50th week of 2021 patent applcation highlights part 42 |
Patent application number | Title | Published |
20210390113 | OBJECT-LEVEL REPLICATION INCLUDING BULK-MODE REPLICATION IN A DATA STORAGE SYSTEM - The described technology is generally directed towards bulk-mode replication of data objects to a destination replication site. When replicating a group of objects, and there is enough object data to fill one or more chunk data structures, bulk-mode data replication is performed, with the destination site replicating the objects into chunk data structures and performing erasure coding to protect the data. This avoids the need for inefficient preliminary data protection scheme at the replication destination. When there are multiple objects to be replicated but not enough object data to fill a chunk data structure, bulk-mode data replication transfers the objects to the destination site for replicating as individual objects. Standard object-level replication can be used for single object replication. The technology thus facilitates high-performance data transfer to destination replication sites and efficient handling of data at the replication destination site. | 2021-12-16 |
20210390114 | DATABASE DATA MODIFICATION REQUEST PROCESSING - A data modification request for modifying data in a primary database is received at the primary database. Based on the data modification request, second data in the primary database is modified to first data. Based on the data modification request, a first log and a second log are generated, where the first log is a simplified log including the first data and the second log is a complete log including the second data. Persistence processing is performed on the first log. A modification result that corresponds to the data modification request is returned. | 2021-12-16 |
20210390115 | ADAPTIVE DISTRIBUTION METHOD FOR HASH OPERATIONS - A method, apparatus, and system for join operations of a plurality of relations that are distributed over a plurality of storage locations over a network of computing components. | 2021-12-16 |
20210390116 | SANITIZING DATABASE STRUCTURES FOR TESTING - A central database system allows users to access and use data stored in a relational database. In order to ensure that the stored data is not detrimentally impacted and that the security of the stored data is maintained, the central database system generates a sanitized copy of the database. The central database system stores and accesses annotation files associated with data tables of the database and a schema identifying the structure of the database. Based on the schema, for each data table, the central database system validates the annotation file. A copy of the data table is created and sanitized corresponding to the annotation file. The sanitized copies of the data tables are used to generate a sanitized copy of the database. The sanitized copy of the database may then be accessed and used by users of the central database system without impacting the relational database. | 2021-12-16 |
20210390117 | RESOURCE MANAGEMENT SYSTEMS AND METHODS - Example resource management systems and methods are described. In one implementation, a resource manager is configured to manage data processing tasks associated with multiple data elements. An execution platform is coupled to the resource manager and includes multiple execution nodes configured to store data retrieved from multiple remote storage devices. Each execution node includes a cache and a processor, where the cache and processor are independent of the remote storage devices. A metadata manager is configured to access metadata associated with at least a portion of the multiple data elements. | 2021-12-16 |
20210390118 | LOCATION SHARING USING FRIEND LIST VERSIONS - Aspects of the present disclosure involve a system and a method for performing operations comprising: storing, on a distributed storage system, a plurality of real-time graph (RTG) instances that include a plurality of device objects, the plurality of device objects comprising a first device object associated with a given user; receiving, by the first device object, a friends list of the given user having a first version identifier; receiving, by the first device object, an update from a client device associated with the given user, the update comprising a friends list version identifier; determining that the first version identifier of the friends list in the first device object mismatches the friends list version identifier in the update; and synchronizing the friends list in the first device object prior to sending one or more messages that include the update to other device objects of the plurality of device objects. | 2021-12-16 |
20210390119 | DATA STREAM PROCESSING - Techniques for partitioning data from a data stream into batches and inferring schema for individual batches based on the field values of each batch are disclosed. The system may infer different schemas corresponding to different batches of data records even though the batches are received from a common data stream or a common data source. The system may infer a schema by determining whether a field contains single values or multiple values. Then the system determines the field type(s) associated with the values. These determinations are then stored in a dictionary generated for each batch. | 2021-12-16 |
20210390120 | NESTED GROUP HIERARCHIES FOR ANALYTICS APPLICATIONS - Techniques for implementing nested group hierarchies for analytics applications are disclosed. In some embodiments, a computer-implemented method comprises: creating a hierarchy object in a semantic layer based on a request comprising a definition for a nested group hierarchy, the definition specifying a hierarchical relationship structure for non-leaf group nodes and at least one leaf node, the non-leaf group nodes and the leaf node(s) corresponding to data stored in a data source in a non-hierarchical structure, the hierarchy object specifying the hierarchical relationship structure based on the definition; generating a query result based on a request comprising an indication of the hierarchy object using the hierarchy object from the semantic layer to retrieve the data from the data source; and causing the query result to be displayed on a computing device using the hierarchy object to display the retrieved data in a hierarchical format indicating the hierarchical relationship structure. | 2021-12-16 |
20210390121 | Method and Apparatus for Hierarchical Generation of a Complex Object - A complex object generator is implemented, for example, as an integrated development environment. The complex object generator includes a hierarchical object relationship data structure describing classes of objects, relationships between the classes of objects, and metrics associated with the classes of objects. The hierarchical object relationship data structure is parsed by parser to create a hierarchy of Java classes. A user interface uses the hierarchy of Java classes to constrain selection of objects and metrics during creation of the complex object. As input is received relative to selected objects and metrics, the complex object is incrementally built. By constraining object and metric selection using the hierarchy of Java classes, the complex object is guaranteed to be valid when built, thus reducing or eliminating the number of errors associated with building complex objects. | 2021-12-16 |
20210390122 | IDENTIFYING UNCERTAIN CLASSIFICATIONS - An improvement of the functionality of a computerized automatic recommendation engine is provided. In particular, a method for identifying uncertain classifications made by a computerized recommendation engine through the utilization of historical solution data, such that they can be flagged for subsequent human review, thereby improving the training process for the recommendation engine, is disclosed. | 2021-12-16 |
20210390123 | EVENT DISPLAY METHOD AND DEVICE - An event display method and an event display device are provided. The method includes: acquiring types of events; setting colors for the events based on the types of the events; grouping the events based on starting times and ending times of the respective events; and displaying the events based on the grouping and colors of the events. According to the embodiments, the event type, event distribution and event duration can be intuitively displayed, the user can quickly screen out valid events and quickly acquire valid information of the events, thereby quickly positioning a fault and determining a cause for the fault. | 2021-12-16 |
20210390124 | METHOD FOR PROCESSING MAP DATA, DEVICE, AND STORAGE MEDIUM - The disclosure discloses a method for processing map data, a device, and a storage medium. The detailed implementing solution includes: determining POI data of bound points of interest (POI) of a road to be marked in response to obtaining a road marking instruction; selecting target POI data from the POI data of the bound POIs based on a scene where a user is located; and rendering a map interface based on road information of the road to be marked and the target POI data, and displaying the map interface rendered. | 2021-12-16 |
20210390125 | Sensitive Data Evaluation - Evaluating risk of sensitive data associated with a target data set includes a computer system receiving a pattern that defines sensitive data and a selection of a data set as the target data set for evaluating. The system determines portions of the target data set from which to select sample data sets and determines, responsive to a confidence limit and sizes of the respective portions of the target data, a size of a sample data set for each respective target data set portion. The system randomly samples the target data set portions to provide sample data sets of the determined sample data set sizes and determines whether there is an occurrence of the sensitive data in each sample data set by searching for the pattern in the sample data sets. The system determines a proportion of the sample data sets that have the occurrence of the sensitive data. | 2021-12-16 |
