Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


52nd week of 2021 patent applcation highlights part 55
Patent application numberTitlePublished
20210406273Watermarking of Events of an Ordered Event Stream - Watermarking of an ordered event stream (OES) is disclosed. Writing events to an OES can advance populating of the OES, which can be correspond to progress values. Progress values can enable a reader to know where it is in an OES. A reported progress value can be determined from the progress values based on an event being committed to the OES. Moreover, an effective progress value can be determined from the progress values and monitoring the OES for events with that defer being committed to the OES. A watermark for the OES can be determined from the effective progress value such that reading beyond the effective progress value is restricted. This can provide confidence that the reader has read out properly committed events and has not omitted any events having deferred commitment.2021-12-30
20210406274SYSTEMS AND METHODS FOR DATABASE DELTA AUTOMATION - The present disclosure relates generally to a system and method for the derivation of deltas. In certain embodiments, a configuration management database (CMDB) is configured to store configuration item (CI) information. One or more templates are also provided. The one or more templates are communicatively coupled to the CMDB and executable via a processor, wherein the one or more templates are configured to derive a delta comprising a difference in hosts between a first list of hosts stored in the CI information and a second list of hosts stored in an external database, wherein the external database is communicatively coupled to an external system external to the CMDB and is configured to store the second list of hosts provided via the external system.2021-12-30
20210406275DATABASE-BASED MANAGEMENT METHOD, PLATFORM, ELECTRONIC DEVICE AND STORAGE MEDIUM - The present disclosure provides a database-based management method, platform, electronic device and storage medium, which relates to the technical field of databases and may be used for a cloud computing scenario. A specific implementation solution is as follows: monitoring a plurality of nodes through which an application accesses a corresponding database cluster based on pre-built management information of the corresponding database cluster of the application; when an abnormal node appears in the plurality of nodes, sending a node creation request carrying information of the abnormal node to a task management platform, to create an alternative node with the same function to replace the abnormal node; receiving information of the created alternative node returned from the task management platform; updating the management information of the database cluster of the application based on the information of the alternative node and the information of the abnormal node. In the present disclosure, only one set of database management platform is needed no matter whether the architectures of database clusters corresponding to the applications are the same. The above solution can be used to manage all applications simultaneously and effectively improve the management efficiency of the databases.2021-12-30
20210406276SYSTEM FOR AUTOMATED DATA LINEAGE AND MOVEMENT DETECTION - Systems, computer program products, and methods are described herein for automated data lineage and movement detection. The present invention is configured to generate a training dataset based on the source data, the target data, and the transformation logic; initiate machine learning algorithms on the training dataset to generate a first set of parameters; generate a test dataset based on at least the unseen source data and the transformed unseen source data; predict, using the first set of parameters, the transformation logic used to transform the unseen source data to transformed unseen source data; determine one or more target computing devices based on at least the transformation logic; and initiate a transmission of the transformed unseen source data to the one or more target computing devices.2021-12-30
20210406277SYSTEMS AND METHODS FOR INTERACTIVE ANALYSIS - Systems and methods for generating and rendering interactive analysis are provided. The interactive analysis includes filters that may be provided based upon table relationships and/or persistent data inputs.2021-12-30
20210406278SYSTEMS AND METHODS FOR CREATING A DATA LAYER BASED ON CONTENT FROM DATA SOURCES - Systems, methods, and non-transitory computer-readable media can obtain data form one or more data sources. The data from the one or more data sources can be processed into one or more data records. Each data record can include at least an identification, a data type, and data to be stored. The data records can be organized into a tree data structure. The tree data structure can be stored as an intermediate data layer in a data analysis platform.2021-12-30
20210406279SYSTEM AND METHOD FOR MAINTAINING A MASTER REPLICA FOR READS AND WRITES IN A DATA STORE - A system that implements a data storage service may store data on behalf of clients in multiple replicas on respective computing nodes. The system may employ an external service to select a master replica for a replica group. The master replica may service consistent read operations and/or write operations that are directed to the replica group (or to a data partition stored by the replica group). The master replica may employ a quorum based mechanism for performing replicated write operations, and a local lease mechanism for determining the replica authorized to perform consistent reads, even when the external service is unavailable. The master replica may propagate local leases to replica group members as replicated writes. If another replica assumes mastership for the replica group, it may not begin servicing consistent read operations that are directed to the replica group until the lease period for a current local lease expires.2021-12-30
20210406280NON-DISRUPTIVE TRANSITION TO SYNCHRONOUS REPLICATION STATE - Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.2021-12-30
20210406281DATA CONFIGURATION QUERY METHOD AND DEVICE - The present application discloses a data configuration query method and device. The method includes: determining at least two target data sets required to be queried by a query instruction and an ordered association between the target data sets, wherein the ordered association at least includes a unidirectional association and/or a bidirectional association; generating, on the basis of the at least two target data sets and the ordered association between the target data sets, a target association path; and outputting an OLAP model conforming to the target association path in a database. According to the present application, the technical problems of a large demand quantity of OLAP models included in an OLAP query system and a low utilization rate of the OLAP models in the related art can be solved.2021-12-30
20210406282METADATA ACCESS FOR DISTRIBUTED DATA LAKE USERS - Aspects of the disclosure relate to providing metadata access to distributed data lake users. In some embodiments, a computing platform may load metadata from an external metadata database into a staging database. Then, the computing platform may transform the metadata in the staging database and move the transformed metadata to a master database. The master database may comprise information indicating a relationship between the transformed metadata and one or more distributed data lakes. The computing platform may receive a request to access one or more metadata items. Then, the computing platform may authorize a distributed computing cluster user to access at least one metadata item based on the information. Based on the authorization, the computing platform may provide, to the distributed computing cluster user, access to the at least one metadata item of the one or more metadata items.2021-12-30
20210406283EFFICIENT MATCHING OF DATA FIELDS IN RESPONSE TO DATABASE REQUESTS - There is a need for more accurate and more efficient database management operations. This need can be addressed by, for example, techniques for efficient matching of data fields in response to database queries. In one example, a method includes: for each input data field of a plurality of input data fields, generating an per-field encoded representation of the input data field based on each per-character increment score for an occurred character in the input data field; performing the automated data field matching based on each per-field encoded representation for an input data field to generate one or more data field matching outputs; and causing display of the one or more data field matching determinations using a data field matching output interface.2021-12-30
20210406284METHOD OF POWER USER CLASSIFICATION BASED ON DISTRIBUTED K-MEANS, STORAGE MEDIUM AND CLASSIFICATION DEVICE - A method of a power user classification based on distributed K-means, a storage medium and a classification device are provided. The method includes: obtaining, by N load aggregators, power consumption data of power users managed by respective load aggregators; performing, by each load aggregator, a normalization operation on time series load data of the power users managed by the load aggregator; forming a N×N dimensional adjacency matrix A; performing K-means clustering on normalized time series load data, to obtain the respective centroids and user groups characterized by the respective centroids; sharing, by the respective load aggregators, the centroids and the number of users under the respective centroids based on the adjacency matrix A, and obtaining consistent centroids by multiple load aggregators; after an overall iteration ends, obtaining, by the respective load aggregators, the consistent centroids consistent with the K-means centroid based on global data, to realize user classification.2021-12-30
