52nd week of 2021 patent applcation highlights part 56 |
Patent application number | Title | Published |
20210406373 | APPARATUS FOR SELECTING REPRESENTATIVE TOKEN FROM DETECTION NAMES OF MULTIPLE VACCINES, METHOD THEREFOR, AND COMPUTER READABLE RECORDING MEDIUM STORING PROGRAM FOR PERFORMING THE METHOD - An apparatus for selecting a representative token of the present invention includes a token graph generation unit configured to extract a plurality of tokens from a plurality of detection names for malicious files and generate a detection name token graph representing a relationship between the extracted plurality of tokens, and a representative token selection unit configured to select a representative detection name token for the input file based on the detection name token graph. | 2021-12-30 |
20210406374 | COMPRESSION/DILATION TECHNIQUE FOR SYNCHRONIZING TIME-SERIES SIGNALS USED TO DETECT UNWANTED ELECTRONIC COMPONENTS IN CRITICAL ASSETS BASED ON EMI FINGERPRINTS - The disclosed embodiments provide a system that detects unwanted electronic components in a target asset. During operation, the system obtains target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target asset while the target asset is running a periodic workload. Next, the system generates a target EMI fingerprint from the target EMI signals. The system then applies a compression/dilation technique to time-series signals in the target EMI fingerprint to achieve alignment with corresponding time-series signals in a reference EMI fingerprint to produce a synchronized target EMI fingerprint. Finally, the system compares the synchronized target EMI fingerprint against the reference EMI fingerprint to determine whether the target asset contains any unwanted electronic components. | 2021-12-30 |
20210406375 | METHOD FOR CARRYING OUT A SECURED STARTUP SEQUENCE OF A CONTROL UNIT - A method for carrying out a secured startup sequence of a control unit, which includes a host that is configured to execute a loader program and one or multiple application programs, and a hardware security module (HSM) which includes a program memory and a data memory. The method includes a starting of the host and of the HSM; an authentication of the loader program by the HSM with the aid of a loader program signature stored in the program memory of the HSM; and, an execution of the loader program by the host if the authentication of the loader program is successful. | 2021-12-30 |
20210406376 | FIRMWARE PASSWORD MANAGEMENT - Disclosed are various examples for managing firmware passwords, such as BIOS passwords. A password reset command can be generated and transmitted to a client device. A management agent can execute the command and provide confirmation to a management service that the password has been updated. | 2021-12-30 |
20210406377 | SECURE USER ASSIGNED DEVICE FROM MANUFACTURER - This document relates to securing ownership of devices to particular users when the devices are shipped directly from an original equipment manufacturer in order to prevent malicious use of devices that are lost or stolen. A purchaser may purchase a device from an original equipment manufacturer, and as part of the purchasing process, may provide ownership information for the device, which may include a user identifier and an identity provider. The ownership data can be written to firmware, and upon powering on of the device, the device can request a user identifier, which is then validated by the identity provider before allowing operating systems operations to continue on the device. | 2021-12-30 |
20210406378 | DATA PROTECTION IN A PRE-OPERATION SYSTEM ENVIRONMENT BASED ON AN EMBEDDED KEY OF AN EMBEDDED CONTROLLER - An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data. | 2021-12-30 |
20210406379 | SECURE BOOT DEVICE AND PROCESS - Disclosed is an electronic device configured to perform a secure boot. The electronic device according to an embodiment disclosed herein may include: a first memory area for storing a firmware signed with a private key; a second memory area for storing a boot loader configured to verify integrity of the firmware and executing the firmware of which integrity has been verified; and a third memory area for storing a first public key paired with the private key, wherein the second memory area may store a second public key paired with the private key. The boot loader may verify the integrity of the firmware with the first public key when there is the first public key in the third memory area and verify the integrity of the firmware with the second public key when there is no first public key is in the third memory area. | 2021-12-30 |
20210406380 | FAST AND VERSATILE MULTICORE SOC SECURE BOOT METHOD - A system, method, and apparatus are provided for securely controlling operations of a data processing system by activating a security subsystem to control startup behavior of application subsystems, installing SMR parameters which include an initial authenticity proof for use with an initial verification process for the SMR and calculating an alternate authenticity proof for use with a subsequent verification process for the SMR, and then by subsequently verifying the SMR using the alternate authenticity proof for the subsequent verification process applied to the SMR so that the security subsystem can apply a comprehensive system reaction for the application subsystem based on the SMR verification results. | 2021-12-30 |
20210406381 | METHOD AND APPARATUS TO ADJUST SYSTEM SECURITY POLICIES BASED ON SYSTEM STATE - A system, method, and apparatus are provided for securely controlling operations of a data processing system in which security subsystem is activated to provide security services by responding to a security service request, evaluating the request against an adjustable set of system security policies to determine if the security service request is granted access to a protected asset, by generating a response to the security service request using the protected asset if the security service request is granted access to the protected asset, by adjusting a security access policy for the protected asset in the adjustable set of system security policies, and by sending the response from the security subsystem to the external application subsystem. | 2021-12-30 |
20210406382 | SECURE TRANSFER OF REGISTERED NETWORK ACCESS DEVICES - The disclosed method is performed by a cloud system for changing a registration of a network access device. The method includes initiating a change of a registration of a network access device. The registration is stored at a cloud system and indicates ownership of the network access device by a first user. The method further includes receiving an authorization from the first user to dissociate the ownership of the network access device by the first user, and receiving an indication of a physical reset occurring locally at the network access device. The physical reset allows the first user to dissociate the ownership of the network access device. The method further includes, upon receiving both the authorization by the first user and the indication of the physical reset, releasing the ownership by the first user of the network access device at the cloud system. | 2021-12-30 |
20210406383 | System and Method for Providing an Application Programming Interface (API) Based on Performance and Security - A system is configured for determining an API to perform a task includes a processor configured to receive a request from a user to determine an API to perform the task. The input and output parameters of the API are determined. A set of APIs is determined from an API library that is capable of providing the output parameter given the input parameter. Each API from among the set of APIs is evaluated by determining a quality value; a security value, and a performance value of the API. An API score value is determined based on a combination of the quality value, the security value, and the performance value of the API. A particular API having an API score value that is the highest compared to other APIs from among the set of APIs is determined. The particular API is hosted on a web application to perform the task. | 2021-12-30 |
20210406384 | FAST AND EFFICIENT SYSTEM AND METHOD FOR DETECTING AND PREDICTING ROWHAMMER ATTACKS - Embodiments provide for predicting rowhammer attack vulnerability of one or more memory cells of a direct random access memory (DRAM) chip, the DRAM chip including a plurality of memory cells. An example method, determines, for each memory cell of a subset of memory cells of the plurality of memory cells, a leakage time t, a resistance of intrinsic leakage R | 2021-12-30 |
20210406385 | ANALYSIS UNIT FOR ANALYZING A SYSTEM OR PORTION THEREOF - An analysis unit of an analysis system includes a data module and an analyze and score module. The data module receives data analysis parameters regarding a particular evaluation of a system, determines data collection parameters and data parsing parameters, interacts with a collection of data to collect data relevant to the particular evaluation, based upon the data parsing parameters, parses the data relevant to the particular evaluation to produce source data. The analyze and score module receives the data analysis parameters regarding the particular evaluation, determines a system aspect, an evaluation aspect, one or more evaluation metrics, one or more evaluation modes, and one or more evaluation perspectives, and evaluates the source data in accordance with the system aspect, the evaluation aspect, the one or more evaluation metrics, the one or more evaluation modes, and the one or more evaluation perspectives to produce one or more evaluation outputs including ratings. | 2021-12-30 |
20210406386 | SYSTEM AND METHOD FOR MULTIPARTY SECURE COMPUTING PLATFORM - Systems, methods, and corresponding non-transitory computer readable media describe a proposed system adapted as a platform governing the loading of data in a multiparty secure computing environment. In the multiparty secure computing environment described herein, multiple parties are able to load their secure information into a data warehouse having specific secure processing adaptations that limit both access and interactions with data stored thereon. | 2021-12-30 |
