A content item may be selected from the multiple interfaces based on the user engagement level and the degree of user effectiveness. A presentation of the selected content item may be made in a controlled manner on an unused portion of at least one of the multiple interfaces. | 2019-12-12 |
20190377831 | EFFICIENT IN-MEMORY REPRESENTATION OF COMPUTATION GRAPH FOR FAST SERIALIZATION AND COMPARISON - Embodiments of the present disclosure introduce an offset-based representation for a computation graph of a neural network model. In this representation, the edges in the graph are implemented as offsets to the base address of the graph when the model is loaded into memory rather than pointers to address locations in memory. By replacing the pointer fields with offsets, the model in memory is no longer dependent on the allocation of memory. This overcomes the limitations of performance and/or power that is critical for comparing two models and copying a model to another memory location in latency sensitive applications and in mobile environments. | 2019-12-12 |
20190377832 | Systems and Methods for Enabling a Global Aggregated Search, While Allowing Configurable Client Anonymity - A system can enable a global search of security data of a client base. The system can include a processor operable to record anonymity values set by clients of the client base, and to receive search requests including one or more search parameters from the clients. Upon receipt of a search request, processor can generate a result set for the received search request and determine an aggregated anonymity value for the result set. The processor further may compare the aggregated anonymity value of the results set with a set anonymity value for each of the clients for filtering or removing the data points or information of the one or more clients with the set anonymity value that is greater than the aggregate anonymity value from the result set. | 2019-12-12 |
20190377833 | Mobile platform for home buying tours - Many single family home and condo development companies offer home buying tours as part of their sales and marketing operations. The registration process for potential buyers and their agents is managed individually by each company on various web applications. The Mobile Platform for Home Buying Tours facilitates and streamlines the process of registration for the tours. By allowing the user to register for a tour directly from relevant search results, the Mobile Platform for Home Buying Tours aggregates registrations, conveying the registration data to the development company in a consistent, timely fashion. The development company will then plan for the tour operations. | 2019-12-12 |
20190377834 | METHOD AND SYSTEM FOR MULTIPLE VIEWS COMPUTER-AIDED-DESIGN INCLUDING PROPAGATION OF EDIT OPERATIONS ACROSS VIEWS WHILE ENSURING CONSTRAINTS CONSISTENCY - A method of modifying a CAD system model performed on a data processing system includes receiving a dataset of co-ordinates representing an article in 2d, or in 3d and receiving 2d or 3d constraints respectively, to be applied to any changes to the dataset of co-ordinates for the article. A modification to be applied to the dataset is received and combined with the relevant 2d and 3d constraints to produce a constrained modification for each of the article and associated article. The constrained modification is solved in 2d and in 3d to determine whether a solution exists in which all constraints are met. If the solve is successful, the constrained modification is applied to each dataset simultaneously and, updated datasets are stored. If the solve fails, the constraints may be reduced and the solve step repeated, or the process is terminated. | 2019-12-12 |
20190377835 | STRUCTURAL ANALYSIS TOOL FOR MONO FRAME AND METHOD FOR DESIGNING MONO FRAME - Disclosed is a structural analysis tool for a mono-frame that is provided in a rectangular tube form as a structure for protecting battery cells, which includes an input unit configured to input dimension, weight and stress value data of a reference mono-frame, which are structurally analyzed in advance, and dimension and weight data of a provisionally designed mono-frame; a calculation unit configured to calculate a stress ratio of the reference mono-frame and the provisionally designed mono-frame based on the beam theory by using the data of the reference mono-frame and the data of the provisionally designed mono-frame; and an output unit configured to judge stability of the provisionally designed mono-frame by comparing the stress ratio calculated by the calculation unit with a preset stress ratio reference value. There is also disclosed a mono-frame designing method using the structural analysis tool. | 2019-12-12 |
20190377836 | METHOD OF GENERATION OF AN ENHANCED PLANT MODEL - A method of generating an information enhanced model of an industrial plant. The method includes providing a first digitalized topology of a plant by processing a spatial scan of the plant, wherein in course of the processing, plant structural elements and their interconnections are recognized and digitalized, providing a second digitalized topology of the plant, based on a process and instrumentation diagram, the second topology being representative of plant structural elements and their interconnections, and correlating the first and the second digitalized topology by at least semi-automatically identifying and interlinking corresponding structural elements in the first and second digitalized topology. | 2019-12-12 |
20190377837 | System and Method for Generating Computerized Models of Structures Using Geometry Extraction and Reconstruction Techniques - Described in detail herein are systems and methods for generating computerized models of structures using geometry extraction and reconstruction techniques. The system includes a computing device coupled to a input device. The input device obtains raw data scanned by a sensor. The computing device is programmed to execute a data fusion process is applied to fuse the raw data, and a geometry extraction process is performed on the fused data to extract features such as walls, floors, ceilings, roof planes, etc. Large- and small-scale features of the structure are reconstructed using the extracted features. The large- and small-scale features are reconstructed by the system into a floor plan (contour) and/or a polyhedron corresponding to the structure. The system can also process exterior features of the structure to automatically identify condition and areas of roof damage. | 2019-12-12 |
20190377838 | Method and System for Designing a Distributed Heterogeneous Computing and Control System - A computer-implemented method designs a distributed heterogeneous computing and control system, including both an application and a hardware context and configuring the application in the hardware context. The method is implemented by design software instructions executing in a computer node, associated with an interactive display, to establish an interactive environment utilizing computer processes. The computer processes provide access in the interactive environment to a set of functional modules and a set of primitive modules. The computer processes receive the interactive environment a selection of desired ones of the functional modules and the primitive modules and order them in a manner to characterize the distributed computing and control system as a schematic of a set of devices. The computer processes parse the schematic to produce a set of sub-schematics that each correspond to a distinct device in a set of devices in the distributed computing and control system. The computer processes transmit the set of sub-schematics to the set of devices and configure each device to execute the sub-schematic via a corresponding control program running inside the device. | 2019-12-12 |