20210406285AGGREGATION OF NOISY DATASETS INTO MASTER FIRMOGRAPHIC DATABASE - Aggregation of noisy datasets into a master firmographic database. In an embodiment, firmographic records are received from a plurality of sources, and normalized into a common schema. One or more firmographic records may be cleaned by replacing a value of one or more fields in those firmographic record(s) with a value of those field(s) in another firmographic record. The firmographic records may then be clustered, and each of the clusters may be collapsed into a single conflated firmographic record based on a voting process. A master identifier may be generated for each conflated firmographic record, and the conflated firmographic records may be merged into a master firmographic database that is indexed by master identifiers.2021-12-30
20210406286Method, System, and Computer Program Product for Managing Source Identifiers of Clustered Records - Provided is a method for managing source identifiers of clustered records, which may include receiving a plurality of records, each having identification data associated with a source thereof. The records may be sorted into a first plurality of clusters. A first source identifier may be generated for each cluster. Update data associated with an update to the records may be received. At least some of the records may be sorted into a second plurality of clusters. A first cluster of the second plurality of clusters may have first identification data different from at least one cluster of the first plurality of clusters, and a second cluster of the second plurality of clusters may have identification data that substantially matches the at least one cluster. Whether to assign the first source identifier to the first or second cluster may be determined. A system and computer program product are also disclosed.2021-12-30
20210406287ELECTRONIC MAIL COMMUNICATION SYSTEM HAVING A CENTRALIZED, DYNAMIC RULES LEDGER HAVING AGGREGATED RULE ENTRIES FOR A GROUP OF USERS - Electronic messages, such as email messages, may be classified according to classification rules by a client application operating on a client device. Messages may be classified according to whether and how they are to be displayed in various user interfaces of the client device. A centralized classification service may maintain a centralized and dynamic rules ledger having aggregated rule entries for a group of users. The centralized classification service may update the dynamic rules ledger based on receiving and aggregating user classification preferences received from client devices. The dynamic rules ledger may be used to automatically enable, disable, and/or edit classification rules on one or more client devices.2021-12-30
20210406288NOVELTY DETECTION SYSTEM - A graph-based novelty detection system processes a stream of observations by storing a compressed representation of the observations in a graph. Each node of the graph represents a component of an observation and a count of a number of times that component has been observed. The system calculates a novelty score based, at least in part, on a conditional probability of one or more components of the observation.2021-12-30
20210406289INITIAL LOADING OF PARTIAL DEFERRED OBJECT MODEL - Partial initial construction of a deferred object model. This is done using a map that correlates positions of a hierarchically structured definition and corresponding hierarchical positions within an object model. The map is accessed and used to initially construct a deferred object model that even leaves some of the deferred objects unpopulated. The map is used to determine which parts of the hierarchical object definition no longer need to be parsed in order to construct this initial form of the deferred object model. If a request for an object is detected at some point after the initial construction, and that requested object is not represented even in deferred form in the deferred object model, the system uses the map to find the position of the corresponding object definition in the hierarchical object definition. At that point, the system parses that position, and constructs the object.2021-12-30
20210406290METHODS AND SYSTEMS FOR PERFORMING LEGAL BRIEF ANALYSIS - A method includes receiving, at a computing device, an electronic document, wherein the electronic document is a legal brief comprising a plurality of paragraphs; identifying one or more argument paragraphs from among the plurality of paragraphs, wherein each of the one or more argument paragraphs includes one or more legal arguments; performing a textual search of a corpus of legal documents based on a selected set of the identified argument paragraphs; performing a semantic search of the corpus of legal documents based on the selected set of the identified argument paragraphs; combining results of the textual search and the semantic search; and presenting the combined results to a user.2021-12-30
20210406291DIALOG DRIVEN SEARCH SYSTEM AND METHOD - A system and method for conducting a dialogue-based search is disclosed. A request for conducting a search for a user is received, and a first intent of the user is classified based on the request. An initial set of information from a knowledge base is identified based on the classified intent. The initial set of information is classified based on at least one criterion, and a question is generated based on the at least one criterion. A response to the question is received from the user, and a second intent of the user is classified based on the response. A subset of the initial set of information is selected based on at least the classified second intent, and an output is provided based on the selected subset.2021-12-30
20210406292RECOGNIZING POLLING QUESTIONS FROM A CONFERENCE CALL DISCUSSION - Systems and methods for recognizing polling questions from a conference call discussion are provided. One or more text strings including a textual form of one or more verbal phrases provided by one or more participants of a conference call are identified. The one or more text strings are provided as input to a trained machine learning model. One or more outputs from the trained machine learning model are obtained. A level of confidence that a verbal phrase of the one or more verbal phrase provided by the one or more participants includes a question associated with polling during the conference call is extracted from the one or more outputs. In response to a determination that the level of confidence satisfies a confidence criterion, the verbal phrase is designated as a polling question presented during the conference call.2021-12-30
20210406293SYSTEMS AND METHODS FOR DATA CURATION IN A DOCUMENT PROCESSING SYSTEM - Disclosed are implementations that include a method including obtaining at a local device, a question-and-answer data item representative of a question-and-answer pair relating to source content of a source document, with the question-and-answer data item being associated with question-and-answer history information representative of historical information and access information for the question-and-answer data item, and determining based on the question-and-answer history information whether to perform data refinement operations on the question-and-answer data item. The method further includes selecting, in response to a determination that the question-and-answer data item is to be refined, one of a plurality of users according to one or more matching criteria relating, at least in part, to subject-matter associated with the question-and-answer data item and expertise information respectively associated with the plurality of users, and communicating at least the question-and-answer data item to a destination device associated with the selected one of the plurality of users.2021-12-30
20210406294RELEVANCE APPROXIMATION OF PASSAGE EVIDENCE - Aspects of the invention include receiving a search query from a user computing device. Retrieving a set of passages based on the search query, wherein each passage contains passage evidence and an annotation embedded as metadata. Scoring each annotation and each passage evidence, where each annotation score is based on a feature vector of the annotation and the search query, and where each passage evidence score is based on a feature vector of the passage evidence and the search query. Ranking each passage based on a passage evidence score and a score of one annotation contained in the passage. Returning a ranked list of each passage to the user computing device.2021-12-30
20210406295METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM FOR GENERATING RELATIONSHIP OF EVENTS - A method for generating a relationship of events includes: obtaining a statement of a first event and a statement of a second event; generating a word sequence vector with first granularity and a word sequence vector with second granularity based on the statement of the first event; generating a word sequence vector with third granularity and a word sequence vector with fourth granularity based on the statement of the second event; generating a first fusion vector based on the word sequence vector with first granularity and the word sequence vector with second granularity; generating a second fusion vector based on the word sequence vector with third granularity and the word sequence vector with fourth granularity; and determining a relationship between the first event and the second event based on the first fusion vector and the second fusion vector.2021-12-30
20210406296CONTENT ITEM SUMMARIZATION WITH CONTEXTUAL METADATA - A computing system, including a processor configured to receive a content item. The processor may extract a plurality of content item features from the content item and receive a user request to summarize the content item. The user request may have associated contextual metadata indicating a spatiotemporal context in which the user request is received. Based on the contextual metadata, the processor may determine an estimated distraction level for the user. The processor may select a subset of the plurality of content item features based on the contextual metadata. The processor may generate a content item summary including the subset of the plurality of content item features based at least in part on the estimated distraction level. The processor may convey the content item summary for output on one or more output devices.2021-12-30