20210406387 | Method and Apparatus for Managing Transmission of Secure Data Packets - A logic circuit for generation of data signatures and/or encryption of data packets to be transferred from an industrial controller snoops data as it is written to an output buffer within the industrial controller. The logic circuit generates a secure signature and/or coordinates encryption of the data packet being transferred between the shared memory location and the output buffer. If encryption of the data is required, an encryption module may both encrypt the data and generate a secure signature. If encryption is not required, the logic circuit generates the secure signature. In either case, the logic circuit controls ownership of the memory address in which the secure signature is to be written to coordinate with the MAC transferring the secure signature to the output buffer, providing a uniform interface between the SPP module and the MAC. | 2021-12-30 |
20210406388 | ACCESSING FILE SYSTEMS IN A VIRTUAL ENVIRONMENT - An access control engine can enable a host operating system to propagate a private resource of an isolated virtual environment, such as a container, running on the host operating system outside of the isolated virtual environment. The private resource can include, for example, a file system mounted within the isolated virtual environment. The access control engine can receive a command and launch the isolated virtual environment in response to the command. Also, in response to the command, the access control engine can interface with a kernel of the host operating system to configure the isolated virtual environment so that the private resource is accessible outside the isolated virtual environment. | 2021-12-30 |
20210406389 | METHOD AND DEVICE FOR DISPLAYING INFORMATION - The embodiment of the present disclosure discloses a method and device for displaying information. A specific mode of execution for the method comprises the following steps: in response to the detection of a first preset operation performed by a first user on the page of a second user, sending operation prompt information to a terminal device used by the first user, the page of the second user being used for exhibiting contents shared by the second user, the first preset operation being used for requesting to add a user label corresponding to the second user for the first user; in response to the detection of the second preset operation completed by the first user, adding the user label for the first user; generating an initial associated value used for indicating the association degree between the first user and the second user, and displaying the initial associated value on the page. | 2021-12-30 |
20210406390 | MOVE DATA AND SET STORAGE KEY BASED ON KEY FUNCTION CONTROL - A single architected instruction to perform multiple functions is executed. The executing includes performing a first function of the multiple functions and a second function of the multiple functions. The first function includes moving a block of data from one location to another location, and the second function includes setting one portion of a storage key using one selected key and another portion of the storage key using another selected key. The storage key is associated with the block of data and controls access to the block of data. The first function and the second function are performed as part of the single architected instruction. | 2021-12-30 |
20210406391 | Production Protection Correlation Engine - Aspects of the disclosure relate to a production protection correlation engine. In some embodiments, a computing platform may acquire access permission data aggregated from a plurality of data sources and normalize the access permission data. Then, the computing platform may identify user-specific entitlements and classify user roles. Next, the computing platform may tag the normalized permission data based on user role classification data. Based on the tagging, the computing platform may identify at least one enterprise user having one or more toxic access permissions and, in response, trigger an access review process. In turn, the computing platform may revoke one or more incompatible access permissions. Then, the computing platform may transmit updated access permission data to a system of record, causing the system of record to store the updated access permission data in a database and limit access to enterprise resources based on the updated access permission data. | 2021-12-30 |
20210406392 | SYSTEMS AND METHODS FOR QUANTUM FILE PERMISSIONS - Providing quantum file permissions is disclosed herein. In one example, a quantum computing device includes a permissions database that stores permissions information for a plurality of quantum files. A quantum file permissions service, executing on a processor device of the quantum computing device, receives from a requestor a permissions query for a permissions status (i.e., a read permission indicator, a write permission indicator, and/or an execute permission indicator, as non-limiting examples) of a quantum file including a plurality of qubits. In response, the quantum file permissions service accesses permissions information for the quantum file from the permissions database. The quantum file permissions service uses the permissions information from the permissions database to determine a permissions status of the quantum file. The quantum file permissions service then sends a response to the requestor indicating the permissions status of the quantum file. | 2021-12-30 |
20210406393 | SYSTEM AND METHOD FOR ANALYZING CONFIDENTIAL DATA - The present application is related to system and method for analyzing confidential data. Firstly, a first key is used to obtain a first analysis authorization for proceeding a first analysis responsive to an operational model in an encrypted cloud space with a connection of a network. Then, the result of the first analysis is verified. While the verifying of the operational model is pass, a second key is used to obtain a second analysis authorization for proceeding a second analysis responsive to an operational model without the connection of the network. Thereby, the cloud technique for analyzing data can be applied for analyzing confidential data. | 2021-12-30 |
20210406394 | PRE-REGISTRATION OF SECURE TRAVEL INFORMATION - A blockchain-based travel security system is provided. The system increases travel security. The system includes an electronically stored user's itinerary file with a user's pre-registered travel itinerary. The itinerary file can be stored on a blockchain. The system also includes an electronically stored user's medical history file stored on the blockchain. A single trusted information source provides the itinerary file and the medical history file to the blockchain. The system includes a dual track information storage and retrieval system which is configured to store the itinerary file and to store the recent medical history file. The dual track information storage and retrieval system comprises a first track related to the user's recent medical history file and a second track related to the itinerary file. | 2021-12-30 |
20210406395 | PERSONAL INFORMATION VAULT - Various aspects of the subject technology relate to systems, methods, and machine-readable media for securely communicating personal information. The method includes receiving, from a user, personal information regarding the user. The method also includes storing the personal information in secure storage. The method also includes receiving, from a third party, a request for the personal information of the user. The method also includes receiving, from the user, authentication of the request for the personal information of the user. The method also includes in response to receiving the authentication, providing metadata to the third party comprising a promise to supply the personal information of the user, the metadata further comprising at least one of a timestamp, delta, or version number. The method also includes receiving, from a requestor, a notification for resolution of the promise, the notification identifying which of the personal information is required to complete a transaction. | 2021-12-30 |
20210406396 | System and method for securing data through proctored working environment - A system for securing data is disclosed. The system includes a processing subsystem including a connection module to evaluate a computing device corresponding to remote workers for compatibility with a peripheral edge computing device, the computing device is enabled with an edge assisted proctoring service. The system includes an edge computing subsystem including an authentication module to verify an identity of the remote workers on the computing device using verification processes. The edge computing subsystem includes an activity monitoring module to monitor activities of the remote workers by collecting streaming data in real-time on the peripheral edge computing device. The activity monitoring module identifies suspicious activities by processing the streaming data. The edge computing subsystem includes an alert generation module to generate an alert upon identifying the suspicious activities. The edge computing subsystem includes a logging module to record the suspicious activities and store it in the server using Blockchain. | 2021-12-30 |
20210406397 | EFFICIENT API WITH PRIVACY PROTECTION - Methods, computer readable media, and devices for efficient application programming interface (API) processing with privacy protection are disclosed herein. One method may include receiving a user request for content from a client, parsing the user request for content to identify one or more request portions having a type of public information, customized information, and personal information, transmitting the one or more request portions to a corresponding microservice based on the type of the portion of content being requested, receiving one or more response portions, determining a type of the one or more portions of content, and in response to determining the type of a portion of content is not personal information, caching the portion of content based on the type of the portion of content, combining the one or more response portions into a user response, and sending the user response to the client. | 2021-12-30 |