20210390126 | SECTION-LINKED DOCUMENT CLASSIFIERS - Disclosed herein are system, method, and computer program product embodiments for rapid identification and access to relevant regulatory documents. A data model relating regulatory mandates and requirements to citations appearing within an enforcement document is used to rapidly access specific citations within an enforcement document. In the case of image-based enforcement documents, the originality of these documents is preserved while allowing a user to see where the relevant citations appear in the document images. | 2021-12-16 |
20210390127 | METHODS AND SYSTEMS FOR GENERATING SUMMARIES GIVEN DOCUMENTS WITH QUESTIONS AND ANSWERS - Described herein are systems and methods to enable generation of high-quality summaries of documents that have questions and answers. To help summarize such documents, parsing methods are disclosed that account for different document formats. Question-answer groups are transformed into declarative sentences. Sentence correction can be applied to the declarative sentences. Candidate summary sentences are identified from the declarative sentences, and a subset of the candidate summary sentences are selected for inclusion in a summary. Aspects, segmentation, and augmentation can help with generation and tailoring of summaries. | 2021-12-16 |
20210390128 | GENERATION OF PROCESS MODELS IN DOMAINS WITH UNSTRUCTURED DATA - A computing server configured to process data of a domain from heterogeneous data sources. A domain may store data and schema, domain knowledge ontology such as resource description framework, and unstructured data. The computing server may extract objects from the unstructured data. The computing server may convert the extracted named entities and activities to word embeddings and input the word embeddings to a machine learning model to generate an activity time sequence. The machine learning model may be a long short-term memory. A process model may be generated from the time sequence. The computing server may identify outliers in the process model based on metrics defined by the domain. The computing server may convert transactions without outliers as word embeddings and generate signatures of the transactions using cosine similarity. The computing server may augment the results with the domain knowledge ontology. | 2021-12-16 |
20210390129 | METHODS AND SYSTEMS FOR PERSONALIZED SCREEN CONTENT OPTIMIZATION - Systems and associated methods are described for providing content recommendations. The system selects, using a multi-armed bandit solution model, a first plurality of content categories based on a reward score of each content category. The categories are displayed. When a user selects an item from the displayed categories, the system finds all categories that include the selected item, but rewards only the category with the highest score. The system selects, using the multi-armed bandit solution model, the second plurality of content categories based on the updated reward score of each content category. The categories are then displayed. The system may also repeat the steps to refine the multi-armed bandit solution model. | 2021-12-16 |
20210390130 | GENERATING BREAKPOINTS IN MEDIA PLAYBACK - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining breakpoints in a media item. Methods can include determining a candidate set of breakpoints within a media item. A machine learning model is used to generate a score for each particular candidate breakpoint in the set of candidate breakpoints based on presentation features of the media item. A subset of candidate breakpoints is selected from the set of candidate breakpoints based on the score. A final set of breakpoints is selected from the subset of candidate breakpoints based on a combination of the score for each particular candidate breakpoint and a location of the particular candidate breakpoint relative to a different candidate breakpoint. The final set of breakpoints is stored in a database and during playback of the media item, a digital component is presented when the media item reaches a stored breakpoint. | 2021-12-16 |
20210390131 | METHOD, DEVICE, AND COMPUTER PROGRAM FOR ENCAPSULATING MEDIA DATA INTO A MEDIA FILE - The invention relates to a method of generating a media file, the method comprising: generating a first data structure assigning a subset of samples or subsamples of a track to one or more sample groups; generating a second data structure comprising data for describing each of the one or more sample groups, the first data structure comprising a first grouping type and the second data structure comprising a second grouping type, wherein the second data structure comprises data for indicating whether the data for describing each of the one or more sample groups is invariant along time or not; and generating a media file including the samples, and the first and second data structures | 2021-12-16 |
20210390132 | System for Providing Location-based Multimedia - A system having a computer, a database for storage and retrieval of real estate data, an agent/owner computing device in remote data communication with the computer, at least two geolocations provided to the computer by the agent/owner computing device, a multimedia recording device connected to the agent/owner computing device, at least two multimedia presentations captured by the multimedia recording device and transmitted to the computer by the agent/owner computing device, a route created by software on the agent/owner computing device associating at least one of the multimedia presentations with each of the geolocations, the route uploaded to the computer for storage on the database, a user computing device including a display and speakers for remotely accessing the route through the computer, and a variable presentation path generated by software on the computer by combining a route requested by the user computing device with a geolocation of the user computing device. | 2021-12-16 |
20210390133 | METHOD, APPARATUS AND ELECTRONIC DEVICE FOR ANNOTATING INFORMATION OF STRUCTURED DOCUMENT - Disclosed are a method, apparatus and electronic device for annotating information of a structured document. A specific implementation is: obtaining a template image of a structured document and at least one piece of annotation information of a field to be filled in the template image, where the annotation information includes attribute value and historical content of the field to be filled, and historical position of the field to be filled in the template image; generating, according to the attribute value of the field to be filled, the historical content of the field to be filled and the historical position of the field to be filled in the template image, target filling information of the field to be filled; obtaining, according to the target filling information of the field to be filled, an image of an annotated structured document. | 2021-12-16 |
20210390134 | Presentation file generation - Methods and systems for generating a presentation file. The systems and methods described herein may analyze received imagery in accordance with one or more criterion, and then select at least a portion of the received imagery based on the portion satisfying the at least one criterion. The systems and methods may then generate a presentation file such as a video slideshow that includes the selected imagery portion(s). | 2021-12-16 |
20210390135 | SYSTEMS AND METHODS FOR SCREENSHOT LINKING - Systems and methods of the present disclosure are directed to analyzing screenshots A system can include a computing device including a processor coupled to a memory and a display screen configured to display content. The system can include an application stored on the memory and executable by the processor. The application can include a screenshot receiver configured to access, from storage to which a screenshot of the content displayed on the display screen captured using a screenshot function of the computing device is stored, the screenshot including an image and a predetermined marker. The application can include a marker detector configured to detect the predetermined marker included in the screenshot. The application can include a link identifier configured to identify, using the predetermined marker, a link to a resource mapped to the image included in the screenshot, the resource accessible by the computing device via the link. | 2021-12-16 |
20210390136 | METHOD AND APPARATUS FOR MANAGING DIGITAL FILES - A computer-implemented method of associating digital tags with digital files comprises storing a plurality of digital files having embedded therein content data and metadata including tags; receiving, via a user interface device of a client device, a first tag label containing alphanumeric text created and inputted by a user of the client device; modifying, using a controller device, a selected first one of the tags of the metadata in a first of the digital files to include the first tag label; receiving, via the user interface device or another user interface device, an instruction to search for all of the digital files having at least the first tag label; responsive to receiving the instruction, automatically searching for all of the digital files having at least the first tag label; and displaying, on a video display device associated with the client device, a first indication of the first tag label. | 2021-12-16 |
20210390137 | TECHNIQUES FOR DETERMINING MACHINE OPERATION USING AUDIO - Techniques for determining machine operation using audio are disclosed. For example, a machine may be registered in a database and first audio data of the machine representing sound made by the machine during an operation may be received. A first digital signature associated with operation of the machine may be determined using the audio data. Instructional data may be received to correlate the first digital signature with the registered machine. Later, second audio data representing sound present in an environment of the machine may be obtained, and a status of the machine may be determined by comparing a second digital signature generated using the second audio data and the first digital signature. The status may indicate one of a normal operation of the machine or that operation of the machine is indeterminable. A notification including the status may be transmitted to a user device. | 2021-12-16 |
