US Pat. No. 10,922,418

RUNTIME DETECTION AND MITIGATION OF VULNERABILITIES IN APPLICATION SOFTWARE CONTAINERS

Twistlock, Ltd., Herzliy...

1. A method for runtime detection of vulnerabilities in an application software container, wherein the application software container is configured to execute an application, the method comprising:detecting the application stored in an image of the application software container;
identifying, based on at least one predetermined potential location for the application, configuration data stored in the application software container for the application;
determining, based on the identified configuration data, at least one intended behavior of the application when executed in the application software container and at least one first unauthorized action, wherein each first unauthorized action defines a deviation from the at least one intended behavior, wherein the at least one first unauthorized action is indicated in a predetermined list of unauthorized actions for the application executed by the application software container;
monitoring execution of the application software container, wherein the monitoring includes comparing the execution of the application software container to the at least one intended behavior and to the at least one first unauthorized action;
detecting a second unauthorized action by the application software container when the execution of the application software container is anomalous as compared to the at least one intended behavior, wherein the execution of the application software container is anomalous when one of the at least one first unauthorized action occurs during the execution of the application software container; and
generating a detection event when the second unauthorized action by the software container is detected.

US Pat. No. 10,922,417

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM

NEC CORPORATION, Tokyo (...

1. An information processing apparatus comprising:a memory storing one or more instructions; and
a processor configured to execute the one or more instructions to:
receive an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
read out terminal-specific countermeasure information, indicating a countermeasure applicable for each of a plurality of terminals against the vulnerability, from a storage that stores the terminal-specific countermeasure information, and based on assumption that the selected countermeasure is applied to the plurality of terminals, identify remaining terminals from among the plurality of terminals which are terminals that would be left with the vulnerability due to non-applicability of the selected countermeasure based on the read-out terminal-specific countermeasure information;
count a number of terminals identified as the remaining terminals; and
display a screen including first information indicating the number of remaining terminals,
wherein the processor is further configured to determine one or more combinations of countermeasures in which the number of the remaining terminals is the smallest on the basis of the terminal specific countermeasure information, and determine a combination from among the one or more combinations of countermeasures in which the number of countermeasures included in the combination is the smallest.

US Pat. No. 10,922,416

SYSTEM, DEVICE, AND METHOD FOR TRANSIENT EVENT DETECTION

FEDERAL HOME LOAN MORTGAG...

1. A device, comprising:processing circuitry configured to:
receive, from at least one computing device, node data of plural nodes, each node including attribute values related to a proposed transaction corresponding to the respective node;
store the received node data, including the attribute values of plural proposed transactions, each of the plural proposed transactions corresponding to one of the plural nodes;
organize the stored node data into one or more node groupings, each node grouping including nodes of the node data having one or more same stored attribute values related to different proposed transactions of different nodes of the plural nodes;
determine, based on one or more transient event detection priorities, a node grouping processing scheme for detecting one or more transient event occurrences within the one or more node groupings such that two or more nodes having attribute values identifying a same applicant or a same property in a node grouping are detected as a single transient event occurrence; and
execute the node grouping processing scheme to detect the one or more transient event occurrences within the one or more node groupings.

US Pat. No. 10,922,415

METHOD AND SYSTEM FOR FAIL-SAFE BOOTING

ONITEO AB, Kista (SE)

1. A computer unit comprising:a read-only memory (ROM) arrangement comprising port check code and boot ROM code;
an internal memory;
a fixed storage media comprising a fixed storage media boot application (FSMBA);
a removable media port; and
at least one processor,
wherein the at least one processor is adapted to:
use the boot ROM code to start the computer unit;
use the port check code to determine that a removable storage media is present on the removable media port;
use the boot ROM code to load any objects present on said removable storage media into the internal memory;
use the boot ROM code to verify integrity of said objects loaded into the internal memory;
use the boot ROM code to verify that said objects loaded into the internal memory comprise a removable storage media boot application (RSMBA);
boot the computer unit using said RSMBA;
continue operation of the computer unit by loading payload objects from the fixed storage media into the internal memory; and
verify integrity of payload objects on the fixed storage media by:
loading a payload map from the fixed storage media into the internal memory;
verifying integrity of the payload map;
determining algorithm or algorithms used to generate the payload map;
applying said determined algorithm or algorithms to the payload objects and receiving a result;
comparing said result to the payload map; and
verifying the integrity of the payload objects if said result corresponds to the payload map.

US Pat. No. 10,922,414

POINT OF SALE DEVICE BUILD SECURITY

Target Brands, Inc., Min...

1. A system comprising:a store LAN (Local Area Network) comprising:
a managed network switch; and
a Point of Sale (POS) device having a POS device identifier and a communication link to the managed network switch;
a build system remote from the store LAN and comprising:
build system memory comprising build system instructions that when executed by a build system processor cause the build system processor to:
receive the POS device identifier;
add the POS device identifier to a build system data store;
provide the POS device identifier to a Network Access Control (NAC) system; and
control deployment of a build image to devices based on the build system data store; and
the NAC system comprising:
NAC system memory comprising NAC system instructions that when executed by a NAC system processor cause the NAC system processor to:
obtain the POS device identifier; and
add the POS device identifier to an access data store,
wherein the managed network switch is a computer networking device configured to control access to other devices connected to the store LAN using the access data store and is further configured to:
provide a first VLAN (Virtual LAN);
provide a second VLAN; and
permit devices connected to the first VLAN to access a build environment managed by the build system; and
disallow devices connected to the second VLAN from accessing the build environment,
wherein controlling access to the store LAN using the access data store includes:
adding the POS device to the first VLAN based on the POS device identifier of the POS device being located in the access data store.

US Pat. No. 10,922,413

METHODS AND APPARATUS TO APPLY A FIRMWARE UPDATE TO A HOST PROCESSOR

Intel Corporation, Santa...

1. An apparatus to apply a firmware update to a host processor, the apparatus comprising:a baseboard management controller interface to access a notification from a baseboard management controller that a firmware image is available in a baseboard management memory;
a host communicator to, in response to the notification, force a restart of the host processor, the restart of the host processor to trigger a boot process, the host communicator to halt the boot process;
a baseboard management memory interface to access the firmware image in the baseboard management memory;
an image validator to validate the firmware image; and
a firmware memory interface to, when the firmware image is valid, write the firmware image to a firmware memory of the host processor, the host communicator to enable the boot process using the firmware image stored in the firmware memory.

US Pat. No. 10,922,412

AUTOMATIC TAMPERING DETECTION IN NETWORKED CONTROL SYSTEMS

The Boeing Company, Chic...

1. A configuration management device in a closed-loop, Networked Control System (NCS), wherein the NCS comprises a plurality of network components and control management circuitry that manages the plurality of network components, the configuration management device comprising:a communications interface configured to communicate with the plurality of network components in the NCS and with the control management circuitry in the NCS; and
processing circuitry operatively connected to the communications interface and configured to:
detect whether a discrepancy in configuration data received from a network component in the NCS exists based on a comparison of the configuration data with reference configuration data stored in a database;
responsive to detecting the discrepancy, send a tamper detection signal to the control management circuitry indicating that the network component has been tampered with; and
responsive to detecting that no discrepancy exists in the configuration data:
monitor characteristics of data sent by the network component to the control management circuitry while the network component is in an operational mode;
detect a discrepancy in the characteristics of the data sent by the network component based on a comparison to reference characteristics stored in the database; and
responsive to detecting the discrepancy in the characteristics of the data sent by the network component, send the tamper detection signal to the control management circuitry indicating that the network component has been tampered with.

US Pat. No. 10,922,411

INTELLIGENT EVENT COLLECTION FOR CLOUD-BASED MALWARE DETECTION

MALWAREBYTES INC., Santa...