20210406398 | DATA PROCESSING SYSTEMS FOR DATA TESTING TO CONFIRM DATA DELETION AND RELATED METHODS - In particular embodiments, a Personal Data Deletion System is configured to: (1) at least partially automatically identify and delete personal data that an entity is required to erase under one or more of the conditions discussed above; and (2) perform one or more data tests after the deletion to confirm that the system has, in fact, deleted any personal data associated with the data subject. The system may, for example, be configured to test to ensure the data has been deleted by: (1) submitting a unique token of data through a form to a system; (2) in response to passage of an expected data retention time, test the system by calling into the system after the passage of the data retention time to search for the unique token. | 2021-12-30 |
20210406399 | CLOUD-BASED SYSTEM FOR PROTECTING SENSITIVE INFORMATION IN SHARED CONTENT - Cloud-based methods and systems for content sharing are disclosed. In some embodiments, the systems may include one or more processors configured to: receive, from a client device, an instruction for sharing a designated digital asset; retrieve the designated digital asset from a storage device; determine provenance of the designated digital asset based on metadata of the designated digital asset; generate authentication information based on the provenance of the designated digital asset; identify sensitive information in the designated digital asset; generate a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information; and provide the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset. | 2021-12-30 |
20210406400 | ASSOCIATING ANONYMOUS INFORMATION WITH PERSONALLY IDENTIFIABLE INFORMATION IN A NON-IDENTIFIABLE MANNER - The present disclosure provides a detailed description of techniques used in methods, systems, and computer program products for associating anonymous information to personally identifiable information without sharing any personally identifiable information. A method receives a specification record comprising one or more specified demographic attributes to be used in user record selection operations, the results of which operations include user records that comprise a user identifier and at least some non-personally-identifiable information. A candidate group is formed by applying a set of rules over the retrieved user records to reject-out one or more user records that comprise mutually-exclusive characteristics with respect to the other user records in the candidate group. An anonymity measure is calculated over the candidate group to satisfy a threshold of anonymity. If needed to satisfy the threshold of anonymity, additional user records are added to the group before any sharing operations. Anonymity of the users is preserved. | 2021-12-30 |
20210406401 | Dynamic Trigger of Web Beacons - Techniques are disclosed relating to methods that include receiving an indication of an access by a user to a web page that includes a beacon, and calculating a readiness score for triggering the beacon. The methods may also include determining, based on the readiness score, whether to perform a client-side or server-side triggering of the beacon. The triggering causes data associated with the access to be transmitted to a third-party computer system. | 2021-12-30 |
20210406402 | PERSONAL DATA PLATFORM - A personal data platform is disclosed that provides users with control over their personal data. The data is stored on private infrastructure. Data is ingested from data sources and stored at the data platform. The data platform provides compute services that allow services to execute against the data to generate inferences without transmitting the data to a service provider. A user is also able to authorize access to data at multiple levels with service providers and others. | 2021-12-30 |
20210406403 | DATA PROTECTION FOR NETWORKING DEVICES - Embodiments are described for a method and system of applying data protection software mechanisms to network equipment devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques. | 2021-12-30 |
20210406404 | METHODS AND APPARATUS FOR PERFORMING A CRYPTOGRAPHIC OPERATION WITH A KEY STORED IN A HARDWARE SECURITY MODULE - Aspects of the present disclosure relate to an apparatus comprising secure enclave circuitry, and processing circuitry to execute computer program instructions. The computer program instructions correspond to an operation comprising accessing a cryptographic key, the key being stored in a hardware security module. Executing the computer program instructions comprises transmitting, to the secure enclave circuitry, computer program instructions corresponding to said operation. The secure enclave circuitry is configured to initiate communication with the hardware security module, perform, with the hardware security module, an attestation process in respect of said operation, and execute said operation. | 2021-12-30 |
20210406405 | PQA UNLOCK - In one embodiment, a secure chip apparatus, includes a memory to store an encrypted value E and a one-way function output-value H, which is an output value of a one-way function computed with a nonce N as input, an interface to transfer data with an external device, and chip security circuitry to lock a portion of the chip apparatus from use, receive an unlock request from an unlocking hardware security module (HSM) via the interface, provide the encrypted value E to the HSM responsively to the unlock request, receive a value N′ from the HSM, the value N′ being a decrypted value of the encrypted value E, compute a one-way function output-value H′ responsively to the value N′, compare the value H′ to the value H, and unlock the portion of the chip apparatus for use responsively to a match between the value H′ and the value H. | 2021-12-30 |
20210406406 | CONSTANT TIME SECURE ARITHMETIC-TO-BOOLEAN MASK CONVERSION - A first arithmetic input share and a second arithmetic input share of an initial arithmetically-masked cryptographic value are received. A sequence of operations using the arithmetic input shares and a randomly generated number is performed, where a current operation in the sequence of operations generates a corresponding intermediate value that is used in a subsequent operation. At the end of the sequence of operations, a first Boolean output share and a second Boolean output share are generated. The arithmetic-to-Boolean mask conversion is independent of the input bit length. | 2021-12-30 |
20210406407 | BLOCK CHAIN BASED VALIDATION OF MEMORY COMMANDS - The present disclosure includes apparatuses, methods, and systems for block chain validation of memory commands. An embodiment includes a memory, and circuitry configured to receive a command that is included in a block in a block chain for validating commands to be executed on the memory, wherein the command includes an anti-replay portion that is based on a previous command included in a previous block in the block chain, validate the command using the anti-replay portion of the command, and execute the command on the memory upon validating the command. | 2021-12-30 |
20210406408 | PROCESSING CIRCUIT AND PROCESSING METHOD THEREOF - A processing circuit including a first oscillation circuit, a second oscillation circuit, a counting circuit, and a control circuit is provided. The first oscillation circuit receives an input voltage and generates a first clock signal according to the input voltage. The second oscillation circuit receives an output voltage and generates a second clock signal according to the output voltage. The counting circuit receives the output voltage. The counting circuit adjusts a first counter value according to the first clock signal and adjusts a second counter value according to the second clock signal. The control circuit receives the output voltage and determines whether the input voltage is experiencing an attack according to the first counter value and the second counter value. The first oscillation circuit operates in an un-protected power domain. The second oscillation circuit, the counting circuit, and the control circuit operate in a protected power domain. | 2021-12-30 |
20210406409 | SECURE WORKLOAD IMAGE DISTRIBUTION AND MANAGEMENT - Workload Images comprising one or more artifacts are managed in a decentralized and centralized manner. Local management comprises breaking any image/artifact into blocks, encrypting each block with a key known and available only to the local processing environment, and uniquely signing each encrypted block. Published versions of the images/artifacts are retained remotely in a cloud/server in encrypted and signed block format. When retrieval, modification, addition, deletion, and deployment of any given image/artifact is needed, the target device/server that is to receive the image/artifact provides a listing of encrypted blocks with the corresponding signatures that are already present on that device/server and a centralized cloud/server schedules and manages download of just those encrypted blocks that are missing to the target device/server. The target device/server assembles and installs the image/artifact using the downloaded blocks received from the cloud/server and the existing blocks already present on the target device/server. | 2021-12-30 |
20210406410 | METHOD AND DEVICE TO ENSURE A SECURE MEMORY ACCESS - The present disclosure relates to a system, a method and to a memory device to ensure a secure memory access to a memory device. The memory device is structured and organized with: | 2021-12-30 |
20210406411 | BUS ENCRYPTION FOR NON-VOLATILE MEMORIES - The present disclosure relates to apparatuses and methods for memory management. The disclosure further relates to an interface protocol for flash memory devices including at least a memory array and a memory controller coupled to the memory array. | 2021-12-30 |
20210406412 | MULTI-BODY COMPONENT OPTIMIZATION - Techniques and systems for computer aided design of physical structures using an object splitting design process that optimize manufacturing efficiency are described. A described techniques includes obtaining an input model of an initial object to be manufactured, the input model providing a 3D topology and shape for the object; determining, based on the 3D topology and shape, a 3D parting surface to split the initial object into separate objects, the parting surface intersects an inflection zone that is situated between up and down skin regions of the 3D topology and shape; and providing first and second 3D models of the separate objects in accordance with the 3D topology and shape and the parting surface, for use in manufacturing separate physical structures corresponding to the separate objects using one or more computer-controlled manufacturing systems, where after respective manufacturing, the physical structures are configured to be assembled to form a combined structure. | 2021-12-30 |