20210390138 | VideoChat - The present disclosure provides a technical solution of multi-modal chatting, which may provide response to user query by using multi-modal response in the interaction between chatbot and human beings, so that the expressing ways and the expressed content by the chatbot could be richer by using such response in a multi-modal way. | 2021-12-16 |
20210390139 | Deep Multi-Modal Pairwise Ranking Model For Crowdsourced Food Data - A method and system for providing more relevant search results and recommendation from a food database is disclosed. The method includes receiving a query, a first candidate food, and a second candidate food. The method includes generating vectors based on the query and food names of the first and second candidate foods using at least one embedding function of a machine learning model. The method includes determining nutrition content vectors from the nutritional data of the first and second candidate foods. The method includes generating a nutrition content vector based on the query using another embedding function of the machine learning model. The method includes determining which of the first and second candidate food is more relevant to the query based at least in part on the nutrition content vectors. The method includes providing search results or recommendation based on the determined relevance. | 2021-12-16 |
20210390140 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS - This information processing system includes: a first information processing unit including a first arithmetic unit that generates, from information regarding a detected user and behavior of the user, one or more pieces of tag information for content data of the user, and registers the generated one or more pieces of tag information in a content database in association with the content data; and a second information processing unit including a second arithmetic unit that selects the tag information on the basis of information detected from a content viewing environment including the user, retrieves and sequentially reproduces one or more pieces of the content data on the basis of the selected tag information, and updates the tag information used for retrieving the content data in accordance with a change in the information detected from the content viewing environment. | 2021-12-16 |
20210390141 | LOADING COLLABORATIVE DATASETS INTO DATA STORES FOR QUERIES VIA DISTRIBUTED COMPUTER NETWORKS - Various embodiments relate generally to data science and data analysis, computer software and systems, and wired and wireless network communications to provide an interface between repositories of disparate datasets and computing machine-based entities that seek access to the datasets, and, more specifically, to a computing and data storage platform that facilitates consolidation of one or more datasets, whereby a collaborative data layer and associated logic facilitate, for example, efficient access to, and implementation of, collaborative datasets. In some examples, a system may include an atomized workflow loader configured to receive an atomized dataset to load into a data store, and to determine resource requirements data to describe at least one resource requirement. The atomized workflow loader may be further configured to select a data store type based on a resource requirement, and perform a load operation of the atomized dataset as a function of the data store type. | 2021-12-16 |
20210390142 | SEGMENT CREATION IN A DATABASE SYSTEM - DESCRIBED HEREIN ARE SYSTEMS, APPARATUS, METHODS AND COMPUTER PROGRAM PRODUCTS CONFIGURED FOR ACTIONS TO BE PERFORMED ON SEGMENTS WITHIN A PIPELINE. THE DISCLOSED SYSTEMS AND TECHNIQUES ALLOW A USER TO SELECT A DATA SEGMENT ON A GRAPHICAL USER INTERFACE. THE USER MAY THEN UTILIZE THE DATA OF THE SEGMENT TO PERFORM ONE OR MORE ACTIONS. THUS THE DATA OF THE SEGMENT MAY BE USED TO PROVIDE COMMUNICATIONS TO PARTIES CONTAINED WITHIN THE DATA, MANIPULATE THE DATA SEGMENT BASED ON THE PARTIES CONTAINED WITHIN THE DATA, AND CHANGE THE DATA DISPLAYED BASED ON ATTRIBUTES SELECTED. | 2021-12-16 |
20210390143 | DIGITAL DATA PROCESSING SYSTEMS AND METHODS FOR DIGITAL CONTENT RETRIEVAL AND GENERATION - A system for digital content that includes a content management system, an ontology manager and a chat bot, all executing and in communications coupling on a digital data processing system. The content manager stores a plurality of tagged digital assets. The ontology manager stores a list of (or otherwise maintains) plural facets, each corresponding to one or more tags of the content management system. One or more dialog segments and sequence identifiers are maintained in the ontology manager, as well, each associated with one or more other facets. The chat bot drives a conversation with an end-user based on facets identified as associated with assets in the content management system and using dialog segments associated with those facets, while excluding those facets not so identified. The digital data processing system generates and transmits to the user digital assets identified through that conversation. | 2021-12-16 |
20210390144 | AI-BOT BASED IN-MEETING INSTANT QUERY ASSISTANT FOR CONFERENCE MEETINGS - Methods and systems are provided for automatically, via an artificial-intelligence bot, receiving a query made by a participant in a conference meeting, determine one or more subject matter experts to contact outside of the conference meeting, receive a response to the query from at least one of the subject matter experts, and present the response to the query to the participants of the conference meeting. The artificial-intelligence bot presents the response to the query while the conference meeting is in progress without any participant of the conference meeting communicating with the subject matter expert, without ever connecting a client device of the subject matter expert to the conference meeting, and without ever including the subject matter expert in the conference meeting. | 2021-12-16 |
20210390145 | DOCUMENT ROUTING BASED ON DOCUMENT CONTENTS - Systems and methods for routing a document based on the contents of this document. The content of this document is first subjected to a recognition process and then the result is subjected to multiple types of analysis. Based on the results of the analysis (including contextual analysis), a destination is determined along with any timelines detailed in the document. As well, a severity of the document, indicating the severity of consequences if the document is not handled quickly, is determined. Based on these, an urgency tag and/or a severity tag are assigned to the document. A final destination is determined based on the output of the analysis of the severity, the urgency, and of the destination. | 2021-12-16 |
20210390146 | Search Engine - A search engine to index web content with user content. A server computer receives, from a first client computer operated by a first user, an identification of first web content displayed by a web browser of the first client computer in a main browser window. The identification of the first web content is transmitted by the first user to the server computer via a user interface separate from the main browser window. The server computer then indexes the first web content. In response to receiving a search query from a web browser of a second client computer operated by a second user, the server computer transmits search results to the web browser of the second client computer. The search results include the first web content identified by the first user in a position relative to identifications of other web content received from other users. | 2021-12-16 |
20210390147 | System and Method to Initiate Inducive Search Across Multiple Products Using Embedded Help Files Within a Trusted Domain - A system, method, and computer-readable medium are disclosed for performing inducive searches across multiple products within a trusted domain. Products and/or services in the trusted domain are identified. Contextual information associated with the products and/or services is collected. Interrelationships and interoperations between the products and/or services is determined. An inducive search query as to a particular product and/or service is service. Contextual information is returned as to particular product and/or service and related products and/or services. | 2021-12-16 |
20210390148 | CONFIGURING OUTPUT CONTROLS ON A PER-ONLINE IDENTITY AND/OR A PER-ONLINE RESOURCE BASIS - A process includes receiving, from a user identity, instructions for output characteristics including one or more of audio characteristics for rendering or capturing audio data or visual characteristics for rendering or capturing visual data. The process also includes determining, in response to the received instructions, output controls which effect the one or more of audio characteristics or visual characteristics, and associating the output controls with an online identity or resource. The process further includes storing the associated output controls and detecting an interaction with the online identity or resource. Moreover, the process includes accessing, in response to the detection of the interaction, the stored output controls, and enabling an effect, based on the output controls, of one or more of the audio characteristics or the visual characteristics with respect to interaction with the online identity or resource. | 2021-12-16 |
20210390149 | ECONOMIC OPTIMIZATION FOR PRODUCT SEARCH RELEVANCY - In one embodiment, a method is illustrated as including defining a set of perspective objects capable of being placed onto a modified web page, monitoring parameters of a web page, the parameters including a number of times a current object is executed on the web page, using an Artificial Intelligence (AI) algorithm to determine a perspective object with a preferred Return On Investment (ROI), and selecting the perspective object to be placed onto the modified web page. | 2021-12-16 |