20210406297DYNAMIC PROCESS MODEL OPTIMIZATION IN DOMAINS - A computing server may receive master data, transaction data, and one or more existing process models of a domain. The computing server may aggregate, based on domain knowledge ontology of the domain, the master data and the transaction data to generate a fact table. For example, entries in the fact table may be identified as relevant to the target process model and include attributes and facts that are extracted from master data or transaction data. The computing server may convert the entries in the fact table into vectors. The computing server inputting vectors into one or more machine learning algorithms to generate one or more algorithm outputs. One or more algorithm outputs may correspond to one or more improved process models that are optimized compared to the existing process models. The computing server may provide the improved process model to the domain to replace one of the existing process models.2021-12-30
20210406298HYPERPLANE OPTIMIZATION IN HIGH DIMENSIONAL ONTOLOGY - A computer-implemented method for generating a description of a target skill set using domain specific language, a computer program product, and a system. Embodiments may comprise, on a processor, ingesting a data set related to the target skill from a data store, semantically analyzing the data set to generate a skill ontology, generating a hyperplane to separate one or more priority skills from among the plurality of related skills, generating a description for the target skill from the one or more priority skills, and presenting the generated description to a user. The skill ontology may include relationships between the target skill and a plurality of related skills.2021-12-30
20210406299METHOD AND APPARATUS FOR MINING ENTITY RELATIONSHIP, ELECTRONIC DEVICE, AND STORAGE MEDIUM - A method for mining an entity relationship, apparatus, electronic device, and a storage medium are provided. An implementation of the method may include: searching, in a query statement set, for a query statement satisfying a preset condition corresponding to a target entity word; in response to at least one query statement satisfying the preset condition corresponding to the target entity word being found in the query statement set, mining an associated entity word corresponding to the target entity word based on the found at least one query statement satisfying the preset condition corresponding to the target entity word.2021-12-30
20210406300PERSONALIZED MEDIA PREVIEW INTERFACE - A personalized preview system to receive a request to access a collection of media items from a user of a user device. Responsive to receiving the request to access the collection of media items, the personalized preview system accesses user profile data associated with the user, wherein the user profile data includes an image. For example, the image may comprise a depiction of a face, wherein the face comprises a set of facial landmarks. Based on the image, the personalized preview system generates one or more media previews based on corresponding media templates and the image, and displays the one or more media previews within a presentation of the collection of media items at a client device of the user.2021-12-30
20210406301METHOD FOR DETERMINING SEARCH REGION USING REGION INFORMATION AND OBJECT INFORMATION AND SYSTEM PERFORMING THE SAME - Embodiments relate to a method for determining a search region including acquiring object information of a target object included in an image query, generating a set of non-image features of the target object based on the object information, setting a search candidate region based on a user input, acquiring information associated with the search candidate region from a region database, and determining a search region based on at least one of the information associated with the search candidate region or at least part of the set of non-image features, and a system for performing the same.2021-12-30
20210406302Multidimensional Digital Content Search - Multidimensional digital content search techniques are described that support an ability of a computing device to perform search with increased granularity and flexibility over conventional techniques. In one example, a control is implemented by a computing device that defines a multidimensional (e.g., two-dimensional) continuous space. Locations in the multidimensional continuous space are usable to different search criteria through different weights applied to the criteria associated with the axes. Therefore, user interaction with this control may be used to define a location and corresponding coordinates that may act as weights to the search criteria in order to perform a search of digital content through use of a single user input.2021-12-30
20210406303SYSTEM AND METHOD FOR GENERATING REALISTIC USAGE DATA OF IN-VEHICLE INFOTAINMENT - A method for generating synthetic in-vehicle infotainment data includes receiving a plurality of preference data, wherein the preference data is associated with a plurality of domains associated applications in the in-vehicle infotainment system, receiving information related to an age or gender of a user of the in-vehicle infotainment systems, utilizing the plurality of preference data and the information related to the age or gender of the user to generate one or more user profiles associated with the in-vehicle infotainment system, and outputting a synthetic dataset to be utilized in a recommendation system of the in-vehicle infotainment system utilizing the one or more user profiles, wherein the synthetic dataset is associated with the one or more user profiles.2021-12-30
20210406304ELECTRONIC DEVICE FOR GENERATING VIDEO COMPRISING CHARACTER AND METHOD THEREOF - An electronic device and method are disclosed. The electronic device includes a display, a processor and memory. The processor may implement the method, including analyzing, by a processor, a first video to identify any characters included in the first video, displaying one or more icons representing one or more characters identified in the first video via a display, receiving, by input circuitry, a first user input selecting a first icon representing a first character from among the one or more icons, based on the first user input, selecting image frames of the first video that include the first character from among image frames included in the first video, and generating, by the processor, a second video including the selected image frames. A second embodiment includes automatically selecting images from a gallery including one or more characters for generation of a video.2021-12-30
20210406305IMAGE DEFORMATION CONTROL METHOD AND DEVICE AND HARDWARE DEVICE - A method and a device for controlling deformation on an image, and a hardware device are provided. In the method for controlling deformation on an image, a to-be-processed image is acquired; an audio file is acquired; the audio file is played and a first attribute value of the audio file corresponding to a current time point is acquired; an extent of the deformation on the image is determined based on the first attribute value; and deformation processing is performed on the to-be-processed image based on the extent of the deformation on the image. With the method for controlling deformation on an image, the extent of the deformation on the image is controlled based on the attribute value of the audio file, thereby solving the technical problem in the conventional technology that the special effects of deformation cannot be flexibly generated.2021-12-30
20210406306Content Descriptor - An apparatus, method, system and computer-readable medium are provided for generating one or more descriptors that may potentially be associated with content, such as video or a segment of video. In some embodiments, a teaser for the content may be identified based on contextual similarity between words and/or phrases in the segment and one or more other segments, such as a previous segment. In some embodiments, an optical character recognition (OCR) technique may be applied to the content, such as banners or graphics associated with the content in order to generate or identify OCR'd text or characters. The text/characters may serve as a candidate descriptor(s). In some embodiments, one or more strings of characters or words may be compared with (pre-assigned) tags associated with the content, and if it is determined that the one or more strings or words match the tags within a threshold, the one or more strings or words may serve as a candidate descriptor(s). One or more candidate descriptor identification techniques may be combined.2021-12-30
20210406307INDEX MACHINE - In an aspect, provided is a method comprising receiving, at a master node, capability information associated with a plurality of worker nodes, receiving, at the master node, an indexation request, and in response to the indexation request, distributing one or more tasks to the plurality of worker nodes based on the respective capability information, wherein the one or more tasks relate to generating a plurality of indexlets.2021-12-30
20210406308SYSTEM AND METHOD FOR MIGRATING DATABASES - Some embodiments provide a non-transitory machine-readable medium that stores a program. The program receives data from a subset of a first set of exchange tables stored in a first database of a source system. The program further creates a second set of exchange tables in a second database of the device. The program also creates a set of shadow tables in the second database of the device. The program further adapts the second set of exchange tables and the set of shadow tables to a higher upgrade version. The program also performs object generation based on the second set of exchange tables and the set of shadow tables. The program further drops the set of shadow tables. The program also receives a set of application tables from the source system. The program further adapts the set of application tables to the higher upgrade version.2021-12-30