20190377839 | EFFICIENT BI-DIRECTIONAL PROPERTY-BASED PATH TRACING - Systems and methods for efficient bi-directional property-based path tracing. The method includes reading a data structure corresponding to a circuit. The method also includes iteratively performing property accounting of properties as voltages propagate across devices in the circuit. The method also includes traversing series chains of similar devices in the circuit to reduce an iteration count and arrive at a circuit stability, wherein the circuit stability is determined when propagated user-specified and computed circuit properties (e.g. shortest distance) remain unchanged between subsequent iterations of the traversing. The method also includes traversing the data structure for propagated user-specified and computed property violations. The method also includes cataloging and reporting these violations in human-readable form. | 2019-12-12 |
20190377840 | TOOL TO CREATE A RECONFIGURABLE INTERCONNECT FRAMEWORK - Embodiments are directed towards a method to create a reconfigurable interconnect framework in an integrated circuit. The method includes accessing a configuration template directed toward the reconfigurable interconnect framework, editing parameters of the configuration template, functionally combining the configuration template with a plurality of modules from an IP library to produce a register transfer level (RTL) circuit model, generating at least one automated test-bench function, and generating at least one logic synthesis script. Editing parameters of the configuration template includes confirming a first number of output ports of a reconfigurable stream switch and confirming a second number of input ports of the reconfigurable stream switch. Each output port and each input port has a respective architectural composition. The output port architectural composition is defined by a plurality of N data paths including A data outputs and B control outputs. The input port architectural composition is defined by a plurality of M data paths including A data inputs and B control inputs. | 2019-12-12 |
20190377841 | CLASSIFICATION OPTIMIZATION METHOD FOR STEEL GRADE FAMILY OF STEEL ROLLING MODEL - Provided is a classification optimization method for steel grade family of a steel rolling model, including: step 1: calculating the deformation rate and deformation resistance of a rolled piece according to rolling process data; step 2: reversing the “equivalently measured” deformation resistance according to the measured roll force; step 3: drawing a scatter plot of data on a graph, and judging whether layer division is reasonable according to distribution characteristics; and step 4: for the unreasonable division of steel grade family, optimizing the existing classification of steel grade family using a new algorithm called line clustering, determining steel grade codes that need to be divided into new family, searching for the shortest distance from a sample point to the curve of each cluster centre based on a Nelder-Mead algorithm, dividing all data points into k subsets according to the principle of proximity, fitting a power curve to each data subset using a least square method, repeating the above steps, and stopping iterating when cluster centrelines obtained by two successive iterations are consistent. The present invention improves the precision of the division of steel grade family of a hot rolled model. | 2019-12-12 |
20190377842 | SIMULATION PROGRAM, SIMULATION METHOD, AND SIMULATION APPARATUS - A simulation method is performed by a computer by using an agent disposed in a virtual space. The method includes: controlling the agent so that the agent behaves in the virtual space under influence of each of a plurality of signs disposed in the virtual space; and determining the influence of each of the plurality of signs on the agent in accordance with an attribute relating to a display mode of the sign and an attribute of the agent. | 2019-12-12 |
20190377843 | ADDITIVE MANUFACTURING INCLUDING COMPENSATION MODELING METHODOLOGY WITH SHAPE TRANSFORMATION - An additive manufacturing (AM) system includes a process distortion compensation computing system and an AM peripheral device. The process distortion compensation computing system determines a digital nominal model that represents a physical target object excluding a distortion, and a digital distortion model that represents the physical target object including at least one distortion. The AM peripheral device forms a three-dimensional (3D) physical object based on a digital compensation model. The process distortion compensation computing system also determines a digital skeletal model indicating a predicted change in at least one of the shape and volume of the nominal model, and generates the digital compensation model based on the skeletal model that compensates for the at least one distortion. | 2019-12-12 |
20190377844 | Pre-Step Co-Simulation Method and Device - A pre-step co-simulation method and device for co-simulation of several subsystems is disclosed, utilizing partial derivatives of replacement subsystems. On this basis, the exact solutions of output variables of the individual subsystems are approximated by evaluation of an Error Differential Equation in order to estimate the future progress of the approximated exact output variables; corresponding input variables are determined by optimization prior to the current co-simulation time increment. The pre-step co-simulation method is realized within a computer-executable program and implemented in a network of computing nodes. | 2019-12-12 |
20190377845 | SURFACE PARTICIPATION ANALYSIS OF SUPERCONDUCTING QUBITS WITH THE BOUNDARY ELEMENT METHOD - Techniques regarding an autonomous surface participation analysis of one or more superconducting qubits using the boundary element method are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a simulation component, operatively coupled to the processor, that can analyze a surface participation of a superconducting qubit by discretizing a conductor-dielectric interface and a dielectric-dielectric interface into a plurality of panels. | 2019-12-12 |
20190377846 | SPEED CONVERTER FOR FPGA-BASED UFS PROTOTYPES - A method for generating FPGA-based prototype systems capable of implementing UFS HS-G4 communication protocols using inexpensive/slow FPGAs. ASIC/SoC-targeted circuit designs are modified to include a speed converter that causes a UFS controller to generate transmitted data streams at one-half operating speed (e.g., 146 MHz) during HS-G4 operations, modifies the transmitted data streams to intersperse filler data values between transmitted data values, and transmits the modified data streams to M-PHY physical interconnect devices (PIDs) at full speed (e.g., 292 MHz). The speed converter also receives full-speed HS-G4 data streams that include both data and filler values and causes the UFS controller to operate at one-half operating speed (e.g., 146 MHz) such that only data values are read. PLD-based prototype systems that include separate M-PHY PIDs mounted on PCBs are efficiently configured to implement the modified circuit design. A prototyping tool automatically incorporates the speed converters into submitted ASIC/SoC-targeted circuit designs. | 2019-12-12 |