20210390150 | METHODS AND SYSTEMS FOR SELF-TUNING PERSONALIZATION ENGINES IN NEAR REAL-TIME - Provided are systems and methods for personalizing website content configured for delivery to a user. An exemplary system includes a graph database for storage of data (i) representative of the user's interaction with existing content presented on the website and (ii) indicative of content entities of interest to the user, the data being stored as nodes. Also included are one or more personalization engines configured to analyze relations between one or more pairs of the nodes, each analyzed relation creating a respective link, and a structure of each of the links being a function of the user's interaction with the existing content. The one or more processors are configured to personalize new content for presentation to the user and a portion of the new content is (i) derived from one of the respective links and (ii) delivered to the user in near-real time when a type of the first link is within a first category. | 2021-12-16 |
20210390151 | AUTOMATIC FINDING OF ONLINE PROFILES OF AN ENTITY LOCATION - Automatic finding of online profiles of an entity location is disclosed. Reference location data for location attributes of an entity location are obtained. A search for a profile of the entity location on a source is performed using at least some of the obtained reference location data. One or more search results are obtained. A search result includes a Uniform Resource Locator (URL) and corresponding search result location data. The search result is evaluated. Evaluating the search result includes normalizing the search result location data included with the search result and comparing the normalized search result location data against the reference location data. Based at least in part on the evaluation, it is determined whether the search result matches to a profile of the entity location on the source. In the event that the search result matches to a profile of the entity location on the source, the search result is provided as output. | 2021-12-16 |
20210390152 | METHOD, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIUM FOR PROVIDING MULTIPLE MODELS OF FEDERATED LEARNING USING PERSONALIZATION - Disclosed is a method, system, and non-transitory computer-readable record medium for providing a multi-model through federated learning using personalization. The method includes classifying users into a plurality of groups; and generating a prediction model for a service as a multi-model through federated learning for each of the plurality of groups. | 2021-12-16 |
20210390153 | Formulated Query On Portable Device - Methods and apparatus that may perform a drag-and-drop operation for a geographical query in a digital map are provided with reduced or minimum textual input. In one example, the method includes providing, by one or more processors, a digital map for display on a computing device, providing, by the one or more processors, a preformulated query for display in a user interface, receiving an input applied to the preformulated query, wherein the input indicates an application of the preformulated query to a selected region of the digital map, and performing, by the one or more processors, a geographic search based on the input applied to the preformulated query. | 2021-12-16 |
20210390154 | SYSTEM AND METHOD OF ADMINISTERING AND MANAGING EXPERIENTIAL LEARNING OPPORTUNITIES - A system, methods and software for administering and managing experiential learning opportunities (ELOs) are disclosed. The system generally includes a database server storing a relational database containing ELO placement data and records and having an interface configured to communicate with a university computer having a student information database thereon, website server, configured to host an ELO website through which users interact with the relational database, and a memory in the website server, storing a content management system (CMS) that comprises modules and a data pool stored in/on storage nodes on the website server. The modules include a forms module for users to enter ELO data and submit ELO requests, ELO proposals, waivers and agreements, and a timelog module to collect and store timelog data and manage the timelog approval process. | 2021-12-16 |
20210390155 | EDGE CACHE STATIC ASSET OPTIMIZATION - Systems and techniques for edge cache static asset optimization are described herein. A set of tracking instructions may be generated for execution at an edge cache server of the content delivery system. A static asset may be identified that is included in a webpage delivery session. A type may be determined for the static asset. The static asset may be grouped with a set of other static assets based on the type. The webpage request may be processed by processing the static asset. The set of tracking instructions may be transmitted to an edge cache server for storage in an edge cache of an edge network. | 2021-12-16 |
20210390156 | ENHANCED METADATA COLLECTION AND OUTPUT - Enhanced metadata with optimized output. In an embodiment, a content object is received. First metadata to be associated with the content object is determined. At least one metadata field to be acquired is determined based on an association, within a stored knowledge structure, of the at least one metadata field with the first metadata. Second metadata to be associated with the content object is acquired based on the at least one metadata field. A metadata structure and markup format for the content object are determined. The metadata structure incorporates both the first metadata and the second metadata. The content object is output with the metadata structure and in the markup format. | 2021-12-16 |
20210390157 | Unified Forward and Inverse Transform Architecture - Multiple transform sizes improve video coding efficiency, but also increase the implementation complexity. Furthermore, both forward and inverse transforms need to be supported in various consumer devices. Embodiments provide a unified forward and inverse transform architecture that supports computation of both forward and inverse transforms for multiple transforms sizes using shared hardware circuits. The unified architecture exploits the symmetry properties of forward and inverse transform matrices to achieve hardware sharing across different the transform sizes and also between forward and inverse transform computations. | 2021-12-16 |
20210390158 | UNSUPERVISED MODEL ADAPTATION APPARATUS, METHOD, AND PROGRAM - A covariance matrix computation unit | 2021-12-16 |
20210390159 | QUANTUM COMPUTATION FOR COST OPTIMIZATION PROBLEMS - Methods, systems, and apparatus for solving cost optimization problems. In one aspect, a method includes receiving data representing a cost optimization problem in a network, wherein i) the network is represented as a graph of nodes and edges, and ii) each edge comprises an associated cost; mapping the data representing the cost optimization problem in a network to a quadratic unconstrained binary optimization (QUBO) formulation of the cost optimization problem, the QUBO formulation comprising multiple variables with values determined by states of respective qubits, wherein each qubit corresponds to a respective edge of the graph of nodes and edges; obtaining data representing a solution to the cost optimization problem from a quantum computing resource; and initiating an action based on the obtained data representing a solution to the cost optimization problem. | 2021-12-16 |
20210390160 | BASE ANALYTICS ENGINE MODELING FOR MONITORING, DIAGNOSTICS OPTIMIZATION AND CONTROL - An analytics engine is provided for industrial automation applications. The engine may be modular, and may be instantiated upon receipt of a data structure, such as containing annotated data from or relating to a monitored and/or controlled machine or process. The module may be data-driven so that it is instantiated only as needed, upon receipt of the input data structure. The module then carries out analysis on the data, and outputs a data structure that can be used for further analysis, or directly by other modules for modeling, classification, optimization and/or control. | 2021-12-16 |
20210390161 | CONTENT CONTRACT SYSTEM, CONTENT CONTRACT METHOD, RIGHTS HOLDER TERMINAL, ALIENEE TERMINAL, CONTENT ACCUMULATION SERVER, RIGHTS HOLDER PROGRAM, ALIENEE PROGRAM, CONTROL PROGRAM, AND CONTENT ACCUMULATION PROGRAM - A blockchain is used to distribute a right to content data. A right holder terminal, an assignee terminal, and a blockchain control terminal stores a blockchain that is synchronized among the right holder terminal, the assignee terminal, and the blockchain control terminal. The blockchain includes a transaction set with a smart contract program for distributing the right. The blockchain control terminal includes a token issuance unit generating token data that includes match information for the content data and a type of right to be distributed, is set with an address of a right holder as owner information, and is identified by a token identifier, and registering the token data corresponding to the token identifier with the blockchain. | 2021-12-16 |
20210390162 | SYSTEMS AND METHODS FOR REMOTELY VERIFYING IDENTITY OF NON-RESIDENT ALIENS - A method for remotely verifying a non-resident alien's identity, includes: receiving a request to establish a communication session from a user device; analyzing the request to determine whether the user device is compromised; in response to determining that the user device is not compromised, providing a page flow to the user device to solicit information from the non-resident alien, the information including identity information associated with a local foreign government identification document (ID), and other information not shown on the local foreign government ID; querying one or more foreign governmental data stores to identify foreign data associated with the non-resident alien based on a unique identifier associated with the local foreign government ID; comparing the information with the foreign data; and verifying an identity of the non-resident alien based on the comparing, wherein the verifying includes determining that at least one of the other information matches the foreign data. | 2021-12-16 |