20210406309CROSS-MODAL MANIFOLD ALIGNMENT ACROSS DIFFERENT DATA DOMAINS - A method and system for cross-modal manifold alignment of different data domains includes determining for a shared embedding space a first embedding function for data of a first domain and a second embedding function for data of a second domain using a triplet loss, wherein triplets of the triplet loss include an anchor data point from the first, a positive and a negative data point from the second domain; creating a first mapping for the data of the first domain using the first embedding function in the shared embedding space; creating a second mapping for the data of the second domain using the second embedding function in the shared embedding space; and generating a cross-modal alignment for the data of the first domain and the data of the second domain.2021-12-30
20210406310FILE-CATALOG TABLE FOR FILE STAGE - Disclosed herein are systems and methods for implementing a file-catalog table for a file stage. In an embodiment, a data platform receives, from a client, a request that the data platform create a file-catalog table for a file stage of a user account associated with the client, where the file stage contains one or more files at a storage location. The user account includes a file-stage object that corresponds to the file stage and that includes an indication of the storage location. In response to receiving the request, the data platform creates the file-catalog table for the file stage. The file-catalog table lists the one or more files in the file stage, and includes at least two different metadata properties of the files listed in the file-catalog table.2021-12-30
20210406311ACCESSING FILES IN A DATABASE STAGE USING A USER DEFINED FUNCTION - A file access system for user defined functions (UDFs) can be implemented on a distributed database system. The system can store UDF interfaces and file reference objects that can be called by other users. Upon a UDF being called, files on a stage, one or more interface objects (e.g., InputStream), and file reference objects can be implemented by execution nodes of the distributed database system. The execution nodes can implement multiple threads that are authenticated and can download file data from a staging location concurrently.2021-12-30
20210406312INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus according to the application concerned includes an obtaining unit and a generating unit. The obtaining unit obtains a first-type graph including a plurality of node corresponding to a plurality of search target. The generating unit generates, based on placement of the plurality of nodes in the first-type graph, a second-type graph that includes a virtual node representing a node not associated to a search target by adding the virtual node to the first-type graph.2021-12-30
20210406313POI RECOMMENDATION METHOD AND DEVICE BASED ON GRAPH DATABASE, AND STORAGE MEDIUM - A POI recommendation method based on the graph database includes: acquiring an ID and positioning information of a target user; according to the ID and the positioning information of the target user, acquiring a feature vector of the target user, a friend intimacy coefficient of the target user and a target POI set from a target graph database, wherein the target POI set is a set composed of POIs within a preset distance range queried according to the positioning information; according to the target POI set, acquiring a feature matrix of a user set with related POI consumption records from the target graph database, wherein the related POI consumption records are consumption records associated with any POI in the target POI set; and according to the friend intimacy coefficient, the feature vector of the target user and the feature matrix, determining a target POI from the target POI set.2021-12-30
20210406314COGNITIVE HORIZON SURVEILLANCE - A method for ranking relevance of documents includes using a set of queries, searching a corpus of documents for a set of candidate documents with information relevant to the set of queries. The method further includes ranking the set of candidate documents by a deep learning processing system according to relevance to respective ones of the set of queries. The method additionally includes responsive to user input, revising the ranked set of candidate documents to produce a revised ranked set of candidate documents. The method further includes using the revised ranked set of candidate documents to retrain the deep learning processing system. The method still further includes performing a categorization of the set of candidate documents by the retrained deep learning processing system.2021-12-30
20210406315SYSTEM AND METHOD FOR DIGITAL ENHANCEMENT OF HIPPOCAMPAL REPLAY - There is provided a system, method, and computer program for digital enhancement of hippocampal replay. In an embodiment, the method includes: creating one or more digital memories, each digital memory created by: receiving a tag associated with the digital memory from a user; receiving a captured digital memory from the user; and associating one or more additional attributes with the digital memory; creating a replay session, the replay session comprising one or more digital memories, by: associating a target digital memory with the replay session; and associating one or more other digital memories with the replay session if such one or more other digital memories meet a measure of commonality with the target digital memory, the measure of commonality at least based on the additional attributes; and displaying the replay session to the user within a predetermined period.2021-12-30
20210406316PREDICTIVE PROMPT GENERATION BY AN AUTOMATED PROMPT SYSTEM - Systems and methods are configured for predictive prompt generation for an interaction between a party and an automated prompt system. In various embodiments, metadata is received on the interaction and provided as input to a multi-label predictive model to generate interaction probabilities for a plurality of prompt information data objects. Each probability generated by the predictive model provides a likelihood a particular information data object needs to be provided to the first party during the interaction. Accordingly, one or more of the prompt information data objects are identified based on the probability of each piece found in the one or more prompt information data objects that satisfy a set threshold and one or more notifications are provided so that the automated prompt system provides at least one of the prompt information data objects to the first party during the interaction.2021-12-30
20210406317CARDINALITY OF TIME SERIES - Querying of time-aware metrics time series includes receiving a query, the query comprising a set of query metadata and a query time range. It further includes, based at least in part on the set of query metadata and the query time range, selecting a time series from a plurality of metrics time series. Each metrics time series in the plurality of metrics time series is associated with a set of metadata and an active interval of time. A set of metadata associated with the selected time series matches the set of query metadata, and an active interval of time associated with the selected metrics time series intersects with the query time range. The selected metrics time series is returned.2021-12-30
20210406318OPTIMIZING RESPONSE CREATION AND DELIVERY FOR LENDING QUERIES - A search request may define a minimum value and a maximum value for a numerical parameter of the search. A plurality of binary searches may identify a minimum entry and a maximum entry, each binary search comprising selecting a single entry and using at least one analytical model to generate a score for the single entry, wherein the score of the minimum entry corresponds with the minimum value and the score of the maximum entry corresponds with the maximum value. The at least one analytical model may be used to generate a score for each of a set of entries between the minimum entry and the maximum entry while ignoring entries outside of the set of entries between the minimum entry and the maximum entry. Entries responsive to the request may be identified within the scored set of entries.2021-12-30
20210406319METHODS AND SYSTEMS FOR TEMPLATE GENERATION - A computer-implemented method for template generation may include: receiving a first plurality of variables, each of the first plurality of variables specifying a feature to be implemented in a new template for document generation; for each of a plurality of existing templates for document generation, determining a degree of similarity between the first plurality of variables and a plurality of variables included in the respective existing template; upon determining that none of the degrees of similarity respectively determined for the plurality of existing templates satisfies a similarity threshold, determining that a combination of variables from two or more of the plurality of existing templates has a degree of similarity with the first plurality of variables satisfying the similarity threshold; and generating the new template based on the two or more of the plurality of existing templates.2021-12-30
20210406320DOCUMENT PROCESSING AND RESPONSE GENERATION SYSTEM - Disclosed are methods, systems, devices, apparatus, media, design structures, and other implementations, including a method that includes receiving, at a local device from a remote device, query data representative of a question relating to source content of a source document of a repository of a plurality of source documents, with the source content being associated with transformed content accessible from the local device. The method further includes generating, in response to determination, at the local device, of a match between the query data and at least one portion of the transformed content, output data comprising one or more of a pointer to access, in the source document accessible from the remote device, at least one portion of the source document corresponding to the at least one portion of the transformed content, or a copy of the at least one portion of the source document.2021-12-30