1. A method for detecting malware comprising:detecting a plurality of events, each event associated with a process performing an operation on a file having a particular predefined characteristic;
determining if each event of the plurality of events associated with the process matches an entry in an exclusions list;
responsive to determining that each event of the plurality of events associated with the process is absent from the exclusions list, logging a plurality of event data describing the plurality of events associated with the process in an event log on a client device and sending the plurality of event data to a server;
receiving, by the client device, an indication from the server of whether the process corresponds to malware based on whether the plurality of event data includes a pattern of events indicative of malware; and
responsive to the received indication indicating that the process does not correspond to malware:
maintaining, by the client device, a count of logged events corresponding to historical operations by the process performed on files having the particular predefined characteristic on the client device, and
responsive to the count exceeding a threshold, adding an entry to the exclusions list stored on the client device to exclude future operations by the process on files having the particular predefined characteristic.

US Pat. No. 10,922,410

SYSTEM AND METHOD FOR GENERATING A CONVOLUTION FUNCTION FOR TRAINING A MALWARE DETECTION MODEL

AO KASPERSKY LAB, Moscow...

1. A method for generating a hash function for training a malware detection model, comprising:selecting, by a processor, one or more commands from a behavior log according to a set of predetermined rules;
forming, by the processor, one or more behavior patterns from the one or more selected commands, wherein each behavior pattern comprises the one or more commands selected from the behavior log and one or more parameters describing the one or more selected commands;
determining, by the processor, a feature vector of the one or more behavior patterns;
generating, by the processor, a hash function of the feature vector using an auto-encoder, wherein a size of a result of the hash function is less than the size of the feature vector, and wherein a degree of similarity of the feature vector and a result of an inverse of the hash function of the result of the hash function of the feature vector is greater than a predetermined value; and
computing, by the processor, one or more parameters for training a malware detection model using the hash function on the one or more behavior patterns.

US Pat. No. 10,922,409

DEEP REINFORCEMENT LEARNING TECHNOLOGIES FOR DETECTING MALWARE

MICROSOFT TECHNOLOGY LICE...

1. A method performed on at least one computing device that includes at least one processor and memory, the method comprising:executing at least a portion of a file;
identifying, during execution of the at least the portion of the file, a sequence of monitored events, the sequence of monitored events having a sequence length that varies according to a content of the file, the sequence of monitored events comprising any type of event;
building, based on the monitored events, an event state that comprises an event histogram;
generating, based at least on the event state, at least one value from a reinforcement learning model, the at least one value representing an expected utility of halting the execution of the at least the portion of the file;
and
halting, based on the at least one value, the execution of the at least the portion of the file.

US Pat. No. 10,922,408

PORTABLE POWER CHARGER WITH WIRELESS AND DIRECT CHARGING CONNECTIVITY

HALO INTERNATIONAL SEZC L...

1. A portable charger unit for recharging at least one electronic device having a rechargeable internal battery by wireless and/or direct means, said portable charger unit comprising:a charger housing internally storing a rechargeable battery;
a connector cable storable in the charger housing for operative connection between the rechargeable battery and at least one of an electronic device and an external power source for direct connection, and capable of directly providing a direct output power supply from said rechargeable battery to the electronic device when the electronic device is connected to the portable charger unit via the connector cable, or directly receiving a direct input power supply from the external power source when the portable charger unit is connected to the external power source via the connector cable; and
a wireless transmitter operatively connected to the rechargeable battery capable of wirelessly transmitting a wireless output power supply to an electronic device; and
a wireless receiver operatively connected to the rechargeable battery for receiving a wireless input power supply transmitted from an external wireless power transmission device and directing said wireless input power supply to the rechargeable battery for recharging said rechargeable battery;
wherein the charger housing has at least one generally flat surface for receiving the electronic device to be wirelessly charged via the wireless transmitter;
wherein the charger unit is capable of simultaneously supplying the direct output power supply via the connector cable and the wireless output power supply via the wireless transmitter to respective electronic devices when both said electronic devices are connected to the charger unit; and
wherein the charger unit is capable of supplying at least one of the direct output power supply via the connector cable and the wireless output power supply via the wireless transmitter while simultaneously receiving at least one of the direct input power supply via the connector cable and the wireless input power supply via the wireless receiver.

US Pat. No. 10,922,407

DISCRIMINANT POWER BASED THREAT DETECTION

INTERNATIONAL BUSINESS MA...

1. A system, comprising a hardware processor configured to:receive a discriminant power graph comprising links between a plurality of detector names and a plurality of malware families, wherein each of the plurality of detector names in the discriminant power graph has a respective associated discriminant power;
receive a set of detector names associated with an indicator of compromise from an antivirus aggregator;
determine a set of malware families, wherein each malware family of the set of malware families is linked to at least one detector name of the set of detector names in the discriminant power graph;
for each malware family of the set of malware families, determine a sum of the associated discriminant power of any detector names that are linked to the malware family in the discriminant power graph; and
determine that the indicator of compromise belongs to a malware family of the set of malware families that has a highest determined sum.

US Pat. No. 10,922,406

PROTECTING METHOD AND SYSTEM FOR MALICIOUS CODE, AND MONITOR APPARATUS

Wistron Corporation, New...

1. A protecting method for malicious code, comprising:circulating a monitor module, which includes a plurality of antivirus systems, to at least one electronic apparatus by a monitor apparatus in a communication system, so as to monitor the at least one electronic apparatus in the communication system;
in response to the monitor module is circulated to one of the electronic apparatuses in the communication system, detecting whether there is a malicious code by the monitor module;
in response to the malicious code is detected by the monitor module, analyzing at least one aggressive behavior corresponding to the malicious code received from at least one electronic apparatus to calculate a behavior characteristic vector by the monitor apparatus;
executing a behavior prediction based on the behavior characteristic vector by the monitor apparatus to predict an evolution direction of the aggressive behavior from the behavior characteristic vector and to calculate an evolution bias vector related to the plurality of antivirus systems based on the evolution direction;
deciding, by the monitor apparatus, whether the monitor module is an admixture model or an association model based on the evolution bias vector, wherein in a condition that the monitor module is the admixture model, the evolution bias vector is a probability vector, and in a condition that the monitor module is the association model, the evolution bias vector is a weight vector;
determining a protection result by the monitor module; and
executing one or more corresponding process actions based on the protection result by the monitor module;
wherein in response to the malicious code is detected by the monitor module, the step of determining the protection result by the monitor module comprises:
in the condition that the monitor module is the admixture model, comprising:
selecting one of the antivirus systems corresponding to an element with a highest probability in the probability vector as a selected module, and determining the protection result corresponding to the malicious code by the selected module;
based on a first probability vector decided by the selected module, identifying a first representative cluster corresponding to the malicious code by the selected module; and
using the evolution bias vector calculated by the monitor apparatus and the first probability vector decided by the selected module as a set of characteristic vectors and inputting the set of characteristic vectors to a Bayesian linear regression model to obtain a set of the process actions corresponding to the first representative cluster and using the set of process actions as the protection result; and
in the condition that the monitor module is the association model, comprising:
deciding a correlation weight between each of the antivirus systems and the malicious code based on the weight vector, and determining the protection result corresponding to the malicious code by associating all of the antivirus systems included in the monitor module based on the correlation weight;
in each of the antivirus systems, based on a second probability vector decided by each of the antivirus systems, identifying a second representative cluster corresponding to the malicious code in each of the antivirus systems; and
using the evolution bias vector calculated by the monitor apparatus and each of the second probability vectors decided by each of the antivirus systems as the set of characteristic vectors and inputting the set of characteristic vectors to the Bayesian linear regression model to obtain the set of the process actions corresponding to the second representative cluster and using the set of process actions as the protection result.

US Pat. No. 10,922,405

DATA GENERATION FOR DATA PROTECTION

MICROSOFT TECHNOLOGY LICE...