20210390163 | METHOD FOR DATA PROTECTION IN A DATA PROCESSING CLUSTER WITH AUTHENTICATION - Systems and methods are disclosed for data protection in a cluster of data processing accelerators (DPAs). The cluster of accelerators may include DPAs of a third party accelerator that may not be trusted. To ensure data protection in the cluster, a first DPA that receives a request from a second DPA to access a resource of the first DPA authenticates the second DPA. If the second DPA passes authentication, the second DPA is permitted to access non-sensitive resources of the first DPA, otherwise the second DPA is not permitted access to any resources of the first DPA and the first DPA breaks a communication link with the second DPA. Authentication is premised on a shared secret function between DPAs and a random number generated by the first DPA. The shared secret function is updateable by, e.g., a patch from a manufacturer of the DPA. | 2021-12-16 |
20210390164 | SYSTEM AND METHOD FOR CONTINUOUS USER IDENTIFICATION VIA PIEZO HAPTIC KEYBOARD AND TOUCHPAD DYNAMICS - A piezo haptic keyboard and touchpad user identification system may comprise a processor receiving an authenticating user input identifying an authorized user of the information handling system, and a controller operably connected to a plurality of piezo electric elements situated beneath the keyboard. The controller may detect haptic hardware typing or touch behavior parameters describing characteristics of a plurality of deformations of the piezo electric elements during interaction between the authorized user and the keyboard, and the processor may use machine learning to identify a repeated pattern of values for a combination of the haptic hardware typing or touch behavior parameters reoccurring during interaction between the authorized user and keyboard. The processor may associate the repeated pattern of values for the combination of the haptic hardware typing or touch behavior parameters with the authorized user for later, passive authentication of a user based on typing dynamics. | 2021-12-16 |
20210390165 | METHODS AND SYSTEMS FOR EXECUTING A USER INSTRUCTION - A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction. | 2021-12-16 |
20210390166 | ELECTRONIC COMPONENT FOR ELECTRONIC DEVICE WITH LOCKING FUNCTION AND UNLOCKING METHOD THEREOF - An electronic component for an electronic device with a locking function and an unlocking method thereof are provided. The unlocking method includes: receiving a first sound extraction request by a first processing circuit when the electronic device is in a locked mode; determining, by the first processing circuit, whether a first voice input signal is received after receiving the first sound extraction request; determining, by the first processing circuit when the first processing circuit receives the first voice input signal, whether first voice data included in the first voice input signal matches first preset voice data; and transmitting, by the first processing circuit, the first voice input signal to the second processing circuit when the first voice data matches the first preset voice data, to trigger the second processing circuit to determine whether second voice data included in the first voice input signal matches second preset voice data. | 2021-12-16 |
20210390167 | AUTHENTICATING A USER SUBVOCALIZING A DISPLAYED TEXT - A computing device ( | 2021-12-16 |
20210390168 | GRAPHICAL USER INTERFACE FOR GENERATION AND VALIDATION OF SECURE AUTHENTICATION CODES - Embodiments of the invention are directed to a system, method, or computer program product structured for generation and validation of secure authentication codes. In some embodiments, the system is structured for fetching screen coordinates for a user device, generating a keypad layout, and numbering the keypad layout to produce an authentication keypad. The system is also structured for generating an authentication string, generating a final authentication code hash from the authentication string and a pattern of the authentication string as input into the authentication keypad, and transmitting the authentication keypad and authentication string to a user device. The system is further structured for generating a captured authentication code hash from a captured string and a captured pattern, comparing the final authentication code hash to the captured authentication code hash, and if the final authentication code hash matches the captured authentication code hash, transmitting a session token to a user device. | 2021-12-16 |
20210390169 | CONSUMABLE CHIP AND COMMUNICATION METHOD THEREOF - Provided is a consumable chip and a communication method thereof. The method is adopted for a consumable chip including a first consumable MCU unit, a verification cryptographic operation unit and a second consumable MCU unit; the method includes: when the first consumable MCU unit is incompatible with the printer, the first consumable MCU unit activating the second consumable MCU unit to execute a second consumable chip core processing flow, and calling the verification cryptographic algorithm function program of the verification cryptographic operation unit to calculate a new verification password; after the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reading the new verification password and sending to the printer, the new verification password is received by the printer to achieve compatibility between the first consumable MCU unit and the printer. | 2021-12-16 |
20210390170 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR MIGRATING IDENTITY INFORMATION ACROSS IDENTITY DOMAINS IN AN IDENTITY INFRASTRUCTURE - Systems, methods, and storage media for migrating identity information across identity domains in an identity infrastructure are disclosed. Exemplary implementations may: receive a login request from a first user in a first identity domain; extract, from the login request, identity data, wherein the identity data comprises at least one of a user identifier and user credentials information associated with the first user; identify one or more credential verification resources in the first identity domain; verify at least one of the user identifier and user credentials information for the first user; identify one or more other identity domains, including at least a second identity domain, in the identity infrastructure, wherein the first user is an unmigrated user in the second identity domain; request additional identity data for the first user from the first identity domain; and create a user profile for the first user in the second identity domain. | 2021-12-16 |
20210390171 | Method for Managing Application Permission and Electronic Device - A method for managing an application permission and an electronic device includes an electronic device that displays a home screen, where the home screen includes an icon of a first application. In response to a first operation from the user on the icon, the electronic device displays a first interface, and when displaying the first interface, the electronic device allows the first application to use a first application permission. In response to a second operation of the user on the first interface, the electronic device displays a second interface, and when displaying the second interface, the electronic device rejects the first application to use the first application permission. | 2021-12-16 |
20210390172 | APPARATUS AND METHOD FOR GENERATING SYSTEM CALL WHITELIST OF APPLICATION CONTAINER AND METHOD FOR CONTROLLING SYSTEM CALL OF APPLICATION CONTAINER - An apparatus and method for generating a system call whitelist for an application container. The method may include determining whether a container is based on machine code or non-machine code by analyzing the internal configuration of the running container, identifying system calls included in an application through binary static analysis or static analysis of source code selected depending on the determination of whether the container is based on machine code or non-machine code, and generating a whitelist based on the numbers of all of the identified system calls. | 2021-12-16 |
20210390173 | Interaction Method and Apparatus - An interaction method and an apparatus are provided. The method is applied to an SE disposed in a terminal. The method includes: receiving a service request from a CA ( | 2021-12-16 |
20210390174 | Vertically Integrated Automatic Threat Level Determination for Containers and Hosts in a Containerization Environment - A threat level analyzer probes for one or more threats within an application container in a container system. Each threat is a vulnerability or a non-conformance with a benchmark setting. The threat level analyzer further probes for one or more threats within a host of the container service. The threat level analyzer generates a threat level assessment score based on results from the probing of the one or more threats of the application container and the one or more threats of the host, and generates a report for presentation in a user interface including the threat level assessment score and a list of threats discovered from the probe of the application container and the host. A report is transmitted by the threat level analyzer to a client device of a user for presentation in the user interface. | 2021-12-16 |
20210390175 | HYBRID TRUST EXECUTION ENVIRONMENT BASED ANDROID SECURITY FRAMEWORK, ANDROID DEVICE EQUIPPED WITH THE SAME AND METHOD OF EXECUTING TRUST SERVICE IN ANDROID DEVICE - Provided is a hybrid trusted execution environment based android security framework, an android device equipped with the same and a method of executing a trusted service in the android device. The hybrid trusted execution environment based android security framework includes a hardware resource that comprises a rich execution environment (REE) where an android operating system (OS) runs, and a secure container which implements a virtualized trusted execution environment (VTEE) that processes a security task in the rich execution environment (REE) when an application running on the rich execution environment requests the security task. | 2021-12-16 |