20210406321APPROXIMATE NEAREST NEIGHBOR SEARCH ENGINE - System and methods are directed to operations associated with an approximate nearest neighbor search engine. More specifically, a vector semantically representing content to be added to a search index may be received. The search index may include a neighborhood graph having a plurality of nodes, where each node of the plurality of nodes is associated with content in a content repository. A plurality of nodes within the search index determined to be most semantically similar to the received vector semantically representing content to be added to the search index may be identified. The node corresponding to the received vector semantically representing content to be added to the search index to the search index may be added to the search index and a listing of nearest neighbors associated with each of the of the plurality of nodes may be updated to include an identifier associated with the added node.2021-12-30
20210406322WEB CONTENT RELIABILITY CLASSIFICATION - Technology described herein assigns a reliability score to web content, such as a web site or portion of a website. In one aspect, an output of the technology is a high reliability score and a low reliability score for a web content. The high reliability score represents conformance to high reliability sites, while the low reliability score represents conformance to low reliability sites. The high reliability score may be generated by first identifying high reliability online content within a compressed web graph. In a first iteration, the high reliability score of the seeds is used to score online content that is linked to the seed sites. At a high level, the more links that originate from high reliability sources, the higher the reliability score for the linked content. The low reliability score is similar, but uses outgoing links to low reliability sites instead of incoming links from high reliability sites.2021-12-30
20210406323METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading.2021-12-30
20210406324SYSTEM AND METHOD FOR PROVIDING A CONTENT ITEM BASED ON COMPUTER VISION PROCESSING OF IMAGES - In certain embodiments, one or more images of an object may be received from a device associated with a first account on a communications network. Features of the object may be extracted based on the one or more images, and one or more content items related to the object may be determined based on the features. A hashtag associated with at least one of the features may be determined. A second account connected to the first account may be selected where the second account previously performed a search for the hashtag on the communications network, and at least one of the one or more content items may be provided to the second account.2021-12-30
20210406325DYNAMICALLY INTEGRATING INTERACTIVE MACHINE LEARNING MULTI-MODELS - An improved analytics system dynamically generates, integrates, and deploys multiple models for use related to a particular user and/or user segment. The integrated model analytics system can deploy a set of models specifically identified for a user from a group of models related to the service. This set of models can be used to provide recommendations for the user related to content of the service. As the user continues to interact with the service, the integrated model analytics system can dynamically update multiple models from the set of models based on real-time user interactions. These updated models can be used to generate updated recommendations for the user that can be used to dynamically update content presented to the user. In addition, this updated model can be used when providing recommendations for users in other user segments.2021-12-30
20210406326SPOILER PREVENTION - Methods, systems and computer program products are provided for spoiler prevention. Media consumption applications may be placed in “spoiler-free” mode, for example, to prevent media content from spoiling first-hand user experience. A user may provide and/or authorize access to and use of spoiler prevention information. A user may request media content (e.g., while surfing the Internet). Digital media content to be presented to a user may be searched in real-time and/or pre-searched for spoiler content and/or associated spoiler indications relative to spoiler prevention information. Identified spoiler content may be concealed from users. A procedure may be provided for users to determine one or more reasons why content is concealed, to selectively reveal concealed content, and to provide feedback whether concealed content was or was not spoiler content for a user. Feedback may be used to improve spoiler prevention, for example, by retraining a machine learning model, which may be user-specific.2021-12-30
20210406327RESOURCE RECOMMENDATION METHOD AND APPARATUS, PARAMETER DETERMINATION METHOD AND APPARATUS, DEVICE, AND MEDIUM - Provided are a resource recommendation method and apparatus, a parameter determination method and apparatus, a device, and a medium. The specific implementation is as follows: determining a recommendation reference characteristic of a target user; and determining a resource recommendation result for the target user according to the recommendation reference characteristic of the target user and based on at least two resource recommendation models; where at least two recommendation strategy parameters in the at least two resource recommendation models are jointly determined according to recommendation behavior data of a historical user, and a resource processing stage associated with each of the at least two resource recommendation models is different.2021-12-30
20210406328SPATIAL SEARCH USING KEY-VALUE STORE - A spatial search may be performed using representations of geometric shapes stored in a key-value store. A request to perform a spatial search may be received, the request including a geometric shape composed of one or more points. The points of the geometrical shape may be translated into one or more spatial indexes representing spatial cells using a space-filling curve. A key-value store may then be incrementally searched for each spatial index to identify spatial cells intersecting the geometric shape for which other known geometric shapes exist. The key-value store may then be searched to identify the known geometric shapes intersecting the geometric shape included in the search.2021-12-30
20210406329QUESTION ANSWERING PROCESSING METHOD AND APPARATUS, AND STORAGE MEDIUM - A question answering processing method and apparatus, and a storage medium is disclosed herein. The detailed implementation solution includes: receiving a speech question inputted by a user; obtaining an answer set corresponding to the speech question, the answer set including a plurality of candidate answers, and each candidate answer corresponding to a region identification; obtaining a current region identification of the user, and determining whether the answer set includes the current region identification; and in a case that the answer set includes the current region identification, obtaining a first candidate answer corresponding to the current region identification, and feeding the plurality of candidate answers sorted with the first candidate answer as a first place back to the user.2021-12-30
20210406330METHOD FOR PROVIDING INFORMATION, METHOD FOR CONTROLLING COMMUNICATION TERMINAL, COMMUNICATION TERMINAL, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM - The management server obtains address information indicating a user's address and evaluation information indicating evaluation of a food or a restaurant performed by the user. A food search screen is provided with, as one of search filters, a search filter for filtering foods or restaurants on the basis of results of evaluation of foods or restaurants performed by residents of a certain area. If the user's address indicated by the address information is included in the certain area, the evaluation information indicating the evaluation of the food or the restaurant performed by the user is included in the results of the evaluation of the foods or the restaurants performed by the residents of the certain area.2021-12-30
20210406331INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - [Object] To provide an information processing system, an information processing device, an information processing method, and a storage medium that can extract group terminals from among a plurality of surrounding information processing terminals that have been detected, and calculate a degree of happiness in a surrounding area.2021-12-30
20210406332CREATION OF A TIMELINE VIEW OF WORK PRODUCT AND WORKING RELATIONSHIPS OF INDIVIDUALS WITHIN AN ORGANIZATION - Examples of the present disclosure describe systems and methods for analyzing data items and relationships between those data items to create a time-based visualization of what particular individuals are working on and/or with whom particular individuals are working. The visualization may provide a brief summary of projects associated with the individual for a particular period of time.2021-12-30
20210406333CAUSAL SELECTION PREFERENCES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for accessing data that indicates selection preferences of a particular user, determining, first and second data sets of content items for presentation, generating a first display panel that will cause a user device to display the first data set of the first content items, generating a second display panel that will cause the user device to display the second data set of the second content items, providing, to the user device, the first display panel and the second display panel for simultaneous display on the user device, providing, to the user device, data that displays a request to select one of the first display panel or the second display panel, and receiving, from the user device, data indicating a selection of one of the first display panel or the second display panel.2021-12-30