20190377847 | CO-MODELING POST-LITHOGRAPHY CRITICAL DIMENSIONS AND POST-ETCH CRITICAL DIMENSIONS WITH MULTI-TASK NEURAL NETWORKS - A method is presented for constructing a deep neural network based model to concurrently simulate post-lithography critical dimensions (CDs) and post-etch critical dimensions (CDs) and to improve the modeling accuracy of each process respectively. The method includes generating lithographic aerial images of physical design layout patterns, constructing a multi-task neural network including two output channels, training the multi-task neural network with the training data of the lithographic aerial images, and outputting simulated critical dimension values pertaining to lithography and etch processes. | 2019-12-12 |
20190377848 | COORDINATES-BASED VARIATIONAL AUTOENCODER FOR GENERATING SYNTHETIC VIA LAYOUT PATTERNS - A method is presented for generating a plurality of physical design layout patterns. The method includes selecting one or more physical design layouts for neural network training, converting the plurality of physical design layout patterns into coordinate arrays, a coordinate array of the coordinate arrays including via center coordinates of vias in a physical design layout pattern of the plurality of physical design layout patterns, training, by employing the coordinate arrays, a variational autoencoder (VAE), and generating one or more new synthetic coordinate arrays by employing the trained VAE, a synthetic coordinate array of the one or more new synthetic coordinate arrays including via center coordinates of vias for a new physical design layout pattern. | 2019-12-12 |
20190377849 | GENERATIVE ADVERSARIAL NETWORKS FOR GENERATING PHYSICAL DESIGN LAYOUT PATTERNS - A method for generating physical design layout patterns includes selecting as training data a set of physical design layout patterns of features in a given layer of a given patterned structure and converting the physical design layout patterns into two-dimensional (2D) arrays comprising entries for different locations in the given layer of the given patterned structure with values representing presence of the features at the different locations. The method also includes training, utilizing the 2D arrays, a generative adversarial network (GAN) comprising a discriminator neural network and a generator neural network. The method further includes generating one or more synthetic 2D arrays utilizing the trained generator neural network of the GAN, a given synthetic 2D array comprising entries for different locations in the given layer of a new physical design layout pattern with values representing presence of the features at the different locations of the new physical design layout pattern. | 2019-12-12 |
20190377850 | SEMICONDUCTOR PACKAGE METAL SHADOWING CHECKS - Embodiments of the invention include methods, systems, and computer program products for checking metal coverage in a laminate structure. Aspects of the invention include receiving, by a processor, metal shadowing rules and a semiconductor package design comprising a plurality of laminate layers, a plurality of metal power shapes, and a plurality of signal lines. Each metal power shape is mapped to one or more cells in a two-dimensional array. The processor determines, for each signal line in the semiconductor package design, whether the metal power shapes satisfy the metal shadowing rules. The processor displays a list of signal lines that do not satisfy the metal shadowing rules. | 2019-12-12 |
20190377851 | EFFICIENT PAYLOAD EXTRACTION FROM POLYNUCLEOTIDE SEQUENCE READS - Systems and techniques for extracting information-containing payloads from DNA or other polynucleotides are provided. Decoding the sequence of payload regions from multiple polynucleotides to obtain encoded information includes sequencing the molecules with a polynucleotide sequencer. Reads generated by the polynucleotide sequencer can include information from multiple different sources mixed together. Primer sequences present in the reads identify which reads contain information from the same source. A computationally efficient technique for finding primer sequences in the reads includes comparing hashes of the reads and hashes of primer sequences to find an approximate location then computing edit distances between the primer sequences and the reads to find an exact location. Reads that include the same primer sequences may be clustered together. Sequences of the payload regions are extracted based on the locations of the primer sequences. | 2019-12-12 |
20190377852 | METHOD FOR WRITING DIGITAL CONTENTS TO A PLURALITY OF STORAGE CARDS AND THE SYSTEM FOR THE SAME - A method for writing digital contents to a plurality of storage card by using a mina console comprises the following steps of: placing a storage card to a respective one of a plurality of card writing devices; writing digital contents to a storage card through a Hub by using a main console; a plurality of cards can be recorded by serially connection or parallel connection so as to increase the writing speed; and placing the storage cards into card readers; and whether the process of writing digital contents is successful being displayed. A system for the same is also included. | 2019-12-12 |
20190377853 | USER-BEHAVIOR-BASED ADAPTIVE AUTHENTICATION - The use of user-behavior-based adaptive authentication may provide more secure user authentication without sacrificing user convenience. A baseline behavior pattern of a user may be identified using a machine learning algorithm based on user behavior data collected by one or more applications on at least one user device of the particular user for a predetermined time period. One or more events that deviate from the baseline behavior pattern of the user during a specific time period are then detected using the machine learning algorithm based on new user behavior data of the user obtained during the specific time period. In response to receiving a request from an application to authenticate a particular user for access or continued access to a resource, an authentication question and a correct answer for the authentication question are generated based on a detail of an event that deviates from the baseline behavior pattern. | 2019-12-12 |
20190377854 | GRAPHICAL FINGERPRINT AUTHENTICATION MANAGER - An authentication system communicatively coupled to an electronic device stores registration information comprising associations between fingerprints and graphics. The authentication system presents a fingerprint-based personal identification pattern (FPIP) on a user interface communicatively coupled to the authentication system. The authentication system records a sequence of fingerprints and compares the sequence of fingerprints to the FPIP using the registration information. The authentication system executes a functionality associated with electronic device in response to matching the sequence of fingerprints to the FPIP according to the registration information. | 2019-12-12 |