20210390176 | ELECTRONIC DEVICE AND CONTROL METHOD THEREFOR - Provided in the present disclosure are an electronic device and a control method therefor. An electronic device of the present disclosure comprises a memory in which a kernel and at least one application are stored, and a processor, which generates a first rule for determining a time at which the application calls a system in order to execute a process, determines, on the basis of the first rule, whether the application corresponds to an application for which security is verified, and generates a second rule for skipping an audit on the basis of a plurality of pre-defined rules, if the application corresponds to the application for which security is verified. | 2021-12-16 |
20210390177 | Emulator Detection Through User Interactions - Methods and systems are provided to determine when a first electronic device is emulating a second electronic device. The first electronic device may be operated through indirect inputs such as through a mouse and keyboard. The second electronic device may be operated through direct inputs such as inputs received through a touchscreen. Interaction data received from the first electronic device may be used to determine that the first electronic device is operating an emulator. Interaction data may include data associated with scrolling on the electronic device and such data may allow a determination that the electronic device received indirect inputs and, thus, is operating an emulator. | 2021-12-16 |
20210390178 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING PROGRAM - An information processing device includes an element extraction unit that extracts elements relating to actions of an attacker from each input log, a generation unit that generates a parser based on definition information defining the actions of the attacker in a formal grammar, the parser detecting, from a log, a log string having a feature corresponding to an action defined by the definition information, a parsing unit that detects, from a log consisting of the elements extracted by the element extraction unit, log strings having features corresponding to the actions defined by the definition information by using the parser, and a reconstruction unit that reconstructs the log strings detected by the parsing unit, adds a label indicating an action defined by the definition information to each of the reconstructed log strings, and outputs the labeled log strings as a log corresponding to a series of actions of the attacker. | 2021-12-16 |
20210390179 | DETECTION OF COMPROMISED STORAGE DEVICE FIRMWARE - An apparatus, system, and method for detecting compromised firmware in a non-volatile storage device. A control bus of a non-volatile storage device is monitored. The non-volatile storage device includes a processor and electronic components coupled to the control bus. Signal traffic on the control bus is analyzed for events and/or triggers related to storage operations initiated on the control bus by the processor. Storage operations include one or more commands directed to at least one of the electronic components. If the latency for the storage operation satisfies an alert threshold a host is notified of compromised firmware. | 2021-12-16 |
20210390180 | DEVICES AND METHODS TO SECURE A SYSTEM ON A CHIP - A system on a chip comprising a set of one-time programmable memory elements that comprises a first valid configuration; a second valid configuration; and a plurality of invalid configurations. The system on a chip also comprises a programming indicator initially comprising a first value and configured to be permanently set to a second value. The system on a chip further comprises a decoder circuit in communication with the set of one-time programmable memory elements to determine whether the set of one-time programmable memory elements is in the first valid configuration, the second valid configuration, or any one of the plurality of invalid configurations. The decoder circuit generates a threat-detection signal when the set of one-time programmable memory elements is in any of the plurality of invalid configurations when the programming indicator is permanently set to the second value. | 2021-12-16 |
20210390181 | Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning - Aspects of the disclosure relate to spear phishing simulation using machine learning. A computing platform may send, to an enterprise user device, a spear phishing message. The computing platform may receive initial user interaction information indicating how a user of the enterprise user device interacted with the spear phishing message. Based on the initial user interaction information and using a series of branching message templates, the computing platform may generate additional spear phishing messages. The computing platform may receive additional user interaction information indicating how the user interacted with the additional spear phishing messages. Based on the initial user interaction information and the additional user interaction information, the computing platform may compute spear phishing scores. Based on a comparison of the spear phishing scores to spear phishing thresholds, the computing platform may generate training modules for the user, and may send the training modules to the enterprise user device. | 2021-12-16 |
20210390182 | AUTOMATIC MITIGATION OF CORRUPTED OR COMPROMISED COMPUTE RESOURCES - Embodiments described herein are directed to determining whether an application executing on a compute instance has been corrupted or compromised by malicious code. This may achieved by statically analyzing an image file from which the application is based to determine characteristics thereof. Such characteristics are representative of the behavior that is expected to be performed by the application during execution. During execution of the application, runtime characteristics of the application are determined, which are determined based on an analysis of the address space in memory allocated for a computing process of the application. The statically-determined characteristics are compared to the determined runtime characteristics to determine discrepancies therebetween. In the event that a discrepancy is found, a determination is made that the application has been compromised or corrupted and an appropriate remedial action is automatically performed. | 2021-12-16 |
20210390183 | ANALYSIS FUNCTION IMPARTING DEVICE, ANALYSIS FUNCTION IMPARTING METHOD, AND RECORDING MEDIUM - An analysis function imparting device according to the present invention includes processing circuitry configured to execute a script engine while monitoring the script engine to acquire an execution trace including an application programming interface (API) trace and a branch trace, analyze the execution trace, and detect a hook point that is a location to which a hook is applied and a code for analysis is inserted, detect, based on monitoring at the hook point, a tap point that is a memory monitoring location at which the code for analysis outputs a log, and apply a hook to the script engine to impart an analysis function to the script engine based on the hook point and the tap point. | 2021-12-16 |
20210390184 | DISARMING MALWARE IN PROTECTED CONTENT - Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network. | 2021-12-16 |
20210390185 | SECURE BOOT AT SHUTDOWN - A secure boot system and method to reduce a total time to boot by performing secure boot validation at shutdown and storing an authentication code in a secure manner, in effect, pre-authenticating an application so that, at the next boot, authentication may be bypassed. | 2021-12-16 |
20210390186 | TECHNOLOGIES FOR FAST LAUNCH OF TRUSTED CONTAINERS - Technologies for fast launch of trusted containers include a computing device having a trusted platform module (TPM). The computing device measures a container runtime with the TPM and executes the container runtime in response to the measurement. The computing device establishes a trust relationship between the TPM and a virtual platform credential, provisions the virtual platform credential to a virtual TPM, and executes a guest environment in response to provisioning the virtual platform credential. The computing device measures a containerized application with the virtual TPM and executes the containerized application in response to the measurement. The computing device may perform a trusted computing operation in the guest environment with the virtual TPM. The virtual TPM and the containerized application may be protected with multi-key total memory encryption (MKTME) support of the computing device. State of the virtual TPM may be encrypted and persisted. Other embodiments are described and claimed. | 2021-12-16 |
20210390187 | Custom Patching Automation with Machine Learning Integration - A machine learning computing system identifies a vulnerability associated with a server. Based on information associated with the server and a knowledge base, the computing system schedules an interval for patching the server in a centralized tracking module. Based on the knowledge base and the vulnerability, the computing system creates, validates, and deploys the patch job. During patch job execution, the computing system monitors the status of the patch job at the server and transmits status updates to a user interface module. After expiration of the interval, the computing system generates an assessment report for the executed patch job. The computing system updates the knowledge base based on the assessment report to improve future decisioning processes. Based on the success or failure of the patch job, the computing system, upon a failure indication, automatically reschedules an interval for patching the server. | 2021-12-16 |
20210390188 | METHODS OF PROVIDING DATA PRIVACY FOR NEURAL NETWORK BASED INFERENCE - Methods and systems that provide data privacy for implementing a neural network-based inference are described. A method includes injecting stochasticity into the data to produce perturbed data, wherein the injected stochasticity satisfies an ε-differential privacy criterion and transmitting the perturbed data to a neural network or to a partition of the neural network for inference. | 2021-12-16 |