20210406413 | CONFORMAL COATING ITERATION - A computing device is provided, including a processor. The processor may generate a three-dimensional device model at least by receiving one or more three-dimensional substrate elements and one or more two-dimensional lithography elements. Generating the three-dimensional device model may further include generating a conformal coating on the one or more three-dimensional substrate elements over a plurality of conformal coating iterations that have respective iteration layer thicknesses. Each conformal coating iteration may include, for each two-dimensional lithography element, generating an iteration layer overlaid on the one or more three-dimensional substrate elements and having an iteration layer shape of at least a portion of that two-dimensional lithography element. Each conformal coating iteration may further include adding the iteration layer to the conformal coating. The processor may output the three-dimensional device model including the one or more three-dimensional substrate elements and the conformal coating. | 2021-12-30 |
20210406414 | COMPUTING INTERACTIONS OF SOURCES EMBEDDED IN THREE DIMENSIONAL LAYERED MEDIA - Systems and methods for computing interactions of charge sources embedded in three dimensional (3D) layered media. At least one of the methods includes decomposing the Green's function representing the potential caused by a charge source into a free space component and a plurality of reaction components; generating, for each reaction component of the plurality of reaction components, a multipole expansion (ME) operator and a multipole to local (M2L) translation operator; performing, for each reaction component of the plurality of reaction components, a convergence analysis of an ME of that reaction component; defining, for each reaction component, polarization charge sources based on the convergence analysis and combining the polarization charges sources with the charge sources; and computing, using a fast multipole method (FMM), interactions of the charge sources based on the polarization charge sources, the ME operators, and the M2L translation operators. | 2021-12-30 |
20210406415 | CONSTRUCTION MODEL CREATION SYSTEM, CONSTRUCTION MODEL CREATING METHOD, CONSTRUCTION INSPECTION SYSTEM, CONSTRUCTION INSPECTING METHOD - For creation of a construction model, a construction model creation system of the present invention includes a work results database storing position coordinates of work results, a work results extracting unit configured to extract the work results that are necessary from the work results database, a model creating unit configured to create a model from the extracted work results, a model determining unit configured to store a determined element of the model created by the model creating unit as a construction model of the construction work, and a construction model database configured to store the construction model determined by the model determining unit. | 2021-12-30 |
20210406416 | BUILDING MODEL USER INTERFACE AND METHOD OF USE - A system for building information modeling comprising a plurality of 2D documentation sets associated with a building. A 3D model associated with the building, the 3D model including a plurality of user-selectable controls, wherein each user-selectable control comprises an icon and an associated balloon that is generated when the icon is selected. The balloon for each user-selectable control comprising a first selection control that causes one of the plurality of 2D documentation sets to be shown after an animation sequence. The balloon for each user-selectable control comprising a second selection control that causes a transition to a 3D model having an overlay of the 2D documentation sets. | 2021-12-30 |
20210406417 | BASE MODEL SELECTION DEVICE, BASE MODEL SELECTION METHOD, AND PROGRAM - A storage stores base model master data including specification data for reference models and for past cases. A searcher in a calculator performs a data search on the base model master data using a requested specification input as a search key. A list creator creates a base model list listing a selected base model and specification data for the base model. The searcher determines whether at least one of the reference models satisfies the requested specification, selects, in response to at least one of the reference models satisfying the requested specification, the at least one reference model and adds the at least one reference model to the base model list, and selects, in response to the reference models dissatisfying the requested specification, a base model satisfying the requested specification from the past cases and adds the base model selected from the past case to the base model list. | 2021-12-30 |
20210406418 | A METHOD OF SOLVING CLOSED FORM EXACT SOLUTION FOR THE FIELD GENERATED BY A FINITE-LENGTH HARMONIC LINEAR CURRENT SOURCE IN A WHOLE SPACE - A method of solving closed form exact solution for the field generated by a finite-length harmonic linear current source in a whole space. The vector magnetic potential formula of the finite-length harmonic linear current source containing a source point position vector is listed, the uniform current is subjected to cosine processing, and the current in the vector magnetic potential formula of the harmonic linear current source is expressed by a cosine function. The vector magnetic potential formula can be subjected to quadrature by an elementary function to obtain the closed form exact solution for the field generated by the finite-length harmonic linear current source in whole space. The cosine expression of the linear current source can better reflect the fundamental attributes of the electric dipole and harmonic current of linear current source in the conductive whole space. The obtained closed form exact solution is applicable in the all zone. | 2021-12-30 |
20210406419 | SIMULATION CONTROLLER, SYSTEM AND METHOD FOR SIMULATING A RADAR SCENARIO - The invention relates to a versatile generation of radar signals for simulating a radar scenario. Radar signals may be generated by multiple RF output paths having different frequency ranges. Pulse descriptive words of radar signal simulation data are split into multiple groups according to the frequency or frequency range of the RF output paths and the split data are provided to the related RF output path. | 2021-12-30 |
20210406420 | METHOD AND SYSTEM FOR PREDICTING WEAR IN A RAIL SYSTEM - A system and method is disclosed for predicting and comparing wear scenarios in a rail system. The method can include generating and running a contact model of the interaction between a rail and a train car to produce a simulated loading on the rail for a predetermined time period; generating and running a wear model based on the material properties and/or friction modifier properties of the rail using the simulated loading to produce a simulated wear profile of the rail for the predetermined time period; obtaining a grinding profile to be performed on the rail during the predetermined time period; and generating an updated rail profile by modifying the rail profile by the simulated wear profile and the grinding profile. The method can predict and compare crack growth over time, and provide a financial model and comparison of costs and benefits for different maintenance protocols for the rail system. | 2021-12-30 |
20210406421 | Simulating Quantum Systems with Quantum Computation - In some aspects, a quantum simulation method includes generating a set of models representing a quantum system. The set of models includes subsystem models representing respective fragments of the quantum system. The quantum system is simulated by operating the set of models on a computer system that includes a classical processor unit and multiple unentangled quantum processor units (QPUs), and the unentangled QPUs operate the respective subsystem models. In some examples, density matrix embedding theory (DMET) is used to compute an approximate ground state energy for the quantum system. | 2021-12-30 |
20210406422 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - An information processing system searching for a solution to a problem represented by an energy function including a plurality of state variables, the information processing system includes a first node and second node. The first node searches for a first partial solution represented by a first state variable group, among the plurality of state variables, corresponding to a first subproblem assigned to the first node, the first subproblem being generated by dividing the problem. The first node holds a plurality of first solutions including a first solution corresponding to the problem, the first solution reflecting the first partial solution, and transmits one or more first solution among the plurality of first solutions. The second node updates, based on one or more first solution received from the first node, at least part of a plurality of second solution held in the second node. | 2021-12-30 |
20210406423 | Method for analyzing a result of a simulation of a manufacturing process - A computer-implemented method for analysing a result of a simulation of a manufacturing or deformation process, comprises
| 2021-12-30 |
20210406424 | Sheet metal forming and assembly simulation method - A computer-implemented method for simulating and optimising a process of forming and assembling parts comprises
| 2021-12-30 |