1. A system comprising:a data storage system storing database tables, each of the database tables including authentic data;
a memory device storing processor-executable process steps; and
a processor to execute the processor-executable process steps to cause the system to:
generate simulated data records based on authentic data records of a database table stored in the data storage system, the authentic data records being periodically-modified;
store the simulated data records in the database table with the periodically-modified authentic data records;
periodically identify the simulated data records stored in the database table and, in response to each periodic identification of the simulated data records, modify only the identified simulated data records and not the periodically-modified authentic data records;
receive a request for data of the database table from a requesting system;
determine if the request is related to an electronic attack; and
based at least on a determination that the request is related to an electronic attack, provide the simulated data records stored in the database table to the requesting system.

US Pat. No. 10,922,404

CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM

Palantir Technologies Inc...

1. A computerized method comprising:by a system of one or more computer systems,
aggregating indications of processes executing in memory of disparate computing systems, the computing systems being configured to access sensitive information, wherein the sensitive information represents transactions associated with payment instruments;
determining that one or more processes are not authorized to access the sensitive information, wherein a first process of the determined processes is determined to be monitoring payment instruments; and
causing presentation, via an interactive user interface, of information summarizing the determined processes and information summarizing computing systems executing the determined processes, wherein the interactive user interface enables generation of one or more alerts associated with payment instruments determined to be monitored by the first process, and wherein the interactive user interface:
presents summary information associated with processes executing on the computing systems that are not authorized to access the sensitive information, wherein the summary information comprises a graphical depiction of a measure associated with the processes,
presents summary information associated with checkout systems executing processes that are not authorized to access the sensitive information, wherein the summary information comprises a graphical depiction of a measure associated with the checkout systems, and
responds to user input associated with the alerts, wherein the interactive user interface triggers determination as to a risk level associated with the first process based on a hash associated with the first process, and wherein in response to user input the interactive user interface is configured to present detailed information associated with the first process.

US Pat. No. 10,922,403

METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE APPLICATION EXECUTION ENVIRONMENT USING DERIVED USER ACCOUNTS FOR INTERNET CONTENT

Google LLC, Mountain Vie...

1. A method comprising:intercepting a request for installing an application;
determining, based upon a network resource providing the application, if the application is trusted or untrusted;
if the application is determined to be trusted, installing and executing the application within a first user account; and
if the application is determined to be untrusted:
creating a second user account;
installing and executing the application within the second user account; and
associating the application with the second user account wherein the second user account and the first user account are both associated with a same user and are dynamically invoked based on the application within a same integrated user environment of the same user to enable an integrated execution environment for both trusted and untrusted applications,
wherein the second user account is persistent, and wherein the associated application is configured to launch within the second user account on subsequent executions of the application.

US Pat. No. 10,922,402

SECURING SECRET DATA EMBEDDED IN CODE AGAINST COMPROMISED INTERRUPT AND EXCEPTION HANDLERS

VMware, Inc., Palo Alto,...

1. A method of securing secret values stored in registers in a computer system operable in a plurality of privilege levels, wherein the method executes at a first privilege level and comprises:intercepting a first interrupt or exception that is targeted to an operating system executing instructions at a second privilege level, the instructions including a move instruction that sets a register to a secret value by moving an immediate value in the move instruction into the register, a compare instruction that determines whether or not the register contains the secret value by comparing a pre-determined erasure constant with contents of the register containing the secret value, and instructions that rely on the register containing the secret value for correct processing of the instructions, wherein the second privilege level is lower than the first privilege level and the first interrupt or exception is triggered during execution of the instructions that are executing at the second privilege level;
in response to the intercepting, overwriting the secret value stored in the register with the pre-determined erasure constant; and
then forwarding the first interrupt or exception to the operating system for handling of the first interrupt or exception by the operating system, wherein the operating system interprets the pre-determined erasure constant stored in the register as a trigger to re-execute the instructions.

US Pat. No. 10,922,401

DELEGATED AUTHORIZATION WITH MULTI-FACTOR AUTHENTICATION

Pivotal Software, Inc., ...

1. A computer-implemented method comprising:maintaining, by a distributed resource system of one or more computers, a plurality of resources associated with a resource owner, wherein some of the plurality of resources are designated by the resource owner to be critical resources and some of the plurality of resources are designated by the resource owner to be noncritical resources;
receiving, by an authorization system executing on one or more computers, an access request from a client application, wherein the access request requests access by the client application to one of the plurality of resources;
performing, by the authorization system, a first authentication of the resource owner;
determining that the first authentication was successful;
in response to determining that the first authentication was successful, providing, to the resource owner by the authorization system, a selectable list of resources associated with the resource owner;
receiving, by the authorization system from the resource owner, a first delegation request to delegate, to the client application, access to one or more first selected resources among the selectable list of resources associated with the resource owner, wherein the first delegation request comprises a first selection of one or more delegated access permissions for the one or more first selected resources;
evaluating, by the authorization system, resource-specific designations made by the resource owner to determine whether any of the first selection of one or more delegated access permissions is for a resource designated as a critical resource by the resource owner;
determining that none of the first selection of one or more delegated access permissions are for a resource designated as a critical resource by the resource owner;
in response, bypassing multi-factor authentication for the resource owner;
receiving, by the authorization system from the resource owner, a second delegation request to delegate, to the client application, access to one or more second selected resources among the resources associated with the resource owner, wherein the second delegation request comprises a second selection of one or more delegated access permissions for the one or more second selected resources;
if and only if at least one of the second selection of one or more delegated access permissions is for a resource designated as a critical resource by the resource owner, performing multi-factor authentication for the resource owner before issuing a first access token to the client application, comprising:
performing, by the authorization system, a second authentication by requesting multi-factor credentials from the resource owner and authenticating the multi-factor credentials;
determining that the second authentication was successful; and
in response to determining that the second authentication was successful, granting, by the authorization system, the first access token permitting the client application to access the one or more second selected resources on the resource system as designated by the resource owner, wherein the first access token includes access scopes covering some or all of the critical resources on the resource system.

US Pat. No. 10,922,400

USER IDENTIFICATION BASED ON THE MOTION OF A DEVICE

Roku, Inc., Los Gatos, C...

1. A computer implemented method, comprising:detecting a motion of a remote control for controlling a media device;
comparing the detected motion with one or more stored motions, wherein each stored motion is associated with a user ID;
determining a variance between a stored set of movements corresponding to the user ID and the detected motion;
determining that a subsequent authentication in a form of an alpha-numeric passcode is required in addition to the detected motion to provide the user access to the media device;
requesting the subsequent authentication that the determined user ID correctly identifies user operating the remote control;
receiving, from the remote control and responsive to the requesting, the alpha-numeric passcode corresponding to the user ID as the subsequent authentication;
confirming that the alphanumeric passcode corresponds to the user ID;
updating the variance corresponding to the user ID after the receiving the alphanumeric passcode and the confirming; and
providing access to the media device to the user ID based on both the detected motion and the subsequent authentication,
wherein the detecting, comparing, determining, and providing are performed by one or more computer processors.

US Pat. No. 10,922,399

AUTHENTICATION VERIFICATION USING SOFT BIOMETRIC TRAITS

Advanced New Technologies...

1. A method for verifying an authenticated state of a device, the method comprising:capturing, during a primary authentication process in which primary user identifying information is obtained for a subject using a device, first auxiliary user identifying information for a secondary authentication verification of the subject, wherein the first auxiliary user identifying information includes first clothing characteristics of clothing worn on an upper torso;
determining, after the primary authentication process, to perform a secondary authentication verification process to verify identify of the subject; and
performing the secondary authentication verification process, including:
capturing second auxiliary user identifying information for the subject, wherein the second auxiliary user identifying information includes second clothing characteristics of clothing worn on an upper torso;
comparing the first auxiliary user identifying information to the second auxiliary user identifying information, comprising comparing the first clothing characteristics to the second clothing characteristics; and
determining whether the authenticated state of the device is valid based on comparing the first auxiliary user identifying information to the second auxiliary user identifying information.

US Pat. No. 10,922,398

OPTICAL FINGERPRINT SENSOR WITH NON-TOUCH IMAGING CAPABILITY

SHENZHEN GOODIX TECHNOLOG...