20210406334METHOD AND SYSTEM FOR EFFICIENTLY AND SECURELY ROUTING REQUESTS FROM URLS WITH THE SAME UNIQUE DOMAIN NAME TO A WEB SERVER OR A URL REDIRECTION SERVER WITH PRIORITY FOR THE FIRST ONE - The invention relates to a method and system for delivering content over a network, and for delivering content from servers such as a main domain web server and a redirection server, using the same domain name. The invention includes delivering content over a network from the servers. The invention includes delivering content from a web server and a redirection server over the same domain name. This enables safe and efficient creation of branded links using the branded domain name of an organization. Branded links using the same branded domain name of an organization enhances brand awareness and brand recognition. Such links are more trusted by readers since the link is branded to give the reader an understanding of where the link will lead them, therefore, increasing the trust attributed to a link.2021-12-30
20210406335BROWSER-BASED NAVIGATION SUGGESTIONS FOR TASK COMPLETION - In some implementations, a method includes acquiring data about a plurality of web pages rendered within one or more browser tabs of a web browser executing on at least one computing device and processing the acquired data to group the plurality of web pages into one or more groups of web pages. The processing includes performing a similarity analysis using the acquired data, where each group includes web pages that are determined to be topically related to each other based on the similarity analysis. The method includes selecting a group of web pages from the one or more groups of web pages that are determined to be topically-related to content displayed in the web browser and providing a navigation suggestion for display on a user interface of the web browser based on the selected group.2021-12-30
20210406336METHODS AND APPARATUS FOR AUTOMATICALLY PROVIDING ITEM REVIEWS AND SUGGESTIONS - This application relates to apparatus and methods for automatically providing item reviews. In some examples, a website provides a widget on a website allowing a customer to request an item review for an item. In response to the customer requesting the item review, a computing device determine whether suitable reviews for the item are available. If suitable reviews are available, the reviews are provided to the customer requesting the item review. If suitable reviews are not available, the computing device determines a set of customers to request item reviews for the item from, and provides item review requests to the determined set of customers. The computing device receives responses to the item review requests received from the set of customers, and provides an item review based on the received item review requests. In some examples, the website provides the item review to the customer requesting the item review.2021-12-30
20210406337SYSTEM AND METHOD FOR AUTOMATIC DETECTION OF WEBPAGE ZONES OF INTEREST - A system and method for detecting webpage zones of interest. A method includes receiving at least one webpage analysis request, wherein the received at least one webpage analysis request includes at least one webpage in a website; identifying, in the at least one webpage, at least one zone, wherein the at least one zone is a content element of a webpage; classifying the at least one zone into a category of interest, wherein the classification is based on a trained machine learning model configured to classify DOM elements of the least one webpage, and wherein a category of interest is a category determined based on a functionality of the website; and storing the classification by indicating the category of interest for each zone.2021-12-30
20210406338EIGENVALUE DECOMPOSITION WITH STOCHASTIC OPTIMIZATION - A computer-implemented method for Eigenpair computation is provided. The method includes computing an Eigenvector and respective Eigenvalues of the Eigenvector by using a Stochastic Optimization process. The computing step includes storing the matrix in a Resistive Processing Unit (RPU) crossbar array.2021-12-30
20210406339Systems and Methods for Combining Low-Mantissa Units to Achieve and Exceed FP64 Emulation of Matrix Multiplication - The present disclosure relates to an apparatus that includes decoding circuitry that decodes a single instruction. The single instruction includes an identifier of a first source operand, an identifier of a second source operand, an identifier of a destination, and an opcode indicative of execution circuitry is to multiply from the identified first source operand and the identified second source operand and store a result in the identified destination. Additionally, the apparatus includes execution circuitry to execute the single decoded instruction to calculate a dot product by calculating a plurality of products using data elements of the identified first and second operands using values less precise than the identified first and second source operands, summing the calculated products, and storing the summed products in the destination.2021-12-30
20210406340GRAPH PROCESSING METHOD AND SYSTEM - The invention concerns a graph processing method configured to transform an input computational graph into a desired computational graph, the input computational graph comprising a plurality of input variables and at least one operation of a mathematical expression, wherein at least one input data sample comprising a plurality of channels to be fed as values of said input variables to the input computational graph. Said graph processing method comprises an information package generation step configured to generate, as a function of the at least one input data sample, an information package formed by utilizing entirely or partially a structure of a multivector, wherein the multivector is a geometric algebra multivector; an information allocation step configured to allocate the channels of the at least one input data sample to said generated information package; and an operation redefinition step configured to replace the at least one operation of the input computational graph with at least one corresponding geometric algebra-based operation; wherein the desired computational graph comprises the at least one corresponding geometric algebra-based operation and said generated information package loaded with the channels of the at least one input data sample.2021-12-30
20210406341UNSUPERVISED DISAGGREGATION APPARATUS, METHOD AND COMPUTER-READABLE MEDIUM - An unsupervised disaggregation method includes estimating, from an observation matrix X, by using a latent feature model approach, a binary matrix Z and a latent feature matrix W; calculating a dot product of the matrix W and a D dimensional vector x; repeating, for each row of the matrix W, checking that the dot product value for the row of the matrix W with the vector x is negative to discard the row from the matrix W and a corresponding column from the binary matrix Z; if any discarded row present in the matrix W, updating the matrices W and Z using new matrix W2021-12-30
20210406342APPLICATION PROGRAMMING INTERFACE TO ACCELERATE MATRIX OPERATIONS - Apparatuses, systems, and techniques to determine a matrix multiplication algorithm for a matrix multiplication operation. In at least one embodiment, a matrix multiplication operation is analyzed to determine an appropriate matrix multiplication algorithm to perform the matrix multiplication algorithm.2021-12-30
20210406343SYSTEMS AND METHODS FOR INSTANTLY DE-DUPLICATING AUDIENCES USING DATA VISUALIZATION - An data de-duplication system (DDDS), method and applications thereof. The DDDS can permit a user to perform combinations and de-duplication of datasets, including complicated arrangements, having intended attributes. In some embodiments, the data de-duplication system includes a method for generating a query based on a population selected from a graphical user interface. The graphical user interface may present a visualization of available data on a client device. In some embodiments, the graphical user interface of the DDDS may include a visualization of the available datasets in a Euler or Venn diagram. In some embodiments, a query may be generated based on selected populations utilizing a logic interpreter.2021-12-30
20210406344DATA VALUE ROUTING SYSTEM AND METHOD - A disclosed method includes a data distribution computer receiving a data packet comprising a plurality of data values in response to an interaction between a resource provider and a user. The data distribution computer can then determine a data item for each data value of the plurality of data values and associate each data value to a processing computer using the data item for each data value. The data distribution computer can generate a plurality of authorization request messages comprising at least one data value. The data distribution computer can then transmit the plurality of authorization request messages to a plurality of processing computers adapted to process the data values in the respective authorization request messages, wherein the plurality of processing computers process the data values in the respective authorization request messages. The plurality of authorization request messages are subsequently forwarded to the authorization computer. The authorization computer analyzes each authorization request message to authorize or decline the interaction.2021-12-30
20210406345FRAMEWORK FOR PREVENTING SOFTWARE PIRACY IN VIRTUAL MACHINES (VMS) BY USING VIRTUAL HARDWARE ENCRYPTION VERIFICATION - One example method includes receiving, from a VM, a request for a software license, in response to the request, transmitting a UUID to the VM, receiving, from the VM, a response that comprises a first encrypted UUID corresponding to the request, and transmitting a client object that includes the first encrypted UUID, and the client object serves as a request for entry of the client object in a database of a cloud computing site.2021-12-30