20210406425 | ELECTRICAL POWER GRID INTERCONNECTIONS - A computer-implemented method executed by one or more processors includes receiving interconnection data for a proposed interconnection to a power grid; accessing a power grid model including a topological representation of the power grid, electrical specifications of grid components, and empirical operation characteristics; and generating, using the interconnection data for the proposed interconnection to the power grid, and the power grid model, simulated power grid data. The simulated power grid data is based on simulating operation of the power grid with the proposed interconnection coupled to a location of the power grid identified by the interconnection data during a simulated time period. The simulated power grid data includes a plurality of different temporal and spatially dependent characteristics of the power grid. The method includes evaluating, using one or more metrics, the simulated power grid data; and outputting evaluation results of the one or more metrics. | 2021-12-30 |
20210406426 | CALIBRATION AND SIMULATION OF A WELLBORE LINER - Methods for predicting a structural response and failure of a liner for a well can include receiving geometric properties of the liner; receiving structural properties of the liner; receiving material properties of the liner; developing a numerical model of the liner; calibrating one or more parameters of the constitutive model representing the material of the liner, the calibrating including: determining a numerical burst pressure failure; determining a numerical collapse failure pressure; and simulating the structural response and failure of the numerical model subjected to an expected non-uniform pressure loading of the well, where the numerical model is used to predict the structural response and failure of the liner when installed in the well. | 2021-12-30 |
20210406427 | COMPUTER-IMPLEMENTED METHOD FOR HIGH SPEED MULTI-SOURCE LOADING AND RETRIEVAL OF WAVEFIELDS EMPLOYING FINITE DIFFERENCE MODELS - A method for efficiently injecting sources and retrieving receiver wavefields using finite difference models for wavefield simulations on a GPU, when the source and receiver are not on numerical grid points, and therefore arbitrarily located. To accomplish that, the method employs GPU texture memory to increase the memory read bandwidth, and then positions at arbitrary or simulated locations the sources in a finite difference grid, as well as extends them over a newly generated number of grid points. | 2021-12-30 |
20210406428 | Structural Static Strength Design Method Based on Strength Field - The invention provides a structural static strength design method based on the strength field, aiming to solve the present phenomenon that the stress field is mismatched with the overall strength in the existing structural static strength design process according to the overall strength perspective. In the present invention, the static strength of a mechanical structure and its components are treated as a field, the structural stress field and the static strength field are organically matched, and the specific method is that the ideal static strength field distribution of the dangerous cross-section of the structure is determined according to the limiting static stress amplitude distribution of the dangerous cross-section of the structure; designing an actual static strength field of the dangerous cross-section of the structure by combining materials and heat treatment; using the full field stress-strength interference model, the static strength design level of dangerous cross-section of structure can be quantitatively evaluated. | 2021-12-30 |
20210406429 | METHOD AND SYSTEM FOR PREDICTING WEAR AND CRACK GROWTH IN A RAIL SYSTEM - A system and method is disclosed for predicting and comparing wear scenarios in a rail system. The method can include generating and running a contact model of the interaction between a rail and a train car to produce a simulated loading on the rail for a predetermined time period; generating and running a wear model based on the material properties and/or friction modifier properties of the rail using the simulated loading to produce a simulated wear profile of the rail for the predetermined time period; obtaining a grinding profile to be performed on the rail during the predetermined time period; and generating an updated rail profile by modifying the rail profile by the simulated wear profile and the grinding profile. The method can predict and compare crack growth over time, and provide a financial model and comparison of costs and benefits for different maintenance protocols for the rail system. | 2021-12-30 |
20210406430 | METHOD AND SYSTEM FOR PERFORMING AND COMPARING FINANCIAL ANALYSIS OF DIFFERENT RAIL LIFE SCENARIOS IN A RAIL SYSTEM - A system and method is disclosed for predicting and comparing wear scenarios in a rail system. The method can include generating and running a contact model of the interaction between a rail and a train car to produce a simulated loading on the rail for a predetermined time period; generating and running a wear model based on the material properties and/or friction modifier properties of the rail using the simulated loading to produce a simulated wear profile of the rail for the predetermined time period; obtaining a grinding profile to be performed on the rail during the predetermined time period; and generating an updated rail profile by modifying the rail profile by the simulated wear profile and the grinding profile. The method can predict and compare crack growth over time, and provide a financial model and comparison of costs and benefits for different maintenance protocols for the rail system. | 2021-12-30 |
20210406431 | Method for simulating and analysing an assembly of parts created by a forming process - A computer-implemented method serves for simulating and analysing an assembly of two or more formed sheet metal parts. It comprises simulating a forming process of each part by an approximate simulation ( | 2021-12-30 |
20210406432 | CALCULATION METHOD, MEDIUM AND SYSTEM FOR REAL-TIME PHYSICAL ENGINE ENHANCEMENT BASED ON NEURAL NETWORK - A calculation method for real-time physical engine enhancement based on a neural network includes: dynamically constructing a multi-layer and multi-surface pre-collision shell according to key concave and convex vertices of an object to be subjected to collision detection; obtaining an initial collision detection correspondence matrix according to the multi-layer and multi-surface pre-collision shell; and setting a collision detection condition, inputting a relevant parameter of the collision detection condition into the neural network for parameter screening, and determining whether a collision condition satisfies a safety condition after the parameter screening. When the collision condition satisfies the safety condition, a collision detection correspondence matrix is not updated. When the collision condition does not satisfy the safety condition, the matrix is updated, and the multi-layer and multi-surface pre-collision shell is reconstructed according to the updated matrix. A calculation system for the real-time physical engine enhancement based on a neural network is further provided. | 2021-12-30 |
20210406433 | THERMODYNAMIC EQUILIBRIUM STATE PREDICTION DEVICE, PREDICTION METHOD AND PREDICTION PROGRAM - A prediction device for predicting a thermodynamic equilibrium state of a target material, includes a processor, and a memory storing program instructions that cause the processor to generate training data including inputs related to predetermined design conditions and outputs related to the thermodynamic equilibrium state that may occur based on the predetermined design conditions, for a model that outputs target variables related to the thermodynamic equilibrium state based on input explanatory variables related to design conditions of the target material, perform machine learning using the training data so that an input-output relation of the model approaches an input-output relation of the training data, set explanatory variables used to predict the thermodynamic equilibrium state of the target material, and output predictive target variables, being predicted results of the thermodynamic equilibrium state, from the model, based on the explanatory variables input into the model on which the machine learning has been performed. | 2021-12-30 |
20210406434 | COMPUTER SYSTEM FOR SIMULATING PHYSICAL PROCESSES USING SURFACE ALGORITHM - Described are computer implemented techniques for simulating elements of a fluid flow. These techniques include storing in a memory state vectors for a plurality of voxels, the state vectors comprising a plurality of entries that correspond to particular momentum states of a plurality of possible momentum states at a voxel, storing in a memory a representation of at least one surface that is sized and oriented independently of the size and orientation of the voxels, perform interaction operations on the state vectors, the interaction operations modelling interactions between elements of different momentum states, perform surface interaction operations on the representation of the surface, the surface interaction operations modelling interactions between the surface and substantially all elements of voxels, and performing move operations on the state vectors to reflect movement of elements to new voxels. | 2021-12-30 |
20210406435 | SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR ABSORPTION BASED LOGIC LOCKING - Embodiments provide for absorption-based logic locking. In example embodiments, a method includes receiving a point-function associated with Register Transfer Level (RTL) source code for an integrated circuit. The method further includes mapping data associated with the point-function to a first portion of a row-column-activated look-up-table (RCA-LUT). The method further includes deactivating a second portion of the RCA-LUT by setting bits of the second portion of the RCA-LUT to zero. The method further includes replacing a portion of comparator logic for the integrated circuit with the RCA-LUT. | 2021-12-30 |
20210406436 | METHOD FOR VERIFYING CONVOLUTIONAL NEURAL NETWORK MODEL AND DEVICE THEREOF - Disclosed are a method for verifying a convolutional neural network model and a device thereof. The method for verifying the convolutional neural network model includes (a) generating a polynomial circuit equation for a first configuration of a plurality of configurations configuring the convolutional neural network model; (b) generating a first commitment value and a first proof value by applying a zero-knowledge proof scheme based on the polynomial circuit equation; (c) generating an arithmetic circuit equation for a second configuration of the plurality of configurations; (d) generating a second commitment value and a second proof value by applying a zero-knowledge proof scheme based on the arithmetic circuit equation; and (e) generating a connection proof value connecting the first commitment value and the second commitment value. | 2021-12-30 |