1. An apparatus for implementing optical fingerprint sensing in an electronic device having a display panel and a top transparent layer over the display panel, the apparatus comprising:an optical sensor module for being placed underneath an extended section of the top transparent layer and located adjacent to one end of the display panel, the extended section of the top transparent layer extending beyond the one end of the display panel; the optical sensor module including one or more probe light sources to produce probe light to illuminate an object above or in contact with the top transparent layer for optical sensing, and an optical sensor array including optical detectors to detect reflected light from the object above or in contact with the top transparent layer to detect both a first signal to provide a first indication of whether the object is a finger of an authorized user and a second different signal to provide a separate second indication of whether the object is a finger of an authorized user; and
an optical sensor controller coupled to the optical sensor module to control operations of the one or more probe light sources and the optical sensor array to trigger capturing of different images of the object including an image of the object when the object is above the top transparent layer without contacting the top transparent layer as part of the first signal and another image of the object when the object is in contact with the top transparent layer as part of the second signal.

US Pat. No. 10,922,397

METHOD AND DEVICE FOR COMPARING PERSONAL BIOLOGICAL DATA OF TWO USERS

DNANUDGE LIMITED, London...

1. A computer-implemented method of comparing one or more genetic traits of two users, each user having a wearable device storing data indicative of the one or more genetic traits, the data having been obtained by an analysis of a biological sample provided by the user, the method comprising:transmitting the data indicative of the one or more genetic traits from a first of the wearable devices to a first computer device using a short-range wireless data connection;
transmitting the data from the first computer device to a second computer device over a data network;
transmitting the data from the second computer device to a second of the wearable devices over a short-range wireless data connection; and
comparing the data from the first wearable device with the data stored on the second wearable device to determine whether there is a match between the users' one or more genetic traits.

US Pat. No. 10,922,396

SIGNALS-BASED AUTHENTICATION

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, from an authentication device, an indication of a user device within a predefined area surrounding the authentication device;
determine, based on the received indication, whether the user device was within the predefined area for at least a threshold amount of time;
responsive to determining that the user device was not within the predefined area for at least the threshold amount of time, generate and transmit an instruction to continue a scan of the predefined area;
responsive to determining that the user device was within the predefined area for at least the threshold amount of time, generate and transmit a request for user data, the request for user data including at least a request for biometric signature data;
responsive to the request for user data, receive user response data;
evaluate the user response data to determine whether a confidence level of the user response data is at least a threshold level;
responsive to determining that the confidence level of the user response data is not at least the threshold level, generate and transmit a request for additional user authentication information; and
responsive to determining that the confidence level of the user response data is at least the threshold level, automatically authenticate a user associated with the user device to the authentication device.

US Pat. No. 10,922,395

FACIAL AUTHENTICATION SYSTEMS AND METHODS UTILIZING TIME OF FLIGHT SENSING

STMICROELECTRONICS, INC.,...

1. A device, comprising:an ambient light sensor that detects, in operation, a change in ambient light in a field of view, the change of the ambient light in the field of view exceeding a minimum threshold indicative of a presence of a user;
a ranging sensor including a time of flight sensor that generates, in operation, a plurality of distance measurements from the time of flight sensor to a plurality of elements on a face of the user, the time of flight sensor configured to have a first mode and a second mode of operation, wherein both the first mode and the second mode, in use, detect a skin reflectance value of the user, the first mode of the time of flight sensor, in operation, detects motion of the user based on a change of distance from the user and the time of flight sensor within a face recognizable distance, the face recognizable distance being a distance between a first presence detection threshold and a second presence detection threshold, the second mode of the time of flight sensor, in operation, generates a depth map of the user's face based on the plurality of distance measurements within the face recognizable distance, the depth map of the user including a depth map of the face of the user; and
a processor coupled to the time of flight sensor and that in operation, receives inputs from the time of flight sensor and outputs a user presence signal in response to the plurality of inputs and activates a facial recognition process in response to the user presence signal and determines whether the depth map of the face of the user is associated with an authorized user of the device.

US Pat. No. 10,922,394

ELECTRONIC DEVICE INCLUDING FINGERPRINT SENSOR AND METHOD FOR OPERATING THE SAME

Samsung Electronics Co., ...

1. An electronic device, comprising:a display;
a fingerprint sensor disposed corresponding to a first area of the display;
a touchscreen panel disposed corresponding to the display; and
at least one processor configured to:
receive, from the touchscreen panel, information about a position of a first touch input for setting up first security information for unlocking the electronic device,
identify the first security information based at least in part on the information about the position of the first touch input, and
control the display to display a user interface for unlocking the electronic device,
wherein the user interface for unlocking the electronic device comprises visual items for unlocking the electronic device,
wherein a plurality of visual items among the visual items correspond to the first security information, the plurality of visual items including at least one first visual item and at least one second visual item, the first security information including a first part and a second part, and
wherein the plurality of visual items are arranged such that the at least one first visual item corresponding to the first part is displayed on the first area of the display corresponding to a position of the fingerprint sensor, and the at least one second visual item corresponding to the second part is displayed on a second area of the display other than the first area.

US Pat. No. 10,922,393

DEEP NEURAL NETWORK FOR IRIS IDENTIFICATION

Magic Leap, Inc., Planta...

1. A system comprising:an authentication training system configured to execute one or more deep neural networks to determine an embedding configured to determine embedding space representations of eye images using a deep neural network with a triplet network architecture, wherein the authentication training system is configured to:
access an anchor eye image of a user, a positive eye image of the user, and a negative eye image of another user, wherein the user is an authorized user;
map, using the one or more deep neural networks, the anchor eye image to a first image embedding space to generate an anchor embedding space representation;
map, using the one or more deep neural networks, the positive eye image to the first image embedding space to generate a positive embedding space representation;
map, using the one or more deep neural networks, the negative eye image to the first image embedding space to generate a negative embedding space representation;
update the one or more deep neural networks to:
reduce a distance in the first image embedding space between the positive embedding space representation and the anchor embedding space representation; or
increase a distance in the first image embedding space between the negative embedding space representation and one or more of the positive and anchor embedding space representations;
generate the embedding based on the updated one or more deep neural networks; and
generate at least one classifier usable to determine a likelihood that embedding space representations of images are associated with the user; anda wearable display system comprising:a display;
an image capture device configured to capture eye images of a wearer, wherein the wearable display system is configured to:
receive a first eye image from the image capture device;
receive, from the authentication training system, the embedding and the at least one classifier;
process the first eye image to generate a representation of the first eye image in polar coordinates;
process the representation of the first eye image using the embedding to generate a first embedding space representation of the first eye image, wherein the first embedding space representation is an n-dimensional vector, and
wherein a majority of elements of the first embedding space representation are statistically independent;
process the first embedding space representation using the at least one classifier to calculate a likelihood score that the first eye image is associated with an authorized user;
grant or deny the wearer access to the wearable display system based on the likelihood score;
transmit the first eye image to the authentication training system; and
receive an updated embedding determined by the authentication training system using the first eye image.

US Pat. No. 10,922,392

SYSTEMS AND METHODS FOR GENERATING AND MANAGING COMPOSITE DIGITAL IDENTITIES

TATA CONSULTANCY SERVICES...

1. A processor-implemented method, comprising:receiving a request comprising an identifier associated with an entity from an identity seeker, wherein said request comprises a context associated with a transaction being initiated by said entity;
identifying, from one or more encrypted tokens stored in a database, an encrypted token corresponding to said identifier;
decrypting said encrypted token to obtain a context matrix; performing an analysis on said context matrix with respect to said request comprising said context associated with said transaction being initiated by said entity;
determining an activity status associated with said transaction based on said analysis being performed;
based on said determined activity status; performing:
a) Obtaining a verification message from said entity, wherein said verification message pertains to said transaction being performed by said entity, and generating a composite provisional digital identity of said entity, specific to said transaction based on said verification message, and wherein the composite provisional digital identity of the entity is sent to the identity seeker for authorizing the transaction:
b) Creating a persona representing a behavioral characteristic based on the composite provisional digital identity of said entity, wherein said persona is dynamic and is generated on a continual basis, and wherein the composite provisional digital identity confirms the identity of the entity to the identity seeker and does not expose the
persona of the entity to the identity seeker: and
c) Generating real time analytics and heuristics to provide a context and an offer specific to said transaction.