20190377855 | BIOMETRIC DEVICE WITH LOW POWER USAGE - A biometrically authorisable device | 2019-12-12 |
20190377856 | VERIFICATION METHOD, VERIFICATION DEVICE, ELECTRONIC DEVICE AND COMPUTER READABLE STORAGE MEDIUM - The present disclosure provides a verification method, a verification device, an electronic device and a computer readable storage medium. The verification method includes: determining whether the movable component is triggered; when the movable component is triggered, moving the infrared camera and the structured light projector toward the outside of the housing along with the bracket to extend from the housing, and initializing the infrared camera and the structured light projector; obtaining an infrared image by the infrared camera; determining whether a human face exists in the infrared image; if yes, determining whether the human face matches the face template of the authorized user, obtaining a laser pattern by the structured light projector and the infrared camera, obtaining a depth image according to the laser pattern, and determining whether the depth image matches the depth template of the authorized user; when both match, determining that the verification is passed. | 2019-12-12 |
20190377857 | LOCKING ENCLOSURE FOR PERSONAL BELONGINGS - A locking enclosure for personal belongings may include a container with a biometric activated lock for providing selected access to the container, with the locking mechanism being programmed to open in response to a predetermined voice. The container may be a wallet, a purse, a backpack, a piece of luggage or a tent, and a locking mechanism on the container may include a voice print a fingerprint or a retinal scan so that when the proper biometric data is acquired, the user may easily access the contents of the container. | 2019-12-12 |
20190377858 | OPTICAL SENSING PERFORMANCE OF UNDER-SCREEN OPTICAL SENSOR MODULE FOR ON-SCREEN FINGERPRINT SENSING - Devices and optical sensor modules are provided for provide on-screen optical sensing of fingerprints by using an under-screen optical sensor module that captures and detects returned light that is emitted by the display screen for displaying images and that is reflected back by the top surface of the screen assembly. Optical collimators are provided in the under-screen optical sensor module to enhance the optical imaging performance. Techniques for reducing the environmental light in the optical sensing are provided. | 2019-12-12 |
20190377859 | ELECTROENCEPHALOGRAPHY (EEG) BASED AUTHENTICATION - A computer-implemented authentication method, the method comprising: matching a brain pattern sequence with a predetermined password to allow access to a system, wherein the brain pattern sequence is calculated by analyzing a signal slope of a slope threshold of the brain activity to determine a timing and a duration of the brain activity. | 2019-12-12 |
20190377860 | MOBILE CREDENTIAL WITH ONLINE/OFFLINE DELIVERY - Providing virtualized credential information includes determining whether a relying party device has access to a network/cloud infrastructure that contains at least some of the credential information, a license holder device providing the virtualized credential information directly to the relying party device in response to the relying party device not having access to the network/cloud infrastructure, and displaying at least some of the subset of credential data on a screen of the device of the relying party. Providing virtualized credential information may also include the license holder device providing authorization data to the relying party device in response to the relying party device having access to the network/cloud infrastructure and determining a preference for the relying party device to receive at least some of the virtualized credential information from the network/cloud infrastructure. | 2019-12-12 |
20190377861 | IMAGE BASED PASSPHRASE FOR AUTHENTICATION - Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user. | 2019-12-12 |
20190377862 | PROVIDING AN AUGMENTED REALITY OVERLAY TO SECURE INPUT DATA - A device may receive an input that indicates a request to initiate a transaction at an ATM device. The device may instruct the user to capture one or more images of the ATM device. The device may determine that an image has been captured and process the image to determine first information that identifies the ATM device. The device may send the first information to a server device and receive a signal that indicates the ATM device has been validated. The device may cause an augmented reality (AR) overlay to be displayed, wherein the AR overlay includes second information related to authenticating the user to the ATM device. The device may determine whether a user action is performed with respect to the second information included in the AR overlay, and perform a device action related to the second information, the ATM device, or the AR overlay. | 2019-12-12 |
20190377863 | PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM - A password input method that includes calling a user space in an internal memory to obtain a password input request and to send the password input request to a security chip connected with the internal memory; calling the user space to receive random keyboard data generated by the security chip according to the password input request, and displaying a randomly arranged keyboard according to the random keyboard data; and calling a kernel space in the internal memory to obtain password coordinate data input through the keyboard and to send the password coordinate data to the security chip, so that the security chip generates a password plaintext of user input according to the password coordinate data and the random keyboard data. | 2019-12-12 |
20190377864 | MULTI-FACTOR AUTHENTICATION DEVICES - A device may receive a request from a first user device to access a protected device. The device may verify a user identity of a user of the first device based on user credentials and determine that an authentication code is needed to authenticate the request to access the protected device. The device may dynamically generate multiple codes and transmit the multiple codes to a second user device associated with the user identity of the user of the first device. A first code, of the multiple codes, may correspond to a correct authentication code needed to authenticate the request to access the protected device. The device may transmit a message including an instruction for identifying the correct authentication code from among the multiple codes, receive a second code from the first device, compare the second code and the first code, and selectively authenticate the request to access the protected device. | 2019-12-12 |
20190377865 | METHOD AND SYSTEM FOR IMPROVED DATA CONTROL AND ACCESS - A method for backing up data includes: receiving, by a driver in a host controller of a data storage device, an indication of a threatening event identifying one or more data files in the data storage device; delaying, by the driver, the threatening event; and backing up, by the driver, the one or more data files in the data storage device, prior to allowing the threatening event. | 2019-12-12 |