20210390189 | ENHANCED SECURITY SYSTEMS AND METHODS USING A HYBRID SECURITY SOLUTION - This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations. | 2021-12-16 |
20210390190 | SYSTEM AND METHOD FOR AUTOMATICALLY DETERMINING PRIVACY SETTINGS FOR SHARING DATA - Systems and methods are provided for managing and rewarding sharing of user data via a computing device with a requesting device. A privacy risk score is received for the requesting device characterizing a degree of cyber risk for sharing data. Initial privacy settings are received for the user via a GUI in response to the privacy risk score characterizing the user data allowable for sharing. A reward incentive is then automatically determined based on the privacy risk and the initial privacy settings for sharing additional user data with the requesting device beyond that identified by the initial privacy settings. Then, in response to an override from the GUI overriding the initial privacy settings to accept the reward incentive and thereby allow sharing of the additional user data beyond the initial range: updated privacy settings are determined and the sharing of the user data is limited to the updated privacy settings. | 2021-12-16 |
20210390191 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR CONFEDERATED RIGHTS AND HIERARCHICAL KEY MANAGEMENT - A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform. Root rights are defined and delegated to wallets in a multilevel manner to thereby isolate wallets associated with the root right from cyber risk. | 2021-12-16 |
20210390192 | METHOD AND SYSTEM FOR VEHICLE SECURITY DATA RELEASE TO A VEHICLE SECURITY PROFESSIONAL - A Secure Access Gateway and Registry is provided for secure access to security related service information, to operate a security feature of a motor vehicle, by a validated Individual. The system is implemented with a general purpose computer, internet, mobile device, and secure data release Registry software application. An Individual is employed as a vehicle service professional. The Individual inputs a Registry Application data. The Registry uses the Registry Application data to generate a background search result data. The Registry uses the search result data to determine eligibility, and assign a Registered Vehicle Service Professional Identification code. The Individual uses the Registered Vehicle Service Professional Identification code to input a Form D1 authorization data, and to access an Automaker website. The Registry uses the D1 authorization data to determine a legal possessory interest in a motor vehicle, to be serviced. The Automaker uses the Automaker motor vehicle data-base, and the D1 authorization data, to generate Automaker security related service information being specific to the motor vehicle. The Automaker security related service information is output to the Individual. The individual uses the Automaker security related service information data to access a security related feature of the motor vehicle. | 2021-12-16 |
20210390193 | SYSTEM FOR CONTROLLING COMPUTING PROCESS EXECUTION BY USERS WITH ELEVATED ACCESS PRIVILEGE - A system is provided for controlling computing process execution by users with elevated access privilege. In particular, the system may be configured to hook into the process command loop for a computing system within the network environment to monitor the users logged into the system as well as computing processes being executed. The system may further flag the users and processes according to their type. If the system detects a mismatch between the user and the process, the system may automatically suspend the process from being executed. In this way, the system may ensure that processes are executed only by their authorized users. | 2021-12-16 |
20210390194 | CONTROL DEVICE - A control device includes: a feature extraction unit that calculates one or more feature amounts from one or more state values; a processing unit that calculates a score based on the one or plurality of feature amounts calculated by the feature extraction unit with reference to a learning model; a determination unit that generates a determination result indicating whether any abnormality has occurred in a monitoring target based on the score; a first data storage unit that stores at least one of data related to processing in the feature extraction unit and data related to processing in the processing unit; a second data storage unit that stores an arbitrary state value capable of being referred to by the control device; and an authority management unit that restricts access to the first data storage unit. | 2021-12-16 |
20210390195 | METHOD FOR BUILDING A PREDEFINED SECRET VALUE - A method for building a predefined secret value allocated to a first pod belonging to a node of a system having a second pod. The system includes a first storage area whose access is restricted to the node and a second storage area whose access is restricted to the second pod. The second pod retrieves a first value stored in a third storage area and a second value stored in the second storage area, and computes a third value by applying a first function to the first and second values. The second pod retrieves a fourth value stored in the first storage area and computes a fifth value by applying a second function to the third and fourth values. The first pod retrieves a sixth value stored in the first pod and computes the predefined secret value by applying a third function to the fifth and sixth values. | 2021-12-16 |
20210390196 | DECENTRALIZED CONSENT NETWORK FOR DECOUPLING THE STORAGE OF PERSONALLY IDENTIFIABLE USER DATA FROM USER PROFILING DATA - A computer implemented method for tracking and securing user data, the method including providing a user data vault that stores user data, providing the user data to display on a user interface, collecting access rights and permission settings, storing the access rights on a blockchain consent network, and providing access to remote users. The system and methods utilize blockchain technology, encryption, and a novel data structure (e.g. consent tokens) that enhance the security, transparency, and user experience regarding user data collection. | 2021-12-16 |
20210390197 | Computer System, Data Control Method, and Storage Medium - A computer system that processes data among a plurality of sites each including a computer having a processor and a memory. The computer includes an application for performing predetermined processing on data, an execution manager for managing execution of the application, and data transfer policies specifying whether data of a processing result of the application is allowed to be transmitted to the external. The execution manager generates information on data used by the application being executed as information on data to be transmitted and applies the data transfer policies to the data in the information on data to be transmitted to determine whether the data to be transmitted can be transmitted to the outside of the site. | 2021-12-16 |
20210390198 | METHOD AND SYSTEM FOR PROTECTING FILE USING CLASS DISTRIBUTION AND SEQUENTIAL MEMORY LOADING - A file protection method of a computer apparatus including a processor, the method including extracting classes from an executable file of a package file, classifying the classes into class groups, adding a loading code to a first class group among the class groups, the loading code configured to cause sequential loading of the class groups to a memory in a random loading order in response to execution of the package file, adding an integrity code to a second class group among the class groups, the integrity code configured to verify an integrity of a corresponding class group among the class groups or a previous class group among the class groups, the previous class group including the loading code configured to cause the corresponding class group to load, and regenerating the package file using the class groups after the adding the loading code and the adding the integrity code. | 2021-12-16 |
20210390199 | INVOICE ACCESS METHOD AND APPARATUS BASED ON BLOCKCHAIN, AND ELECTRONIC DEVICE - One or more implementations of the present specification provide an invoice access method and apparatus based on a blockchain, and an electronic device. The method includes: receiving an access request initiated by an access user for a target invoice by using a client, the target invoice being encrypted and stored in the blockchain; determining, in response to the access request, whether the access user has an authority to access the target invoice; and in response to that the access user has the authority to access the target invoice, invoking decryption logic provided in a predetermined smart contract to decrypt ciphertext data of the target invoice stored in the blockchain, and returning decrypted plaintext data of the target invoice to the client. | 2021-12-16 |
20210390200 | METHODS AND SYSTEMS FOR GENERATING RECOMMENDATIONS BASED ON NON-DELINEATED ENCRYPTED RECORDS COLLECTED BY A DATA AGGREGATION SERVICE DURING COMMUNICATIONS BETWEEN USERS AND CONTENT SOURCES - Methods and systems are described for generating recommendations based on non-delineated records collected by a data aggregation service during communications between users and content sources. For example, based on collecting records on exchanges between users and content sources that is traditionally neither stored nor identified by either party, a data aggregation service may generate recommendations related to future exchanges of content between the same or different users and/or the same or different content sources. | 2021-12-16 |