US Pat. No. 10,922,391

USER INTERFACE COMPETENCE BASED AUTHENTICATION

WELLS FARGO BANK, N.A., ...

1. A method, comprising:providing a user interface on a user device, wherein the user interface provides an interactive experience for a user;
monitoring at least one user interaction by the user on the user device, the at least one user interaction is one of controlling, navigating, or inputting to the user interface on the user device;
determining a user proficiency based on the at least one user interaction;
monitoring subsequent user interactions with the user interface on the user device;
updating the user proficiency according to the subsequent user interactions with the user device to determine an updated user proficiency;
determining a change in user proficiency based on the updated user proficiency, wherein the change in user proficiency is an increase of user proficiency according to at least one of speed of movement, speed of selections, access to critical files, typing speed, data entry, or time between selections; and
comparing the change in user proficiency to a threshold change.

US Pat. No. 10,922,390

TRAINING A CLASSIFIER TO IDENTIFY UNKNOWN USERS OF AN ONLINE SYSTEM

Facebook, Inc., Menlo Pa...

1. A method comprising:receiving a set of events each representing an interaction of a device with content and the set of events including events associated with known users and events associated with unknown users, wherein a known user represents an event associated with a user of a plurality of users of an online system and an unknown user represents an event that is not associated with any user of the online system;
identifying a hindsight event, the hindsight event being an access event that is not associated with any user of the online system at a first time when the access event occurred but is associated with a known user of the online system at a second time that is after the first time;
scoring, by a scoring model, a subset of events including at least the identified hindsight event, the subset of events associated with known users by applying a classifier that generates classification scores, each classification score reflecting a likelihood of an event being associated with a known user or an unknown user;
scaling, by a scaling model, the scores associated with the subset of events to create training weights for the subset of events, the scaling model trained to scale the scores based on a ratio of unsampled events having unknown users and known users; and
training a classifier to predict the identity of unknown users using the subset of events associated with known users as training data, wherein the subset of events are weighed in the training data according to the training weights associated with the events.

US Pat. No. 10,922,389

IDENTIFYING COPYRIGHTED MATERIAL USING COPYRIGHT INFORMATION EMBEDDED IN ELECTRONIC FILES

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in one or more pages for presenting digital content, the method comprising:generating, by a computing device, a unique identifier (ID) based on copyright information associated with the digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and wherein the copyright information associated with the digital content includes one or more of at least a portion of the digital content or identity information of a copyright holder of the digital content,
and wherein the digital content is recorded on the blockchain as a first transaction associated with a first blockchain transaction ID and the identity information is associated with a second transaction associated with a second blockchain transaction ID, and wherein the first blockchain transaction ID or the second blockchain transaction ID is associated with one or more transaction records associated with the digital content;
identifying, by the computing device, one or more visual attributes associated with a page design of one or more blank pages of an electronic file;
embedding, by the computing device, the unique ID in the one or more blank pages by changing the one or more visual attributes to be representative of the unique ID, wherein the embedding produces one or more unique ID-embedded pages that each enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a difference between the one or more blank pages and the one or more unique ID-embedded pages is not apparent to an unaided human eye;
allocating, by the computing device, the digital content to at least one of the one or more unique ID-embedded pages, to produce one or more unique ID-embedded pages allocated with the digital content; and
distributing, by the computing device, the one or more unique ID-embedded pages allocated with the digital content to the blockchain network.

US Pat. No. 10,922,388

SESSION CONTROL FOR CLIENT-SIDE APPLICATIONS IN PROXY SOLUTIONS

Microsoft Technology Lice...

1. A computer-implemented method for session control in a proxy service for client-side applications in a client, the method comprising:receiving a service request from a client;
sending the service request to a service provider;
receiving a service response from the service provider that includes a document responsive to the service request;
injecting into the document event monitoring code for monitoring user actions on the client;
sending the service response with the document and event monitoring code to the client;
intercepting by the event monitoring code a user request for action for the document on the client;
sending a query message to the proxy service with data identifying the user request for action and a client-side application used by the user;
receiving by the proxy service the query message with the data identifying the user request for action and the client-side application used by the user;
searching for access data pertaining to the document;
if access data pertaining to the document is found that indicates that the user request for action and the client-side application used by the user is permitted, then sending a query response to the event monitoring code with information indicating that the user request for action is permitted;
if no access data pertaining to the document is found that indicates that the user request for action and the client-side application used by the user is permitted, sending the query response to the event monitoring code with information indicating that the user request for action is not permitted;
receiving in the event monitoring code the query response from the proxy service;
if the query response indicates that the user request for action is permitted, allowing normal execute flow for the user request for action; and
if the query response indicates that the user request for action is not permitted, blocking execution flow for the user request for action.

US Pat. No. 10,922,387

METHOD AND CONTROL SYSTEM FOR CONTROLLING AN EXECUTION OF A SOFTWARE APPLICATION ON AN EXECUTION PLATFORM

SFNT GERMANY GMBH, Munic...

1. Method for controlling an execution of a software application on an execution platform, the execution platform including at least one hardware processor, the method comprising:a) determining, by the at least one hardware processor, a point in time of at least one software update including at least one of the following software updates: installation of an operation system on the execution platform, installation of at least one computer program running on the execution platform, updating of the operation system, and updating of the at least one computer program,
b) generating, by the at least one hardware processor, at least one platform information item based on the at least one software update and the determined point in time according to the step a),
c) generating, by the at least one hardware processor, a first fingerprint based on the at least one generated platform information item of the step b), said first fingerprint being characteristic for the execution platform at the time of carrying out the step a), said first fingerprint being related to the at least one software update,
d) generating a license including said first fingerprint, said license defining terms of an allowed execution of the software application on said execution platform, and
e) controlling, by the at least one hardware processor, the execution of the software application by:
determining at least one of the at least one generated platform information item as used for generating the first fingerprint at the time of executing the software application and generating a second fingerprint based on the at least one determined platform information item,
comparing the second fingerprint with the first fingerprint of the license, and
allowing the execution of the software application according to the terms of the license only when the second fingerprint complies with the first fingerprint.

US Pat. No. 10,922,386

SYSTEM AND METHODS FOR SECURITY INSPECTION AND PROTECTION OF SOFTWARE CONTAINERS AT RUNTIME

Trend Micro Incorporated,...

18. A host machine comprising:a processor for executing computer-readable instructions;
memory for storing and accessing the computer-readable instructions and data;
a first container comprising a first standalone executable software package;
a second container comprising a second standalone executable software package;
a master agent in a namespace of the host machine;
a security agent in a namespace of the first container, wherein the security agent holds a user-mode object-monitoring handle for the first container which allows the master agent to continue to monitor events in the first container, wherein the security agent is configured to migrate into the second container by changing namespace from the namespace of the first container to the namespace of the second container, and wherein the security agent is further configured to run in the second container and perform a second security inspection of resources and objects in the second container, wherein the security agent holds a user-mode object-monitoring handle for the second container which allows the master agent to continue to monitor events in the second container.

US Pat. No. 10,922,385

GENERATING LICENSE FILES IN AN INFORMATION HANDLING SYSTEM

Dell Products, L.P., Rou...