20190377866 | ELECTRONIC DEVICE DETECTING PRIVILEGE ESCALATION OF PROCESS, AND STORAGE MEDIUM - An electronic device is disclosed. The electronic device may include a memory, and a processor electrically connected with the memory. The processor may be configured to install an application, allocate identification information, which is included in a preset range, to the installed application, store, at a first address of the memory, the identification information for indicating access privilege to a system resource, monitor the first address during running of a first process of the application, and terminate the first process, when the identification information stored at the first address is not included in the preset range. Moreover, various embodiment found through the disclosure are possible. | 2019-12-12 |
20190377867 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: allowing a third-party to select a training routine for a specific attack of a computing platform, thus defining a selected training routine; analyzing the requirements of the selected training routine to determine a quantity of entities required to effectuate the selected training routine, thus defining one or more required entities; generating one or more virtual machines to emulate the one or more required entities; and generating a simulation of the specific attack by executing the selected training routine. | 2019-12-12 |
20190377868 | INTRUSION DETECTION FOR INTEGRATED CIRCUITS - Certain aspects of the disclosure are directed to methods and apparatuses of intrusion detection for integrated circuits. An example apparatus can include a wired communications bus configured and arranged to carry data and a plurality of integrated circuits. The plurality of integrated circuits can include a first integrated circuit configured and arranged to operate in a scan mode during which the first integrated circuit performs a scan test to detect one or more faults in circuitry of the plurality of integrated circuits. The plurality of integrated circuits can further include a second integrated circuit configured and arranged to operate in a mission mode and supervise data traffic by monitoring communications including data patterns and accesses on the wired communications bus. In response to identifying a suspected illegitimate access, the second integrated circuit can perform a security action to mitigate a suspect illegitimate action in the plurality of integrated circuits. | 2019-12-12 |
20190377869 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: defining a training routine for a specific attack of a computing platform; and generating a simulation of the specific attack by executing the training routine within a controlled test environment. | 2019-12-12 |
20190377870 | SYSTEM AND METHOD FOR REMOTELY DETECTING AN ANOMALY - The following relates generally to defense mechanisms and security systems. Broadly, systems and methods are disclosed that detect an anomaly in an Embedded Mission Specific Device (EMSD). Disclosed approaches include a meta-material antenna configured to receive a radio frequency signal from the EMSD, and a central reader configured to receive a signal from the meta-material antenna. The central reader may be configured to: build a finite state machine model of the EMSD based on the signal received from the meta-material antenna; and detect if an anomaly exists in the EMSD based on the built finite state machine model. | 2019-12-12 |
20190377871 | Container-Based Integrated Management System - Disclosed is a computer program stored in a computer-readable storage medium, which is used for detecting a system abnormality and controlling a causative service in a computing device. In a computer program stored in a computer-readable storage medium, including encoded commands, which causes one or more processors to perform operations for detecting a system abnormality in the computing device when the computer program is executed by the one or more processors of a computer device, the operations may include: an operation of receiving monitoring information for each client from a plurality of clients of the computing device; an operation of comparing each monitoring information for each client with a system monitoring policy; an operation of determining whether the system abnormality occurs based on a comparison result with the system monitoring policy; and an operation of determining to control some clients among the plurality of clients based on the determination of whether the system abnormality occurs. | 2019-12-12 |
20190377872 | MULTIPLEXED - PROACTIVE RESILIENCY SYSTEM - Methods for machine-learned detection and removal of malicious software within a network are provided. Methods may record environment behavior of an application and a plurality of components. The plurality of components may touch the application. Methods may generate a baseline dataset based on the recorded environment behavior. Methods may schedule snapshots of the application. Methods may take snapshots of the application and the components based on the scheduling. Methods may store the snapshots in a repository. Methods may monitor the application and the components, using the stored snapshots, for any deviation in the environment behavior. Methods may detect a deviation in the behavior of the application or components. Methods may take a snapshot, outside of the scheduling, of the application and components upon detection of the deviation. Methods may determine that the deviation is unwarranted. Methods may revert the application and components back to a previous version. | 2019-12-12 |
20190377873 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: utilizing artificial intelligence/machine learning to define a training routine for a specific attack of a computing platform; and generating a simulation of the specific attack by executing the training routine within a controlled test environment. | 2019-12-12 |
20190377874 | GROUPING APPLICATION COMPONENTS FOR CLASSIFICATION AND MALWARE DETECTION - A mobile application is received. Each of a plurality of libraries associated with the mobile application is categorized using a set of library group categorizations including a common group and an uncommon group. An analysis of correlation using the categorized libraries is performed. A determination that the mobile application is similar to another mobile application is determined based on the analysis. | 2019-12-12 |
20190377875 | Image Processing Device and Method for Controlling the Same - An image processing device includes a memory storing a file, and a circuitry configured to execute virus scan on the file stored in the memory. The memory stores information on priority levels set for one or more functions of the image processing device. The circuitry is configured to determine a timing to execute the virus scan in accordance with the priority levels upon receipt of a request for execution of the virus scan and the one or more functions in parallel. | 2019-12-12 |
20190377876 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: detecting a security event within a computing platform based upon identified suspect activity; gathering artifacts concerning the security event; and assigning a threat level to the security event based, at least in part, upon the gathered artifacts. | 2019-12-12 |