20210406346DETERMINING OPTIMAL MACHINE LEARNING MODELS - Aspects of the disclosure relate to determining optimal machine learning models. A computing platform may collect, via a network, data indicative of login activity to an enterprise resource. One or more initial features indicative of the login activity may be identified. Based on the one or more initial features, an initial test dataset and a test model may be generated. Then, the test model may be deployed in a production environment. Subsequently, the computing platform may identify one or more production feature vectors. Then, the computing platform may generate, based on the one or more production feature vectors, a training dataset. Subsequently, the computing platform may perform, for the training dataset, a data quality check. Then, the computing platform may predict, by applying Bayesian optimization to the training dataset, an optimal machine learning model. Subsequently, the computing platform may apply the optimal machine learning model to detect unauthorized activity.2021-12-30
20210406347ELECTRONIC DEVICE AND METHOD FOR CONTROLLING THE SAME - The present disclosure relates to an electronic device that is capable of multimodal biometric authentication and a method of controlling the electronic device.2021-12-30
20210406348SYSTEMS AND METHODS FOR MANAGING REQUESTS TO IMPLEMENT ACCOUNT RELATED ACTIONS BASED ON BIOMETRIC DATA - Systems and methods for managing requests to implement account related actions based on biometric data are disclosed herein. According to an aspect, a system includes a first computing device comprising a user account manager configured to manage an account of a user. The user account manager is also configured to receive a request to implement an action associated with the account. Further, the user account manager is configured to receive, from a second computing device of the user, biometric data associated with the user. The user account manager is also configured to manage the request to implement the action based on the received biometric data.2021-12-30
20210406349INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a processor configured to obtain a registered first voice of a first user identified in first authentication achieved by an authentication method different from an authentication method employing a voice, obtain a second voice uttered by a second user during operation, perform second authentication for confirming that the second user is the first user identified in the first authentication by comparing a feature of the first voice and a feature of the second voice, and perform, if the second authentication is successfully completed, a process in accordance with an operation associated with the second voice.2021-12-30
20210406350Facial Recognition Method and Electronic Device - A facial recognition method includes receiving, by an electronic device, a first instruction triggering the electronic device to perform facial recognition, emitting in response to the first instruction, infrared light with a light spot using an infrared projector, collecting first image information of a first object using a first camera, collecting second image information of the first object using a second camera, calculating depth information of the first object based on the first image information, the second image information, the first length, a lens focal length of the first camera, and a lens focal length of the second camera, and performing user identity verification on the first object using the first image information and the depth information of the first object.2021-12-30
20210406351NON-FACE-TO-FACE AUTHENTICATION SYSTEM - The inventive concept relates to a non-face-to-face authentication system, which strengthens security of face recognition at the same time as complementing the vulnerability of the authentication process through existing face recognition without undermining the convenience of the user. For example, the non-face-to-face authentication system is disclosed that includes a first user authentication information registering unit that registers a plurality of user face images respectively captured at various angles, a user face image obtaining unit that notifies each of a plurality of pieces of image capture direction information for a user face and obtains each of user face images according to the image capture direction information by means of live image capture, and a first authentication processing unit that compares the user face images obtained by means of the user face image obtaining unit with user face images registered with the first user authentication information registering unit and determines whether authentication is completed according to the compared result.2021-12-30
20210406352SYSTEM AND METHOD FOR BIOMETRIC-BASED USER AUTHENTICATION - A biometric-based personal authentication method for identifying or proving the identity of a user in integrated security systems to ensure authorized access by the user to information, payment systems, critical facilities, secured premises, and indoor areas, etc. Reducing the user authentication time by processing smaller amounts of biometric information is achieved through the digital authentication codes (DAC) obtained using artificial intelligence (AI) algorithms for various authentication objects, both when creating a database and when identifying a user, that forms a set of DAC parameters for each user common for biometric different objects of user authentication, and when authenticating a user, the set of user DAC parameters is compared with sets of DAC parameters from the database, in such a way that first only the DAC parameters obtained from comparing the user's DAC with the reference standard user's DAC and with the highest validity are taken into account.2021-12-30
20210406353SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION - The present teaching relates to user authentication. Upon a light sensitive sensor detects a motion, an infrared or near infrared sensor may be activated for capturing an image of a body part of a person appearing nearby. The body part may be positioned in a contactless manner with respect to the infrared or near infrared sensor. The image of the body part may be acquired via the infrared or near infrared sensor. Via processing of the image, it may be determined whether the body part being imaged represents an anticipated body part for authentication. If the body part being imaged is determined to be an anticipated body part for authentication, biometric features of the body part may be extracted from the image. Via the extracted biometric features of the body part, it may be verified whether the person corresponds to one of one or more authorized users previously registered.2021-12-30
20210406354SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM - A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user's identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction. Upon successful verification and authentication, biometric data regarding the user is electronically collected.2021-12-30
20210406355ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD - The present invention is a system for and method of enabling an initiating party to capture, store, and retrieve an image of at least one acknowledging party performing an acknowledgement requested by the initiating party where the acknowledging party(s) may be remotely located from the initiating party.2021-12-30
20210406356CONVERTING STATIC CONTENT ITEMS INTO INTERACTIVE CONTENT ITEMS - At least one aspect of the present disclosure is directed to systems and methods of converting static content items into interactive content items. A data processing system can identify a first content item. The data processing system can divide, in accordance with a partition template, the visual content of the first content item into a plurality of segments. The partition template can define a number of segments to be formed from the visual content. The data processing system can generate a second script. The second script can assign each segment into a position. The script can enable movement of each segment within the frame. The script can determine that the segments are moved to a target position. The script can perform an action to provide information related to the visual content. The data processing system can provide the second content item to a client device.2021-12-30
20210406357INDEXABLE AUTHENTICATION SYSTEM WITH GROUP ACCESS CONTROL AND METHOD - An indexable authentication system is provided for authenticating users and/or groups across multiple sessions. The indexable authentication system may include an authentication server, security component, communication component, credential database, authentication credential, credential index medium, origin terminal, access provisioning component, content filtering component, payment processing component, and provider aspects. Authorized sessions may be stored on a user device for future authentication actions. A method for authenticating users across multiple sessions using the indexable authentication system is also provided.2021-12-30
20210406358SENSORS ACCESS CONTROL - Examples techniques to control access to sensors of computing devices are described. In an example, a request to access a data of a first sensor is received. A physical condition defined for permitting access to the data of the first sensor is determined via a second sensor. The access to the data of the first sensor is controlled based on the physical condition.2021-12-30
20210406359System and Method to Support Multiple Security Schemes in an Embedded System - A mechanism for making multiple security schemes available in a single embedded system without requiring a firmware update or a hardware extension is provided. Embodiments provide firmware support for storing parameters related to each available security scheme and a selection mechanism to select the desired security scheme for the application utilizing the embedded system. Embodiments can also provide a status register to provide to a user an identification of the security scheme that is presently enabled on the embedded system. Embodiments can further prevent a malicious user from selecting an invalid security scheme.2021-12-30