1. A method for generating a license file, the method comprising:receiving, via a processor of a first information handling system (IHS), a plurality of input parameters associated with a product;
generating license data at least partially based on the input parameters;
transmitting the license data to a hardware security module (HSM);
triggering the HSM to retrieve a certificate containing allowable use data, the allowable use data including a subject organizational unit and a subject title, the subject organizational unit being one of an OEM IHS and a sub-contractor IHS, and the allowable use data at least partially identifying a permitted installation of a license for the product and utilized to determine if the license can be installed on a target IHS;
triggering the HSM to embed a signer identifier within the certificate, the signer identifier being a name of the first IHS;
triggering the HSM to sign the certificate using using a private key, the private key being generated along with a corresponding public key that is embedded in the certificate;
receiving the signed certificate from the HSM;
generating a license file including the license data and the signed certificate, wherein the signed certificate comprises the allowable use data and the public key; and
transmitting the license file to a second IHS wherein:
the second IHS uses the allowable use data and the signer identifier to determine if installation of the license is permitted on the second IHS;
the public key allows contents of the license file to be verified as generated from a sender with access to the private key, and is therefore a trusted entity; and
in response to determining that installation of the license is permitted on the second IHS, the second IHS initiating installation of the license on the second IHS.

US Pat. No. 10,922,384

CONTENTS BLOCKCHAIN PLATFORM

Whoborn, Inc., Seoul (KR...

1. A content right management method, comprising:receiving contents from a user;
generating a create key for a right for the contents by encrypting the contents using encryption information, wherein the create key includes a copyright of the contents and a creation right of the contents, and wherein the creation right of the contents includes a right to create encrypted contents and a right to create a coin, wherein the coin is a right to access the contents;
in response to the create key being generated, creating the encrypted contents and the coin using bioinformation of the user, and
setting a number of pieces of encrypted contents and a number of coins to be created based on the bioinformation of the user,
wherein the number of coins to be created is set based on a usage right option for a period of use of the contents.

US Pat. No. 10,922,383

ATHLETIC ACTIVITY MONITORING METHODS AND SYSTEMS

adidas AG, Herzogenaurac...

1. An athletic activity monitoring method for use with a sensor module that is physically coupled to an object during an athletic activity conducted by a user, the athletic activity monitoring method comprising:the sensor module detecting movement of the object at a first time;
the sensor module determining that the movement of the object corresponds to a predetermined activation movement, wherein the determination that the movement of the object corresponds to the predetermined activation movement occurs when a raw data value satisfies a threshold data value at the first time;
the sensor module entering an active state in response to the determination that the movement of the object corresponds to the predetermined activation movement; and
upon the sensor module entering the active state, detecting movement of the object at a second time,
wherein the detecting movement of the object at one of the first time and the second time comprises determining a change in the location of the object with respect to a magnetic vector of the object, and
wherein the sensor module in the active state determines a correlation between the movement of the object and an activity metric at the second time by reference to a data structure having magnetic field data.

US Pat. No. 10,922,382

PRECISION DISPENSER FOR LIQUIDS, COMPRISING A DEVICE FOR REMOTE CONTROL AND MONITORING

1. A liquid methadone dispenser device comprising:a liquid methadone precision dispenser comprising a hydraulic and electronic control system configured to be operated by a remote computing device external to the liquid methadone precision dispenser to dispense pre-determined doses of liquid methadone, at an accuracy within 0.5% by volume of the pre-determined doses, to a plurality of patients based on a therapeutic protocol established by a healthcare provider for each of the plurality of patients;
a patient identification device integrated with the liquid methadone dispenser; and
a computing device external to and remotely coupled to the liquid methadone dispenser, the computing device being connected via one or more communication networks to a remote web-based server storing an identification profile comprising the therapeutic profile for each of the plurality of patients, the computing device comprising a processor and a memory coupled to the processor which is configured to execute one or more programmed instructions comprising and stored in the memory to:
receive a patient request from one of the plurality of patients for authorization to dispense the predetermined dose of the liquid methadone at the patient identification device, wherein each of the plurality of patients are authorized to receive the liquid methadone from a plurality of liquid methadone dispensers in a plurality of geographical locations;
transfer the patient request via the one or more communication networks to the remote web-based server;
provide instructions to control the hydraulic and electronic control system of the liquid methadone dispenser to dispense the pre-determined dose of the liquid methadone upon a receipt of an authorization from the web-based server based on the patient request; and
provide instructions to the liquid methadone dispenser not to dispense the pre-determined dose of the liquid methadone upon receipt of a non-authorization from the web-based server, wherein the non-authorization is based on an attempt by the one of the plurality of patients to obtain more than the pre-determined dose of the liquid methadone from another of the plurality of liquid methadone dispensers within a period of time.

US Pat. No. 10,922,381

RE-EQUILIBRATED QUANTUM SAMPLING

D-WAVE SYSTEMS INC., Bur...

1. A method of operation of a hybrid computing system to generate approximate equilibrium statistics, the hybrid computing system comprising an analog processor and a digital processor, the method comprising:initializing the analog processor in a first state at a time t0;
evolving the analog processor from a value of one for an annealing parameter at time t0 until the annealing parameter is equal to an intermediate value between a value of zero and a value of one at a time t1, wherein a time interval ?t0,1 between t0 and t1 is greater than a time interval required for a non-adiabatic transition to an energy state higher than a ground state of the analog processor;
holding the annealing parameter of the analog processor at the intermediate value from the time t1 to a time t2;
evolving the analog processor from the intermediate value at the time t2 until the annealing parameter is equal to one at a time t3, wherein a time interval ?t2,3 between the time t2 and the time t3 is greater than a time interval required for a non-adiabatic transition to an energy state higher than a ground state of the analog processor, wherein at the time t3 the analog processor is in a second state; and
reading out the second state of the analog processor.

US Pat. No. 10,922,380

DISTRIBUTED MATRIX MULTIPLICATION FOR NEURAL NETWORKS

Intel Corporation, Santa...

1. A matrix processor, comprising:a memory to store a plurality of input matrices;
a plurality of matrix processing units (MPUs) to perform matrix multiplication arithmetic;
controller circuitry to:
receive an instruction to be executed by the matrix processor, wherein the instruction instructs the matrix processor to perform a matrix multiplication operation on the plurality of input matrices;
partition the plurality of input matrices into a plurality of input partitions based on a number of available MPUs;
distribute the plurality of input partitions among the plurality of MPUs, wherein each input partition is distributed to a particular MPU of the plurality of MPUs;
perform a plurality of partial matrix multiplication calculations using the plurality of MPUs;
transmit partial matrix data between the plurality of MPUs while performing the plurality of partial matrix multiplication calculations, wherein each MPU is to transmit a portion of the partial matrix data to one or more of the plurality of MPUs simultaneously while each of the plurality of partial matrix multiplication calculations is being performed; and
determine a result of the matrix multiplication operation based on the plurality of partial matrix multiplication calculations.

US Pat. No. 10,922,379

METHOD FOR PROCESSING ELECTRONIC DATA

City University of Hong K...

1. A method for processing digital image data, comprising the steps of:transforming the digital image data to a matrix representation including a plurality of matrices;
decomposing the matrix representation into a series of matrix approximations;
processing, with an approximation process, the plurality of matrices thereby obtaining a low-rank approximation of the plurality of matrices; and
constructing at least one digital image based on the low-rank approximation of the plurality of matrices, wherein the approximation process includes:
a greedy pursuit approximation process, and
a linear regression process, and further includes:
determining a best rank-one approximation of a plurality of residual matrices in each of a plurality of iteration steps in the approximation process; and
subtracting a plurality of rank-one basis matrices from the plurality of residual matrices.

US Pat. No. 10,922,378

SIMULATION METHOD, SIMULATION UNIT, AND PROGRAM

SUMITOMO HEAVY INDUSTRIES...

1. A simulation method for simulating a change in a current flowing through a current path when a voltage applied to the current path is changed in a system including the current path and a member that is acted upon by the current flowing through the current path and affects the current flowing through the current path, the method comprising:representing the current path and the member by aggregates of a plurality of particles; and
updating a value of the current flowing through the current path from a value at a present time to a value obtained by a calculation by calculating electromagnetic action from the other particles to each of the plurality of particles configuring the current path based on the current value at the present time of the current flowing through the current path and a voltage value of an external voltage applied to the current path and by calculating the current flowing through the current path based on a calculation result of the electromagnetic action.