20190377877 | WEB BROWSER SCRIPT MONITORING - Various examples are directed to systems and methods for securing a web browser. The web browser may parse web content received from a server and identify a script associated with the web content. The web browser may generate script fingerprint data for the script. The script fingerprint data may comprise script code data describing script code for the script and script syntax data describing the script. The web browser may determine that the script fingerprint data is not described by local known script data and may send an anomalous script report to the server, where the anomalous script report comprising the script fingerprint data. The web browser may also update the local known script data to describe the script fingerprint data. | 2019-12-12 |
20190377878 | Secure Drive - An apparatus and method of a secure drive is provided. The system includes a gate array, a non-volatile memory drive, and a power source. The non-volatile memory drive has secure, operational, and persistent memory spaces. The secure memory space is programmed with an encryption key and an encrypted disk image. In response to a power cycle, the gate array reads the encrypted disk image from the secure memory, authenticates the disk image using the encryption key, decrypts the encrypted disk image, and writes the decrypted disk image to the operational memory. The decrypted disk image is used to boot a computer. The computer is booted to a known good state each time the power is cycled. | 2019-12-12 |
20190377879 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 2019-12-12 |
20190377880 | SYSTEMS AND METHODS FOR MACHINE LEARNING BASED APPLICATION SECURITY TESTING - Discloses are systems, methods and computer readable mediums for automated verifications of potential vulnerabilities of one or more sites or code utilizing one or more neural networks. The systems, methods and computer readable mediums can transmit one or more scan operations to one or more sites, receive one or more responses to the one or more scan operations, tokenize the one or more responses, transmit to one or more neural networks the one or more tokenized responses, receive from the one or more neural networks verification of the one or more tokenized responses, and determine one or more confidences of the one or more verified responses. | 2019-12-12 |
20190377881 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving a unified query from a third-party concerning the plurality of security-relevant subsystems; distributing at least a portion of the unified query to the plurality of security-relevant subsystems; and effectuating the at least a portion of the unified query on each of the plurality of security-relevant subsystems to generate a plurality of result sets. | 2019-12-12 |
20190377882 | THREAT MITIGATION SYSTEM AND METHOD - A computer-implemented method, computer program product and computing system for: displaying initial security-relevant information that includes analytical information; allowing a third-party to manipulate the initial security-relevant information with automation information; and generating revised security-relevant information that includes the automation information. | 2019-12-12 |
20190377883 | END-TO-END CHANGE TRACKING FOR TRIGGERING WEBSITE SECURITY REVIEW - An end-to-end request path associated with an application frontend is determined. A change to a service in the end-to-end request path is identified. A weight value to associate with the change is determined based at least in part on the characteristics of the change. The weight value is aggregated with weight values associated with other code changes is obtained from aggregating the weight value with the weight values of other code changes to produce a collective weight of the code changes. A security review is determined to be triggered based at least in part on the collective weight reaching a value relative to a threshold. | 2019-12-12 |
20190377884 | OBLIVIOUS ARRAY SHUFFLING IN TRUSTED EXECUTION ENVIRONMENTS - A method of approximate address shuffling of an array includes receiving an array having an array size and non-null elements located in initial locations. The method includes receiving a pseudo-random function (PRF) key and initializing an output array to null. The method includes shuffling the non-null elements to generate shuffled locations for the non-null elements. The shuffling may include determining an intermediate shuffled location for a first non-null element. If a location in the output array corresponding to the intermediate shuffled location is null, the shuffling may include outputting a shuffled location as the intermediate shuffled location. If not, the shuffling may include generating an updated intermediate shuffled location. The method includes returning the output array having the first non-null element the location in the output array corresponding to the shuffled location. | 2019-12-12 |
20190377885 | Systems and Methods for Controlling Data Exposure Using Artificial-Intelligence-Based Modeling - Systems and methods for controlling the exposure of data privacy elements are provided. The systems and methods may generate an artificial profile model. The artificial profile model may include a constraint for generating new artificial profiles. A signal may be received indicating that a computing device is requesting access to a network location. One or more data privacy elements associated with the computing device can be detected. An artificial profile can be determined for the computing device. The artificial profile may be usable to identify the computing device. The one or more data privacy elements may be automatically modified according to the constraint included in the artificial profile model. The method may include generating a new artificial profile for the computing device. The new artificial profile may include the modified one or more data privacy elements. The new artificial profile may mask the computing device from being identified. | 2019-12-12 |
20190377886 | Object Storage System with Secure Object Replication - Example distributed object storage systems and methods provide secure object replication. Data objects are encrypted for reading and decrypted for writing to prevent unwanted data access by a replication user credential that does not need access to the user data. During an object storage operation for reading and writing an identified data object, read operations are encrypted to create an encrypted data object corresponding to the identified data object. The encrypted data object may be moved between a first storage node and a second storage node. The encrypted data object is decrypted during write operations to write the identified data object to the second storage node. A user credential in the object storage operation may identify a replication user credential for selectively encrypting and decrypting the identified data object. | 2019-12-12 |
20190377887 | ACCESS CONTROL TOOL - An apparatus includes a memory and a hardware processor. The memory stores security restrictions. The processor detects that a user attempted to access a third-party application that does not use the stored security restrictions and communicates the stored security restrictions to the third-party application. The processor also receives a message indicating that the third-party application registered the security restrictions, determines, based on the stored security restrictions, that the user should be granted access to the third-party application, and in response to the determination that the user should be granted access to the third-party application, redirects the user to the third-party application. | 2019-12-12 |