20210406360ELECTRONIC DEVICE AND METHOD - An electronic device includes a control unit and a communication unit that is capable of communicating with a power supply device. The control unit determines whether or not a predetermined message relating to an authentication communication is received from the power supply device via the communication unit, and controls the electronic device to limit operation of the electronic device in a case where the predetermined message is received from the power supply device via the communication unit.2021-12-30
20210406361METHOD FOR SECURELY UPDATING CONTROL UNITS - A method for securely updating a control unit. The control unit includes a host configured to execute an update program and at least one application program, a memory, which contains the programs and data, and a hardware security module (HSM) which is configured to block and to unblock a write access to the memory. The method includes starting the host and the HSM; blocking the write access by the HSM; starting the update program; determining by the update program whether a request of a caller to carry out an update is present; if a request is present, checking an authorization of the caller by the HSM to carry out an update, the authorization of the caller being confirmed by a confirmation unit differing from the control unit; and if the caller is authorized, unblocking the write access and rewriting at least a portion of the memory by the update program.2021-12-30
20210406362REQUEST CONTROL DEVICE, REQUEST CONTROL METHOD, AND REQUEST CONTROL PROGRAM - A request control device, when receiving a request issued from a client to a Web system, causes a sandbox in which an environment of the Web system is reproduced to inspect the request. The request control device transfers the request to the Web system if an inspection result of the request in the sandbox does not indicate detection of an attack. The request control device does not transfer the request to the Web system if the inspection result of the request indicates detection of an attack.2021-12-30
20210406363SECURE DISTRIBUTION AND ADMINISTRATION OF DIGITAL EXAMINATIONS - A kit for administering a secure examination includes examinee interfaces and an enclosure with a gateway, power adapters to power the examinee interfaces, and a local examination server, wherein the local examination server includes a first network adapter configured to communicatively couple to a central examination server via a first network connection through the gateway and a second network adapter configured to communicatively couple to the plurality of examinee interface via a second network connection, and wherein the local examination server obtains examination items from the central examination server, transmits the examination items to the examinee interfaces, obtains a responsive input to the examination items from the examinee interfaces, transmits the responsive input to the central examination server, and causes the examinee interfaces to enter an examination mode that restricts access to applications, networks, and devices not required for taking the examination.2021-12-30
20210406364SYSTEM FOR DUAL-FILTERING FOR LEARNING SYSTEMS TO PREVENT ADVERSARIAL ATTACKS - A Dual-Filtering (DF) system to provide a robust Machine Learning (ML) platform against adversarial attacks. It employs different filtering mechanisms (one at the input and the other at the output/decision end of the learning system) to thwart adversarial attacks. The developed dual-filter software can be used as a wrapper to any existing ML-based decision support system to prevent a wide variety of adversarial evasion attacks. The DF framework utilizes two filters based on positive (input filter) and negative (output filter) verification strategies that can communicate with each other for higher robustness.2021-12-30
20210406365MALICIOUS ENTERPRISE BEHAVIOR DETECTION TOOL - Embodiments of the present disclosure provide systems, methods, and non-transitory computer storage media for identifying malicious enterprise behaviors within a large enterprise. At a high level, embodiments of the present disclosure identify sub-graphs of behaviors within an enterprise based on probabilistic and deterministic methods. For example, starting with the node or edge having the highest risk score, embodiments of the present disclosure iteratively crawl a list of neighbors associated with the nodes or edges to identify subsets of behaviors within an enterprise that indicate potentially malicious activity based on the risk scores of each connected node and edge. In another example, embodiments select a target node and traverse the connected nodes via edges until a root-cause condition is met. Based on the traversal, a sub-graph is identified indicating a malicious execution path of traversed nodes with associated insights indicating the meaning or activity of the node.2021-12-30
20210406366CLUSTERING AND CLUSTER TRACKING OF CATEGORICAL DATA - An approach for clustering large sets of categorical data involves iteratively ordering the data points, partitioning the data into blocks based on the ordering, and clustering the data points within each block, where different iterations use different orderings and, thus, different partitionings. In some embodiments, the data points are represented by multi-dimensional categorical vectors, and the orderings are based on permutations of the categorical dimensions. The iterative clustering may be repeated for multiple successive time windows to track the clusters. Various applications of the disclosed clustering approach, including for cyber security, are also described.2021-12-30
20210406367CONTROLLER SYSTEM - The present invention addresses the novel problem of protecting against threats that can arise as a result of the development of networked or intelligent control devices and control systems. This controller system includes: a control unit that executes a control operation for controlling a control target; and a security unit that is connected to the control unit and oversees and manages security functions for the controller system. The security unit includes a detection means that detects whether any unauthorized intrusion into the controller system has occurred. The control unit includes a command transmission means that transmits commands for changing the behavior of the detection means of the security unit.2021-12-30
20210406368DEEP LEARNING-BASED ANALYSIS OF SIGNALS FOR THREAT DETECTION - Embodiments of the present disclosure provide systems, methods, and non-transitory computer storage media for identifying malicious behavior using a trained deep learning model. At a high level, embodiments of the present disclosure utilize a trained deep learning model that takes a sequence of ordered signals as input to generate a score that indicates whether the sequence is malicious or benign. Initially, process data is collected from a client. After the data is collected, a virtual process tree is generated based on parent and child relationships associated with the process data. Subsequently, embodiments of the present disclosure aggregate signal data with the process data such that each signal is associated with a corresponding process in a chronologically ordered sequence of events. The ordered sequence of events is vectorized and fed into the trained deep learning model to generate a score indicating the level of maliciousness of the sequence of events.2021-12-30
20210406369METHODS AND APPARATUS TO PROVIDE AND MONITOR EFFICACY OF ARTIFICIAL INTELLIGENCE MODELS - Methods, apparatus, systems, and articles of manufacture to provide and monitor efficacy of artificial intelligence models are disclosed. An example apparatus includes a model trainer to train an artificial intelligence (AI) model to classify malware using first training data; an interface to deploy the AI model to a processing device; a model implementor to locally apply second training data to the AI model to generate output classifications, the second training data generated after generation of the first training data; and a report generator to generate a report including an efficacy of the AI model based on the output classifications.2021-12-30
20210406370DETECTING MALICIOUS SCRIPTS IN A WEB PAGE - Techniques are provided for detecting a malicious script in a web page. Instrumentation code is provided for serving to a client computing device with a web page. The instrumentation code is configured to monitor web code execution at the client computing device when a script referenced by the web page is processed. Script activity data generated by the instrumentation code is received. The script activity data describes one or more script actions detected by the instrumentation code at the client computing device. Prior script activity data generated by a prior instance of the instrumentation code is obtained. A malicious change in the script is detected based on comparing the script activity data and the prior script activity data. In response to detecting the malicious change in the script, a threat response action is performed.2021-12-30
20210406371MALWARE SCAN TASK PROCESSING IN A DATA STORAGE SYSTEM - Malware scan task processing in a data storage system is described herein. A method as described herein can include designating, by a device operatively coupled to a processor, a file stored by a primary cluster of a data storage system for a malware scan; locating, by the device, a secondary cluster of the data storage system having stored thereon a copy of the file, the secondary cluster being distinct from the primary cluster; and, in response to determining that the file stored by the primary cluster matches the copy of the file stored by the secondary cluster, causing, by the device, a second anti-malware server associated with the secondary cluster to perform the malware scan for the copy of the file instead of a first anti-malware server associated with the primary cluster.2021-12-30
20210406372SYSTEM FOR IDENTIFYING SUSPICIOUS CODE EMBEDDED IN A FILE IN AN ISOLATED COMPUTING ENVIRONMENT - Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.2021-12-30
Website © 2022 Advameg, Inc.