US Pat. No. 10,922,377

INTERNET-BASED PROXY SERVICE TO LIMIT INTERNET VISITOR CONNECTION SPEED

CLOUDFLARE, INC., San Fr...

1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat; and
responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open.

US Pat. No. 10,922,376

PERFUME PACKAGE ACCESSORY DESIGN SYSTEM AND METHOD OF OPERATING PERFUME PACKAGE ACCESSORY DESIGN SYSTEM

1. A method of operating a perfume package accessory design system, the method comprising:a first step of logging-in to a design server through an application installed on a producer's portable terminal;
a second step of providing a 3D model design and an image photograph of a perfume package accessory having a function of storing perfume in a database of the design server, to remodel the perfume package accessory with the image in the model design;
a third step of allowing a producer to download the remodeled perfume package accessory modeling data and apply his/her appearance and the perfume package accessory to augmented reality with a camera of the portable terminal;
a fourth step of returning augmented reality video data and data determining whether modeling of the perfume package accessory is suitable to the design server;
a fifth step of feeding back to the second step when the modeling of the perfume package accessory is determined not to be suitable;
a sixth step of determining whether or not to infringe a copyright when the modeling of the perfume package accessory is determined to be suitable and feeding back to the second step when the copyright is determined to be infringed;
a seventh step of assigning a production number to the perfume package accessory modeling data when the copyright is determined not to be infringed;
an eighth step of registering the perfume package accessory modeling data to which the production number is assigned together with perfume package accessory image data and the augmented reality video data on a public registration window;
a ninth step of allowing a purchaser to view the public registration window when the purchaser logs in the design server through an application installed on a smartphone; and
a tenth step of allowing the purchaser to download the perfume package accessory modeling data when the purchaser makes a purchase or sets a license for the perfume package accessory through the public registration window.

US Pat. No. 10,922,375

FILE PORTABILITY ACROSS SAAS APPLICATIONS

CITRIX SYSTEMS, INC., Fo...

1. A client computing device comprising:an embedded browser including a first browser for a user to identify a file to be copied from a source application at a source web server, and a second browser for the user to identify a location of where the file is to be copied within a target application at a target web server;
a plurality of copy file user interface (UI) controls, wherein functionality of each copy file UI control is specific to a source application type and specific to a target application type that is different from the source application type; and
a processor configured to cooperate with said embedded browser in response to the user selecting an appropriate copy file UI control having the correct functionality to retrieve the identified file in the source application, and copy to the identified location within the target application without requiring further user input.

US Pat. No. 10,922,374

TECHNIQUES TO DETERMINE RELATIONSHIPS OF ITEMS IN WEB-BASED CONTENT

Capital One Services, LLC...

1. A computer-implemented method, comprising:determining, by a system, co-occurrences of a pair of items of a plurality of items, wherein each of the co-occurrences of the pair items is summed into a number of co-occurrences of the pair of items of the plurality of items in a search session comprising a plurality of search queries and in web-based content detected by a data mining operation, wherein the data mining operation is a web crawling operation;
generating, by the system, a co-occurrence matrix comprising rows and columns, wherein each entry of the entries of the co-occurrence matrix indicates the number of co-occurrences between the pair of items of the plurality of items;
receiving, by the system, an indication of a web-based search performed for an item of the plurality of items;
determining, by the system, related pairs of the plurality of items based on the entries of the co-occurrence matrix and a relationship threshold value, wherein each related pair includes the item searched in the web-based search and another item of the plurality of items; and
providing, by the system, an indication of each other item of the plurality of items that is related to the item searched based on the related pairs.

US Pat. No. 10,922,373

DYNAMIC LANGUAGE TRANSLATION OF WEB SITE CONTENT

MOTIONPOINT CORPORATION, ...

1. A method implemented on a computer having at least one processor, storage, and communication platform for managing localization of content with respect to a web page, the method comprising the steps of:identifying a location of a web page where content to be displayed therein can be localized;
obtaining one or more versions of localized content, each of which is localized with respect to the content to be displayed at the location;
associating each version of localized content with one or more conditions that need to be satisfied for the localized content to be displayed at the location, the one or more conditions being specified with respect to a language in which online activity of a user accessing the web page is conducted; and
storing the one or more versions of the localized content with the associated one or more conditions with respect the location of the web page so that the localized content can be obtained in the future when the one or more conditions are met.

US Pat. No. 10,922,372

METHODS AND SYSTEMS FOR GENERATING CUSTOM CONTENT USING UNIVERSAL DEEP LINKING ACROSS WEB AND MOBILE APPLICATIONS

Capital One Services, LLC...

1. A system for generating customized content on a website or mobile application through a hyperlink, the method comprising:memory configured to store:
a user profile; and
a feature registry, wherein the feature registry is a centralized catalog for feature providers to register native applications and add and configure features for toggling and throttling in the native applications; and
control circuitry configured to:
receive a feature registry request from a feature registry application on a local device, wherein the feature registry request is generated by the local device in response to a user selection of an anchor link for hyperlink content associated with the feature registry application, and wherein the user selection of the anchor link causes a web browser to load the feature registry application;
in response to receiving the feature registry request:
retrieve an identity of a user associated with the user selection;
retrieve information in the user profile associated with the user; and
retrieve a description of the hyperlink content from the feature registry application on the local device, wherein the description of the hyperlink content comprises a feature reference assigned by the feature registry application provider, for the feature registry;
filter, using a machine learning model, available features on a feature registry based on the identity of the user, the information from the user profile, and the description of the hyperlink content;
select a customized feature for the user from the filtered available features; and
populate a feature template of a native application on a local device with the customized feature.

US Pat. No. 10,922,371

QUERY SELECTION METHOD AND SYSTEM

HITHINK ROYALFLUSH INFORM...

1. A query selection method specifically for querying data from one or more databases, implemented on a hardware which has at least one processor and a storage device, comprising:obtaining, by the at least one processor, a natural sentence;
generating, by the at least one processor, a standard node sequence based on the natural sentence, the standard node sequence including multiple index nodes and at least one condition node, wherein the multiple index nodes correspond to indexes of the one or more database, the at least one condition node including at least one of a number node, a date node, or a character string node;
constructing, by the at least one processor, a node tree according to the standard node sequence, wherein the node tree is structured to include the multiple index nodes, the at least one condition node, a first relationship between a first index node of the multiple index nodes and a second index node of the multiple index nodes, and a second relationship between at least one index node of the multiple index nodes and the at least one condition node;
generating, by the at least one processor, a data query command according to the node tree;
querying, by the at least one processor, data using the data query command from the one or more databases to obtain a query result; and
filtering the query result based on the node tree to obtain a filtered result.

US Pat. No. 10,922,370

PERSONALIZED RECOMMENDATIONS USING LOCALIZED REGULARIZATION

Adobe Inc., San Jose, CA...

1. A method implemented by one or more computing devices, the method comprising:obtaining, by the one or more computing devices, known values for each item in a first subset of a set of items, the known values corresponding to a user of multiple users of the system;
identifying, by the one or more computing devices, a second subset of the set of items, each item in the second subset having an unknown value for the user;
generating, by the one or more computing devices, a model based on localized regularization by:
adding the known values of the user in the first subset into the model;
generating, for each unknown value in the second subset, an expected value based on regularization of the known values of other users in the model; and
generating an estimated value for at least one said unknown value, localized for the user, based on a respective said expected value and at least one of the added known values; and
generating, by the one or more computing devices, a personalized recommendation for the user based on the estimated value.

US Pat. No. 10,922,369

SYSTEM AND METHOD FOR AN ELECTRONIC PRODUCT ADVISOR

CBS Interactive Inc., Ne...

1. A computer-implemented method executed by a computer processor, the method comprising:receiving user data from a plurality of client devices over a network;
receiving, from the plurality of client devices, product data associated with a respective user of the client devices, the product data comprising product reviews, a first list of products owned by the respective user, and a second list of products comprising products not on the first list of products;
normalizing the first list of a first user based on a standardized product list;
computing a respective similarity percentage between the normalized first list of the first user and a normalized first list of a second user; and
generating, by the processor, a ranked list of recommended products that are not on the normalized first list of the first user based on the similarity percentages and a number of instances of products on the first list of the second user that is recommended by the second user.