20190377888 | RAPID CONTENT DEPLOYMENT ON A PUBLICATION PLATFORM - A system for rapid deployment of content on a common publication platform. The system includes a rapid content deployment application hosted on a stand-alone or networked computer that is interfaced with the common publication platform. The rapid content deployment application includes a receiver to receive a file for publication on the common publication platform, a file existence checker to verify existence of a collaboration file on the common publication platform compatible with the received file, and a file preparer to prepare the received file for uploading to the common publication platform in compliance with one or more of governance, security, and change management policies including access control and authorization policies. The rapid content deployment application further includes a file uploader to upload the prepared file to the common publication platform for publication. | 2019-12-12 |
20190377889 | VERIFIABLE VERSION CONTROL ON AUTHENTICATED AND/OR ENCRYPTED ELECTRONIC DOCUMENTS - The present invention concerns a method for encrypting files performed by a client computer, the method comprising encrypting at least a part of the content of a file into a change-set data structure using a secret key shared among a plurality of users, and signing the change-set data structure using a private signing key of a user of the client computer. The invention also concerns a method for decrypting files performed by a client computer, the method comprising receiving a change-set data structure, verifying a digital signature of the change-set data structure using a public verification key of a user who created the change-set, and decrypting an encrypted data portion of the change-set data structure to obtain the file using a secret key shared among a plurality of users. | 2019-12-12 |
20190377890 | RULE SET-BASED AUTHORIZATION FOR DATA POOL - Techniques are described for pooling data originating from different entities into a data pool managed by a data pool management system for performing accurate and resource-efficient statistical and other data operations by entities. Techniques further include maintaining rule sets that govern access to the data sets of the data pool. The DPMS uses the rule sets to determine whether a particular data set, on which a particular operation is requested to be performed, qualifies as authorized data for the requesting entity. In an embodiment, the DPMS determines, based on one rule set, that the particular data set does not qualify as authorized data for the particular operation. The DPMS further determines that based on another rule set the particular data set does qualify as authorized data for the particular operation. Based on determining that authorizing rule set overrides the non-authorizing rule set, DPMS proceeds to performing the particular operation using the particular data set. | 2019-12-12 |
20190377891 | ROW-LEVEL AND COLUMN-LEVEL POLICY SERVICE - Example embodiments relate to a policy service employed to perform operations to: generate and maintain a data-set that comprises at least a column and a row that intersect at a cell; assign an access policy to a row or column of the data-set, wherein the access policy is defined by one or more access credentials required to receive access the cell that intersect with the row or column; receive a request to read the data-set from a user account, wherein the user account has an associated credential; filter the cell that intersects with the row or column of the data-set based on the access policy and the credential of the user account, in response to receiving the request from the user account; and provide the user account with access to the filtered data-set. | 2019-12-12 |
20190377892 | ENCRYPTION FOR A DISTRIBUTED FILESYSTEM - A computing device comprising a frontend and a backend is operably coupled to a plurality of storage devices. The backend comprises a plurality of buckets. Each bucket is operable to build a failure-protected stripe that spans two or more of the plurality of the storage devices. The frontend is operable to encrypt data as it enters the plurality of storage devices and decrypt data as it leaves the plurality of storage devices. | 2019-12-12 |
20190377893 | SYSTEMS AND METHODS FOR DETECTING, TRACKING, AND ANALYZING ACCESS TO DIGITAL INFORMATION - A method for detecting and tracking access to digital information to identify and limit data loss includes defining, at a host device, an access policy associated with accessing files on a network. The host device automatically receives a signal in response to a triggering event associated with a file being acted on by an electronic device. The signal includes data associated with (1) a request for a resource stored at a predetermined location within the network, (2) the file, and (3) the electronic device. The data associated with the resource request, the file, and the electronic device is stored in a database. The host device analyzes the data stored in the database to define an analyzed data set associated with the triggering event. The host device defines an alert in response to one or more characteristics of the analyzed data set being noncompliant with the access policy. | 2019-12-12 |
20190377894 | XR DEVICE AND METHOD FOR CONTROLLING THE SAME - A XR device and a method for controlling the XR device are discussed. The method includes accessing to a public DB (Database), generating a private DB based on key information of the public DB, where the public DB includes public AR (Artificial Intelligence) information, and the private DB includes private AR information and a whitelist, and acquiring the public AR information or the private AR information. | 2019-12-12 |
20190377895 | METHODS FOR DATA MASKING AND DEVICES THEREOF - Methods, non-transitory computer readable media, and an apparatus that includes obtaining a database and metadata associated with the database in response to a request for data masking. Next, the obtained metadata is compared with the received request to determine when the obtained metadata validates the received request. A data masking operation is performed on the obtained database at a column level when the determination indicates the received request is validated. A record of the performance of the data masking operation on the obtained database at the column level is stored. | 2019-12-12 |
20190377896 | SYSTEMS AND METHODS FOR SECURING DATA IN ELECTRONIC COMMUNICATIONS - Certain embodiments involve data security. For instance, Records having sensitive information can be transformed to generate transformed data using a hashing algorithm. An electronic communication comprising content can be received. Transformed content can be generated by transforming the content. The transformed content can be compared to the transformed data. The transformed content can be determined to match at least one of the transformed records. The electronic communication can be prevented from being transmitted to a network. | 2019-12-12 |