20210406437 | PROGRAMMABLE CHIP, DESIGN METHOD AND DEVICE - A programmable operation and control chip, comprising: at least one controller with a control flow operation mode; at least one bus; at least one programmable operation structure with data stream flow operation mode which communicates with the controller via the bus and the data buffering structure to control and schedule the programmable operation structure and/or the data buffering structure, and allocate and process serial and parallel operation of data and/or dynamically reconfigure internal structure of the chip. | 2021-12-30 |
20210406438 | GLITCH SOURCE IDENTIFICATION AND RANKING - Glitch source identification and ranking is provided by: identifying a plurality of glitch sources in a circuit layout; back referencing the plurality of glitch sources to corresponding lines in a Resistor Transistor Logic (RTL) file defining the plurality of glitch sources; identifying, in the circuit layout, a plurality of glitch terminuses associated with the plurality of glitch sources; determining a plurality of glitch power consumption values associated with the plurality of glitch sources based on fanouts in the circuit layout extending from the plurality of glitch sources to the plurality of glitch terminuses; ranking, by a processor, the plurality of glitch sources based on corresponding glitch power consumption values of the plurality of glitch power consumption values corresponding to individual glitch sources of the plurality of glitch sources; and reporting the corresponding lines in the RTL file associated with the ranked plurality of glitch sources. | 2021-12-30 |
20210406439 | METAL ZERO POWER GROUND STUB ROUTE TO REDUCE CELL AREA AND IMPROVE CELL PLACEMENT AT THE CHIP LEVEL - A system and method for laying out power grid connections for standard cells are described. In various embodiments, a standard cell includes power post and ground posts in metal zero. The metal zero posts include no vias to any upper metal layers. Some variations of the standard cell have the power and ground posts routed in metal zero to a boundary edge of the standard cell. Layout rules are changed to allow this type of routing. The power and ground posts in metal zero are connected to power and ground posts in metal zero of a neighboring cell by abutment. The place-and-route tool doesn't need to perform a further routing step after placing the cells. For other variations, the power and ground posts are not routed to the boundary edge and the place-and-route tool routes power and ground connections in metal zero between the standard cell and the neighbor cell. | 2021-12-30 |
20210406440 | JUMPER CAP CIRCUIT AND METHOD FOR DESIGNING THE SAME - A jumper cap circuit and a method for designing the same are provided. The jumper cap circuit includes: a three-pin header, a chip, a pull-up resistor or a pull-down resistor, and a resistor R | 2021-12-30 |
20210406441 | SEGREGATING DEFECTS BASED ON COMPUTER-AIDED DESIGN (CAD) IDENTIFIERS ASSOCIATED WITH THE DEFECTS - For each defect in a set of defects, the defect may be associated with a defect attribute constructed from a set of computer-aided design (CAD) identifiers associated with polygons in an integrated circuit (IC) design that overlap with a defect area of the defect. Next, the set of defects may be segregated into defect groups based on the associated defect attributes. The defect groups may be used to perform additional processing on the set of defects. | 2021-12-30 |
20210406442 | VERIFICATION PLATFORM FOR SYSTEM ON CHIP AND VERIFICATION METHOD THEREOF - The present application discloses a verification platform for a system on chip and a verification method thereof, the method comprises: constructing a simulation verification environment for the system on chip; creating a bus function model unit, and binding the bus function model unit to the same interface at which a central processing unit being connected to the bus; creating an Universal Verification Methodology test instance, and performing the Universal Verification Methodology test instance by the bus function model unit to implement the system on chip test; creating a plurality of software test instances; and compiling the software test instances, and performing the compiled software test instances by the central processing unit to implement the system on chip test. | 2021-12-30 |
20210406443 | VERIFICATION PLATFORM FOR SYSTEM ON CHIP AND VERIFICATION METHOD THEREOF - The present application discloses a verification platform for a system on chip and a verification method thereof, the method comprises: generating, by an Universal Verification Methodology test instance, constrained random parameters and random controls, and storing them to a storage area of a bus function model unit; reading, by a software test instance, the random parameters and the random controls through the central processing unit, and configuring a test of the system on chip; storing execution status information of the software test instance in the storage area; reading, by the Universal Verification Methodology test instance, the execution status information, and adjusting constraint condition for generating random parameters and random controls based on the execution status information to exclude having been tested scenarios, and converting the execution status information into coverage data for coverage analysis. | 2021-12-30 |
20210406444 | ADVANCED TEXT TAGGING USING KEY PHRASE EXTRACTION AND KEY PHRASE GENERATION - The systems and methods described herein describe a comprehensive knowledge and/or skills management technology tool to address these and other issues with an advanced text tagging algorithm to extract the relevant topics from a text segment. The tagging algorithm includes a key phrase extraction technique and a key phrase generation technique. The key phrase extraction includes identifying phrases from the original text that represents its most relevant information. The key phrase generation technique includes generating additional phrases that do not necessarily appear in the text, but which describe its subject. | 2021-12-30 |
20210406445 | METHOD AND SYSTEM FOR AUTOMATIC CUSTOMIZATION OF UNIFORM RESOURCE LOCATORS (URL) BY EXTRACTING A URL OR A CONTENT CONTAINING ONE OR MORE URLS AND REPLACING WITH ONE OR MORE CUSTOMIZED URLS - The invention provides a system and method for customizing one or more Uniform Resource Locator (URLs), including defining configuration rules which governs customization of one or more URLs; reading and loading the configuration rules to a computing device using a software means; activating an event listener means for identifying an event of a content copied to a temporary or other storage location of the computing device; extracting content for customization from the copied content; requesting a customization server to customize the extracted content based on the configuration rules; returning one or more customized URLs to the software means; and replacing the extracted content with one or more returned customized URLs. The invention enables users to obtain customized or branded URLs without interrupting the natural work process of copying and pasting and without any additional steps involved. The invention allows customization of URLs when a content is updated. | 2021-12-30 |
20210406446 | System And Method For Managing Content On A Network Interface - A web site may be present on the World Wide Web, an Internet location, an intranet location, an extranet location, or some other form of network interface. A system for automated management of content on a network interface can automatically create applications and links to those applications without human intervention. Examples of automated applications include newsroom applications, calendar of events, employment opportunities, project portfolio, biographies, frequently asked questions, document library, category management, product catalogs, e-mail broadcasts, surveys, and newsletters. Fully normalized hierarchies of business rules and user profiles can be supported by the system to facilitate automation and configurability. Multiple content providers can manager a single web site in a simultaneous or substantially simultaneous manner. Multiple organizations can use the system to manage multiple web sites in a substantially simultaneous manner. | 2021-12-30 |
20210406447 | DECOUPLING WEBSITE SERVICE FROM PRESENTATION LAYER - Aspects of the present disclosure involve systems and methods for performing operations comprising: retrieving, from a content management system, website generation data; identifying a first type of object in the website generation data; obtaining, from a centralized storage of a plurality of website presentation layers, a first website presentation layer corresponding to the first type of object; and generating, for display on a webpage, a first display element corresponding to the first type of object according to a look and feel defined by the first website presentation layer and having first content defined by the website generation data. | 2021-12-30 |
20210406448 | SYSTEMS AND METHODS FOR AUTOMATED CODE VALIDATION - Systems and methods in accordance with embodiments of the invention can automatically track the creation of documents, such as source code files and unit tests, along with the development of those documents. The document creation and development workflow can be automatically validated against a defined set of standards to ensure that the documents are properly created. The review of the documents can also be automatically validated to ensure that the review process is properly completed. A variety of metrics can be generated regarding errors and issues identified during the validation processes. These metrics can be used to identify common issues, automatically generate proactive suggestions to avoid issues during document creation and testing, and/or generate developer profiles indicating the performance of particular developers. | 2021-12-30 |