20210390201 | Distributed Ledger Interface System for Background Verification of an Individual - Systems and methods are disclosed for using a distributed ledger interface system to facilitate background verification of an individual. One method may include, sending, by a server to a first device associated with a first organization, an indication that an individual is ending the membership to the first organization; unlocking access to an individual-specific data structure in a distributed ledger, wherein the individual-specific data structure allows storage of a plurality of data values corresponding to a plurality of background aspects of the individual, and wherein the distributed ledger is shared within a plurality of nodes within a network; providing, to a user device associated with the individual, a digital key to allow permission to access the individual-specific data structure; and granting, to a second computing device associated with a second organization, and based on a permission received from the user device, access to the individual-specific data structure. | 2021-12-16 |
20210390202 | Encrypted Search Cloud Service with Cryptographic Sharing - A method for sharing read access to a document stored on memory hardware. The method includes receiving a shared read access command from a sharor sharing read access to a sharee for a document stored on memory hardware in communication with the data processing hardware, and receiving a shared read access request from the sharee. The shared read access command includes an encrypted value and a first cryptographic share value based on a write key, a read key, a document identifier, and a sharee identifier. The method also includes multiplying the first and second cryptographic share values to determine a cryptographic read access value. The cryptographic read access value authorizes read access to the sharee for the document. The method also includes storing a read access token for the sharee including the cryptographic read access value and the encrypted value in a user read set of the memory hardware. | 2021-12-16 |
20210390203 | SYSTEMS AND METHODS FOR MANAGING DATA PRIVACY IN BUILDING MANAGEMENT SYSTEMS - Methods and systems for managing data privacy of personal identifiable information in a building management system may include presenting a data privacy survey via a user interface of a data processing system. The data privacy survey may identify a plurality of types of personal identifiable information (PII) that will be collected by the building management system, and a plurality of data privacy settings for each of the plurality of types of PII. A setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII may be set, in which one or more constraints in the building management system for each of the plurality of types of PII may be implemented in the building management system. | 2021-12-16 |
20210390204 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR CAPTURING DATA CHANGES - An application for dynamic, granular access permissions can include a database interface, a user interface, a login process, an administrator, an event handler, and an authorization process. The database interface can be an interface to an access control permissions database that stores roles, actions, or policies for users of the application. The login process can authenticate a user and determine a default set of access control permissions for that user when they are using the user interface. The administrator can provide access control permissions for a user by using the database interface. The event handler can dynamically modify access to functionality in the user interface based on an event. The authorization process can determine whether a request from the user interface is authorized before process the request. The authorization process can use access control permissions from the administrator and either a scope limited or a temporally limited access permission. | 2021-12-16 |
20210390205 | METHOD AND APPARATUS FOR ENCRYPTING SELECTED PORTION OF FILE - Disclosed is a method and a device for processing a file. According to an embodiment, the method comprises selecting a portion of the file to be encrypted; encrypting the selected portion of the file as encrypted data; and amending the file by replacing the selected portion with predefined data and appending the encrypted data at an end of the file. | 2021-12-16 |
20210390206 | Anti-Cyberbullying Systems and Methods - Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.) | 2021-12-16 |
20210390207 | CONSENT-DRIVEN PRIVACY DISCLOSURE CONTROL PROCESSING - A user provides retailer-specific consents for access and use to private/sensitive information of the user. The private/sensitive information is centrally stored in a privacy vault. Retail services (retailer) that the user subscribes to are provided a user-specific and consent-specific token representing the user and consents to usage of specific private/sensitive information of the user. When the retailer has a need for user-specific private/sensitive information, the retailer presents the user-specific and consent-specific token to the privacy vault. Assuming, the retailer was given access to the requested private/sensitive information defined in the token, the privacy results returns the requested information to the retailer; otherwise, an unauthorized message is returned from the privacy vault to the retailer. The user defines the consents to each retailer and a record of the consents is maintained in the privacy vault. | 2021-12-16 |
20210390208 | PERSONAL INFORMATION MANAGEMENT DEVICE, SYSTEM, METHOD AND COMPUTER-READABLE NON-TRANSITORY MEDIUM THEREFOR - This disclosure relates to personal information management. Various embodiments disclosed herein relate to a personal information management device, a personal information management system, a personal information management method, and a computer-readable non-transitory medium that records the personal information. In an example, a personal information management method based on a blockchain or by using a smart contract based on a blockchain is provided. In another example, a portable electronic device and a system operating to manage personal information are provided. In another example, a computer-readable non-volatile recording medium having a computer code recorded therein, required for the personal information management, is provided. | 2021-12-16 |
20210390209 | ELECTRONIC DEVICE, METHOD FOR PROVIDING PERSONAL INFORMATION USING SAME, AND COMPUTER-READABLE RECORDING MEDIUM FOR RECORDING SAME - The present document relates to an electronic device, a method for providing personal information using same, and a computer-readable recording medium for recording same, wherein the electronic device may include a communication circuit, a storage, a display, and a processor. According to various embodiments, the processor may be configured to generate a smart contract comprising information on categories of personal information to be provided to an external user, information about the external user, and information about a de-identification level of the personal information to be provided; transfer the smart contract to a block chain; receive a request for provision of personal information from the block chain; process personal information of a user on the basis of the smart contract; and transfer the processed personal information to the block chain. Other various embodiments are possible. | 2021-12-16 |
20210390210 | PRIVACY-AWARE CONTENT RECOMMENDATIONS - The present disclosure provides methods, computer-readable media, and devices for making content recommendations in a manner that protects private user data. In one example, a method includes collecting content consumption history data for a specific user of a telecommunications network, inserting random noise into the content consumption history data to produce anonym ized data, sending the anonym ized data over a network to a centralized device, receiving correlation data from the centralized device, wherein the correlation data indicates correlations among a plurality of items of content that is available for consumption via the telecommunications network, and predicting a likelihood that the specific user would be interested in a particular item of the plurality of items of content, wherein the predicting is based on the content consumption history data and on the correlation data. The steps may be carried out by a processor of a user endpoint device. | 2021-12-16 |
20210390211 | SYSTEM AND METHOD FOR GENERATING REVERSIBLE ANONYMIZED RECORD IDENTIFIERS FROM A REMOTE DATA SYSTEM - A data retrieval server includes a non-transitory computer-readable storage medium and at least one processor to execute instructions stored in the non-transitory computer-readable storage medium to extract at least one data value from a record in a remote data store as a primary key that uniquely represents the record in the remote data store; encrypt the primary key using a secret key to create a reversible public identifier that represents the primary key and the record in the remote data store; store the secret key in a local data store associated with the data retrieval server; transmit the reversible public identifier from the data retrieval server to a client computing device; receive the reversible public identifier from the client computing device in a request for data from the record; retrieve the secret key for the record from the local data store; decrypt the reversible public identifier using the secret key from the local data store to determine the primary key; query at least one data value different from the primary key in the remote data store using the primary key; and receive the at least one data value different from the primary key from the remote data store for transmission to the client computing device. | 2021-12-16 |
20210390212 | PERMISSION DISPLAY METHOD, PERMISSION DISPLAY APPARATUS AND STORAGE MEDIUM - A permission display method, applied to a terminal, includes: acquiring permission information of an application in response to acquiring permission information of an application in response to runtime permission applied by the application running on the terminal, the permission information including the runtime permission and a permission description corresponding to the runtime permission; and parsing the permission information to obtain the runtime permission and the permission description, and displaying the runtime permission of the application and the permission description on a display interface of the terminal. The permission description can be customized for different applications to realize personalization of the permission description. | 2021-12-16 |