20190377897 | HYBRID COGNITIVE SYSTEM FOR AI/ML DATA PRIVACY - Systems, methods, and devices are disclosed for cognitive collaboration systems on a hybrid node. A query is received by a virtual assistant running on a public cloud, and it is determined whether the query pertains to data available on a public cloud resource, or the query pertains to data available on a private cloud resource. When it is determined that the query pertains to the data available on the public cloud resource, the query is interpreted by using a first model trained on at least one machine learning technique on data from the public cloud. When it is determined that the query pertains to the data available on the private cloud resource, the query is interpreted by using a second model trained on at least one machine learning technique on the data from the private cloud. | 2019-12-12 |
20190377898 | SYSTEM, DEVICE AND METHOD FOR ENFORCING PRIVACY DURING A COMMUNICATION SESSION WITH A VOICE ASSISTANT - A system, device and method for enforcing privacy during a communication session with a voice assistant are disclosed. A user is authenticated via one or more first criteria in response to a request to initiate a communication session with a voice assistant. Periodically during the communication session with the voice assistant, sensor data is acquired. The sensor data is processed to determine a number of persons present in an environment of the voice assistant via one or more second criteria. The communication of private data by the voice assistant is enabled when one person is in the environment and that person is the authenticated user. The communication of private data by the voice assistant is disabled when one person is in the environment and that person is not the authenticated user. When more than one person is present in the environment of the voice assistant, the communication of private data by the voice assistant is only enabled when the environment of the voice assistant is determined to match the one or more predetermined privacy criteria for a multi-person environment. | 2019-12-12 |
20190377899 | METHODS, SYSTEMS, AND MEDIA FOR STORING AND RETRIEVING DATA FROM DISTRIBUTED VAULTS - Methods, systems, and media for storing and retrieving data from distributed vaults are provided. In some embodiments, a method for storing and retrieving data from distributed vaults is provided, the method comprising: generating, by a first user device, a plurality of pieces of a data item, wherein a count N of the plurality of pieces equals a count of vault devices in a group of vault devices, wherein the data item can be reconstructed from a subset of the plurality of pieces, and wherein the data item corresponds to a key to access secure content; for each piece of the data item, transmitting the piece of the data item to a unique vault device; requesting, by a second user device, the subset of the plurality of pieces; generating the data item using the subset of the plurality of pieces; and using the data item to access the secure content. | 2019-12-12 |
20190377900 | Protecting Personally Identifiable Information (PII) Using Tagging and Persistence of PII - A system includes an electronic processor configured to store records in a client database. The records included personally identifiable information associated with entities and a client identifier reference associated with each of the individuals, the personally identifiable information is accessible based on an authorization level associated with a user. The electronic processor is also configured to receive a document containing both non-personally identifiable information and personally identifiable information, parse the document to determine the presence personally identifiable information in the document, verify the access rights of the reader of the document, match the personally identifiable information included in the document with records stored in the client database, substitute the personally identifiable information included in the document with the corresponding client identifier reference referring to the client database, and generate a human-legible view of the document containing the corresponding client identifier reference. | 2019-12-12 |
20190377901 | OBFUSCATING INFORMATION RELATED TO PERSONALLY IDENTIFIABLE INFORMATION (PII) - A system for protecting personally identifiable information (PII) associated with audio, image and video. The system includes an output device and a processor. The processor receives a document including an audio, an image, or a video containing both non-personally identifiable information and personally identifiable information, scans the document for a voice, a face, a graphically rendered text, or a personal attribute, match the voice, face, graphically rendered text, or personal attribute with records in a database to determine whether the voice, face, graphically rendered text, or personal attribute in the document is associated with personally identifiable information. The processor also determines a start time and an end time associated with the presence of the voice or video in response to determining that the voice, or video is associated with PII, generates an obfuscated audio or a video between the start time and the end time, and causes the output device to output the obfuscated audio, graphically rendered text or video. | 2019-12-12 |
20190377902 | Systems and Methods for Controlling Data Exposure Using Artificial-Intelligence-Based Modeling - Systems and methods for controlling the exposure of data privacy elements are provided to generate an artificial profile model. The artificial profile model may include a constraint for generating new artificial profiles. A signal may be received indicating that a computing device is requesting access to a network location. One or more data privacy elements associated with the computing device can be detected. An artificial profile can be determined for the computing device. The artificial profile may be usable to identify the computing device. The one or more data privacy elements may be automatically modified according to the constraint included in the artificial profile model. The method may include generating a new artificial profile for the computing device. The new artificial profile may include the modified one or more data privacy elements. The new artificial profile may mask the computing device from being identified. | 2019-12-12 |
20190377903 | SYSTEM AND METHOD FOR PROCESSING A REQUEST TOKEN - A system and method for processing a request token. The request token includes request data classified into progressively informative data classes. The request token may be processed by a server which executes cycles of evaluation of the request token. Cycles include transmitting the request token, receiving responses to the request token, and, configuring the request token for disclosure of the data classes according to disclosure rules. System and methods for processing pluralities of request tokens are described. | 2019-12-12 |
20190377904 | CIVIL PROJECT AND MATERIALS MANAGEMENT ON A BLOCKCHAIN - An example operation may include one or more of receiving sensory data, identifying one or more operations in a smart contract stored on a blockchain, performing the one or more operations based on the sensory data received, creating a blockchain transaction with a record of the one or more operations performed and the sensory data received, and committing the blockchain transaction to the blockchain. | 2019-12-12 |