20210406449 | Intelligently Identifying Collaborators for a Document - A method and system for identifying potential collaborators for a document may include determining a lifecycle stage of a document, determining a subject matter of the document based at least in part on content of the document. The method and system identify one or more potential collaborators to contribute to the document based at least in part on the subject matter of the document, a lifecycle stage of the document, or collaborator-specific information associated with each of the one or more potential collaborators. The method and system may also include providing data relating to the one or more potential collaborators for display. | 2021-12-30 |
20210406450 | INTERACTIVE VALIDATION OF ANNOTATED DOCUMENTS - A computer-implemented method includes: receiving, by a computer device, an electronic document having labels; predicting, by the computer device, a user will reject the labels; determining, by the computer device and in response to the determining the user will reject the labels, that a subset of labels of the labels violate association rules; marking, by the computer device, the subset of labels which violate the association rules for validation; prioritizing, by the computer device, the subset of labels which violate the association rules; and rendering, by the computer device, the subset of labels which violate the association rules in view of priority. | 2021-12-30 |
20210406451 | Systems and Methods for Extracting Information from a Physical Document - Systems and methods for extracting information from documents are provided. In one example embodiment, a computer-implemented method includes obtaining one or more units of text from an image of a document. The method includes determining one or more annotated values from the one or more units of text and determining a set of candidate labels for each annotated value. The method determines each set of candidate labels by performing a search for the candidate labels based at least in part on a language associated with the document and a location of each annotated value. The method includes determining a canonical label for each annotated value based at least in part on the associated candidate labels, and mapping at least one annotated value to an action that is presented to a user based at least in part on the canonical label associated with the annotated value. | 2021-12-30 |
20210406452 | COMPUTER-IMPLEMENTED METHOD AND APPARATUS FOR AUTOMATICALLY ANNOTATING COLUMNS OF A TABLE WITH SEMANTIC TYPES - Provided is a computer-implemented method for generating automatically annotations for tabular cell data of a table having column and rows, wherein the method includes: supplying raw cell data of cells of a row of the table as input to an embedding layer of a semantic type annotation neural network which transforms the received raw cell data of the cells of the supplied row into cell embedding vectors; processing the cell embedding vectors to calculate attentions among the cells of the respective row of the table encoding a context within the row output as cell context vectors; and processing the cell context vectors generated by the self-attention layer by a classification layer of the semantic type annotation neural network to predict semantic column type annotations and/or to predict relations between semantic column type annotations for the columns of the table. | 2021-12-30 |
20210406453 | MAPPING ANNOTATIONS TO RANGES OF TEXT ACROSS DOCUMENTS - An annotation corresponding to a first range of text of a first document may be received. Based on the annotation, comparisons may be performed between a text string that comprises the first range of text and a group of text of a second document at different positions in the group of text. Based on the comparisons, similarity scores between the text string and the group of text may be determined at the different positions in the group of text. A position for the annotation in the group of text may be selected based on the similarity scores at the different positions. The annotation may be associated with a second range of text in the group of text that corresponds to the position. | 2021-12-30 |
20210406454 | AUTOMATED SUGGESTIONS IN CROSS-CONTEXT DIGITAL ITEM CONTAINERS AND COLLABORATION - Techniques for automated suggestions for cross-context digital item containers and collaboration are provided, including analyzing digital items in each of multiple portfolios of digital items in order to determine similarities among the portfolios. The techniques proceed by determining similar portfolios for a first portfolio of digital items, and suggesting changes (e.g., additions, deletions, or alterations of digital items) based on differences between the first portfolio and the similar ones. Those changes can be accepted or rejected and applied to the first portfolio of digital items. | 2021-12-30 |
20210406455 | EFFICIENT DATA ENTRY SYSTEM FOR ELECTRONIC FORMS - A method for efficient data entry in a field of an electronic form displayed on a mobile device screen is disclosed. The method comprises a user selecting a camera function using a camera selector and taking a picture of information. Selectable text is extracted from the picture and displayed in a data entry screen where the form is displayed. The user selects a one or more elements from the selectable text; and the selected elements are inserted into the field. | 2021-12-30 |
20210406456 | Systems and Methods for Autofill Field Classification - An example method includes determining a subset of content excluding user-specific information displayed by an application on a user interface (UI) of a user device. The method further includes transmitting a request to a remote provider an autofill request for the application. The method also includes receiving one or more suggested user values and a field classification request for a text input field displayed by the application on the UI. The method further includes detecting a user input value in the text input field and determining a similarity metric for each of the one or more suggested user values based on a comparison of the user input value to each of the one or more suggested user values. The method also includes transmitting a response to the field classification request to the remote provide comprising the similarity metric for at least one of the one or more suggested user values. | 2021-12-30 |
20210406457 | SYSTEMS AND METHODS FOR CREATING AND MANAGING TABLES - Methods and systems for creating tables are disclosed. The method includes receiving a request to create a table, the request including an indication of a number of columns and rows for the table, generating the table, the table comprising the number of columns and rows indicated in the request, an intersection of a column and a row in the table being a cell of the table, the table further comprising a summary row; rendering the table on a client device; the table comprising a column type affordance for selecting a column type for at least one column and a summary type affordance for selecting a summary type for at least one column; receiving selection of the column type affordance for a column; applying the selected column type to each cell of the column; and updating the summary type available for the column based on selected column type for the column. | 2021-12-30 |
20210406458 | METHODS AND SYSTEMS FOR PRESENTING DROP-DOWN, POP-UP OR OTHER PRESENTATION OF A MULTI-VALUE DATA SET IN A SPREADSHEET CELL - The technology disclosed relates to accessing data within or external to spreadsheet cells (NSC data) and presenting it to users, so they can select one or more value to populate the cell. In one implementation, the technology disclosed is a spreadsheet function (predefined formula) where the user inputs a cell range or NSC data formula resulting in a button operated drop-down (pop-up or other visual) populating one value within the cell. Once the formula is completed the user can change that value by clicking the button and selecting the desired value from the multiple values presented. In another implementation the function input can be altered to add a constraint (filter) limiting the values presented for selection. In variants of any of the implementations, the presented values can be organized in ascending or descending orders for easy selection and show all values or only the unique (distinct) values. | 2021-12-30 |
20210406459 | METHODS AND SYSTEMS FOR CONSTRUCTING A COMPLEX FORMULA IN A SPREADSHEET CELL - The technology disclosed includes a spreadsheet application with a formula building capability that allows users to construct a complex multi-component formula piece by piece, seeing the evaluated result of each component on the way to building the whole formula. It replaces users building complex formulas in a number of separate cells, troubleshooting each part and then having to either recombine the formula parts in one cell via a frequently error borne process or creating a master cell using a hidden set of all the piece parts making it harder to then see and understand what the formula is doing and apply copy paste. | 2021-12-30 |
20210406460 | Conference speech management method and apparatus - The present disclosure relates to a conference speech management method and apparatus, and an electronic device and a computer readable storage medium. The method comprises: acquiring conference contents, generating a conference content summary according to the conference contents, broadcasting and sending the conference content summary to participants, receiving conference summary identifier information sent by the participants, marking the participants who send the conference summary identifier information as participants-to-speak, wherein the conference summary identifier information comprises the speech mark information added by the participants-to-speak in the conference content summary and the identity information of the participants-to-speak, parsing and counting the conference summary identifier information, and generating, according to the conference summary identifier information, a speech sequence of the participants-to-speak in a conference discussion. The present disclosure can generate a speech sequence of the participants by means of identification processing of the conference summary identifier information. | 2021-12-30 |
20210406461 | ELECTRONIC DATA PLATFORM FOR A TESTING ENVIRONMENT - A method performed by a computing device includes generating a template for receiving data based on a type of a test conducted in a testing environment. The method also includes receiving data input to the computing device based on the template. The method further includes parsing the received data to identify data corresponding to a sample-based provenance and a time-based provenance. The method still further includes updating at least one of the time-based provenance and the sample-based provenance based on the identified data. The method also includes generating an inference at a machine learning model based on at least one of the time-based provenance and the sample-based provenance, and updating the template based on the inference. | 2021-12-30 |
20210406462 | METHOD FOR SEMANTIC RECOGNITION AND ELECTRONIC DEVICE - A method for semantic recognition includes: in response to performing semantic analysis on information acquired by a terminal, a sentence to be processed is acquired. Word recognition is performed on the sentence to be processed, to obtain a plurality of words and part-of-speech information thereof. A target set update operation is determined with a pre-trained word processing model, according to a word to be processed in the set of words to be processed and part-of-speech information of the word to be processed. If a dependency relationship corresponding to the target set update operation is a first dependency relationship, through each of the plurality of preset set update operations, a respective dependency relationship of the word to be processed and a respective confidence level corresponding to the dependency relationship is determined, and a respective update of the set of words to be processed is performed. | 2021-12-30 |
20210406463 | INTENT DETECTION FROM MULTILINGUAL AUDIO SIGNAL - A method and system for user's intent detection is provided. An audio signal, which is a spoken operation command from a user, is received by an NLP. The audio signal is a multilingual audio signal. The multilingual audio signal is then converted into a text component for each of a plurality of language transcripts. A plurality of tokens is generated for the text component of each of the plurality of language transcripts. The plurality of tokens is validated using a language transcript dictionary associated with a respective language transcript. One of entity, keyword, and action features is detected from the tokens. One or more intents are determined, and an intent is selected from the one or more intents based on an intent score of each intent. Based on the selected intent, an operation is automatically executed. | 2021-12-30 |
20210406464 | SKILL WORD EVALUATION METHOD AND DEVICE, ELECTRONIC DEVICE, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - The present disclosure provides a skill word evaluation method for a resume, and relates to the technical field of machine learning. The method includes determining a to-be-evaluated first skill word list including a plurality of skill words, according to a resume document to be evaluated; and predicting, for each skill word in the first skill word list, a value of probability of presence of the skill word for representing importance of the skill word, by a pre-trained skill word evaluation model according to context information of the skill word in the first skill word list. The present disclosure further provides a skill word evaluation device, an electronic device and a non-transitory computer readable storage medium. | 2021-12-30 |
20210406465 | Stylistic Text Rewriting for a Target Author - Rewriting text in the writing style of a target author is described. A stylistic rewriting system receives input text and an indication of the target author. The system trains a language model to understand the target author's writing style using a corpus of text associated with the target author. The language model may be transformer-based, and is first trained on a different corpus of text associated with a range of different authors to understand linguistic nuances of a particular language. Copies of the language model are then cascaded into an encoder-decoder framework, which is further trained using a masked language modeling objective and a noisy version of the target author corpus. After training, the encoder-decoder framework of the trained language model automatically rewrites input text in the writing style of the target author and outputs the rewritten text as stylized text. | 2021-12-30 |
20210406466 | DOCUMENT-BASED REQUIREMENTS EXTRACTION - A computer-implemented method, system, and computer program product for identifying requirements in a document. A document including requirements is received. Attribute related information in the document is identified using an attribute model. Component information in the document is identified using a component model. The attribute related information and the component information identified in the document are merged. Requirements in the document are identified from the merged attribute related information and component information. The requirements identified in the document are used to develop a product. | 2021-12-30 |
20210406467 | METHOD AND APPARATUS FOR GENERATING TRIPLE SAMPLE, ELECTRONIC DEVICE AND COMPUTER STORAGE MEDIUM - A method and apparatus for generating a triple sample, an electronic device and a storage medium are disclosed, which relates to the field of natural language processing technologies based on artificial intelligence and the field of deep learning technologies. An implementation includes acquiring a paragraph text in the triple sample; extracting at least one answer fragment from the paragraph text; and generating corresponding questions by adopting a pre-trained question generating model based on the paragraph text and each answer fragment respectively, so as to obtain the triple sample. In the present application, since trained based on a pre-trained semantic representation model, the pre-trained question generating model has quite good accuracy, and therefore, the triple sample (Q, P, A) generated with the question generating model has quite high accuracy. | 2021-12-30 |
20210406468 | METHOD AND DEVICE FOR VISUAL QUESTION ANSWERING, COMPUTER APPARATUS AND MEDIUM - The present disclosure provides a method for visual question answering, which relates to a field of computer vision and natural language processing. The method includes: acquiring an input image and an input question; constructing a Visual Graph based on the input image, wherein the Visual Graph comprises a Node Feature and an Edge Feature; updating the Node Feature by using the Node Feature and the Edge Feature to obtain an updated Visual Graph; determining a question feature based on the input question; fusing the updated Visual Graph and the question feature to obtain a fused feature; and generating a predicted answer for the input image and the input question based on the fused feature. The present disclosure further provides an apparatus for visual question answering, a computer device and a non-transitory computer-readable storage medium. | 2021-12-30 |
20210406469 | MANAGEMENT OF CONCEPTS AND INTENTS IN CONVERSATIONAL SYSTEMS - A method of providing examples to a computerized conversation agent includes associating one or more triplets of two concepts and a relationship therebetween with an intent related to a query. The triplet is embedded in a knowledge graph and the concepts in the knowledge graph are mapped to the intent. A call log is scanned for examples of the intent based on the concepts in the knowledge graph and the examples are mapped to the intent. | 2021-12-30 |
20210406470 | ACCESSING A KNOWLEDGE DATABASE - A method executed by a computing device includes determining a set of identigens for each word of a query to produce sets of identigens, where a set of identigens represents different meanings of a word of the query. The method further includes interpreting, using identigen pairing rules, the sets of identigens to produce a query entigen group that represents a most likely meaning interpretation of the query. The method further includes identifying common associated entigens of a knowledge database utilizing the query entigen group. The method further includes selecting a first common associated entigen of the common associated entigens utilizing the query entigen group and generating a response entigen group based on the first common associated entigen and the query entigen group. The method further includes generating a response to the query utilizing the response entigen group, where the response includes at least one response word. | 2021-12-30 |
20210406471 | METHODS AND SYSTEMS FOR ABRIDGING ARRAYS OF SYMBOLS - Described herein are embodiments for computer generating abridgments of texts based on matching rules applied to letter matching groups formed from sentences a first Text. The embodiments may also add prompting or alerting of comprehension and facilitate learning and memorization of the first Text by reading at least one of the separate shorter texts obtained from correlating pairs of previously discriminated contiguous sentences, by not altering the semantics, syntax and grammar of the first Text. Embodiments may prompt reading comprehension and facilitate learning and memorization of information by inducing a sensorial stimulation to the reader, based on sensorial modulation of specific typographic parameters of specific letters and by restructuring in novel ways the visual layout of the separate shorter abridged texts. | 2021-12-30 |
20210406472 | NAMED-ENTITY CLASSIFICATION APPARATUS AND NAMED-ENTITY CLASSIFICATION METHOD - A named-entity classification apparatus including an information processing apparatus, is configured to classify a plurality of named entities extracted from document information into categories by using an inference model, receive, from a user, input of correctness information indicating whether each of the named entities has been classified into a category correctly, correct weights of feature amounts that the inference model uses in the classification based on the received correctness information, and retrain the inference model based on the weights after the correction. | 2021-12-30 |