US Pat. No. 10,922,368

SYSTEM AND METHOD TO DISPATCH INTELLIGENT INVITATIONS TO USERS WITHIN A NETWORK

1. A non-transitory machine-readable storage medium containing instructions that, when executed, cause a scheduler to:send a request to a plurality of subscribers who fit a first profile to play a physical sport at a first venue during a first time period;
wherein the first profile comprises at least one criteria which is partially set by a sender of the request and, in part, configured by default settings;
wherein the at least one criteria further comprises settings associated with a user profile associated with the sender of the request.

US Pat. No. 10,922,367

METHOD AND SYSTEM FOR PROVIDING REAL TIME SEARCH PREVIEW PERSONALIZATION IN DATA MANAGEMENT SYSTEMS

Intuit Inc., Mountain Vi...

1. A computing system implemented method for providing personalized search results to users of a data management system, the method comprising:providing data management interview content data to a user of the data management system as part of a data management interview;
receiving query data from the user corresponding to a request for assistance related to the data management system;
generating initial search results data indicating an assistance document likely to be relevant to the request based on the query data;
training a predictive model, with a machine learning process, to identify characteristics of a preview document that are likely to be relevant to users of the data management system based on attributes of the user;
generating, for the assistance document, personalized assistance document preview data including a preview of the assistance document personalized for the user based on the identified characteristics of the preview document that are likely to be relevant to users of the data management system;
generating personalized search results data identifying the assistance document and including the personalized assistance document preview data; and
outputting the personalized search results data to the user.

US Pat. No. 10,922,366

SELF-ADAPTIVE WEB CRAWLING AND TEXT EXTRACTION

International Business Ma...

1. A method for crawling and extracting main content from a web page, the method comprising:retrieving a HTML document associated with a web page;
identifying at least one entry point located in the retrieved HTML document by utilizing a self-adaptive entry point locator, wherein identifying at least one entry point located in the retrieved HTML document by utilizing a self-adaptive entry point locator comprises identifying at least one domain entry point associated with the retrieved HTML document based on at least one similar entry point in a similar HTML document with a same title as the retrieved HTML document, wherein the retrieved HTML document is located in a different domain from the similar HTML document;
extracting a main content article associated with the retrieved HTML document based on the identified at least one entry point; and
presenting the extracted main content article associated with the retrieved HTML document to a user.

US Pat. No. 10,922,365

SECURE SOCIAL CONNECTION VIA REAL-TIME BIOMETRICS AND COGNITIVE STATE COMPARISON

International Business Ma...

1. A method for connecting users, comprising:measuring biometric information to identify a user state, the user state including both a biometric state and a cognitive state, of a first user via at least one biometric sensor which the first user has interaction with;
matching the user state of the first user to a set of user states of respective other users using a processor;
limiting the set of user states in accordance with user preferences including how recently the user state of a first user was measured relative to the time of a measurement of the user state of another user, by excluding users having a user state that was measured at a time in the past greater than a time threshold, and by weighting each user state according to each respective other user's distance from the first user; and
forming a real-time communications connection between a first user device in the possession of the first user and a second user device in the possession of a second user from the limited set of user states having a best match by determining the second user from the limited set of user states having a most similar or most complementary user state to the first user.

US Pat. No. 10,922,364

WEB CRAWLING METHOD AND SERVER

TENCENT TECHNOLOGY (SHENZ...

1. A web page grabbing method, which is performed by a web page grabbing apparatus comprising at least one processor, the method comprising:obtaining, by the at least one processor, communication time between n grabbing servers and a website (n being an integer greater than 1) and determining, by the at least one processor, a grabbing server having shortest communication time;
grabbing via the determined grabbing server, by the at least one processor, a target web page on the website, the target web page comprising a web page corresponding to a Hypertext Markup Language 5 (H5) content and a web page corresponding to a non-H5 content;
detecting, by the at least one processor, the web page corresponding to the H5 content according to web page source code of the target web page;
performing, by the at least one processor, dynamic rendering on the web page corresponding to the H5 content, to obtain a rendered web page; and
extracting, by the at least one processor, content details information corresponding to the H5 content from the rendered web page.

US Pat. No. 10,922,363

CODEX SEARCH PATTERNS

1. A method operating on a system including, a plurality of computers linked together forming a neural network functioning as a single entity, the system employing a search pattern database (Codex), the Codex being stored in a digital memory device within the system, at least one end user computing terminal in digital communication with the neural network to search the Codex, the search pattern database residing in the Codex, the search pattern database including a comprehensive collection of recognized search pattern to a specific language, a webpage database residing in the Codex, the webpage database including a master index and a partial master index for each element of the Codex, and optimizer software residing in a digital memory device of a respective end user computing terminal, wherein the optimizer software includes execution instructions to transform a user's input into a search pattern based upon rules of grammar and semantics and to store the data in the digital memory device of the respective end user computing terminal, the method comprising:employing and coordinating, by the system, web crawlers to continuously interact with, scan, gather, analyze and distill raw documents from an Internet environment and process the raw documents into a formatted implementable representation of data for human monitoring and evaluation and updating the Codex with the latest statistically significant formatted implementable representation of data for human monitoring and evaluation;
receiving, by the system, a recognized search pattern and then storing the recognized search pattern in the search pattern database;
data mining, by the system, the webpage database stored in the Codex by executing software instructions based on rules of semantics as trending data stored in the web page database, wherein the rules of semantics include programming to analyze, parse and index refine the database to determine portions of the database that are relevant, using rules of semantic relevancy, to the most recent formatted data received;
searching, by the system, the Codex for at least one match to the interactively mapped recognized search pattern;
comparing, by the system, the trending data to top search results from the search using the recognized search pattern to proactively generate output based upon an occurrence of the trending data matching the recognized search pattern; and
automatically communicating, by the system, updated output from the search using the recognized search pattern to the end user computing terminal.

US Pat. No. 10,922,362

MODELS FOR UTILIZING SILOED DATA

Clover Health, Jersey Ci...

1. A system comprising:one or more processors; and
computer-readable media storing first computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, from a first source associated with a first country, first data associated with health of a first individual, the first data corresponding to a first data type;
receiving, from at least one of the first source or a second source associated with the first country, second data associated with the health of the first individual, the second data corresponding to a second data type;
receiving, from a remote system associated with a second country, a first indication that the remote system is associated with:
third data associated with health of a second individual, the third data corresponding to the first data type, the third data being restricted from transfer from the remote system; and
fourth data associated with the health of the second individual, the fourth data corresponding to a third data type, the fourth data being restricted from transfer from the remote system;
receiving a second indication of a health-related outcome to be determined with respect to the second individual;
sending, to the remote system and based at least in part on the third data and the fourth data being restricted from transfer, a predictive-layer configuration including pseudo code configured for use by the remote system to generate a first predictive layer configured to accept the third data and the fourth data and to determine a first probability of the healthrelated outcome occurring with respect to the second individual;
generating, based on the remote system being associated with the third data and receiving the first data, a second predictive layer configured to accept the first data and to determine a second probability, based on the first data, of the health-related outcome occurring with respect to the first individual;
sending the second predictive layer to the remote system, the second predictive layer configured to generate a first feature configured as an input to the first predictive layer;
receiving, from the remote system, a third predictive layer configured to generate a second feature;
generating a fourth predictive layer configured to accept the first data, the second data, and the second feature; and
determining a third probability of the health-related outcome occurring with respect to the first individual based on the fourth predictive layer.

US Pat. No. 10,922,361

IDENTIFYING AND STRUCTURING RELATED DATA

Microsoft Technology Lice...

1. A method comprising:receiving an indication of an input entity via a user interface;
initiating display of one or more related attribute types via the user interface, wherein each related attribute type of the one or more related attribute types is determined to be related to the input entity;
initiating display of a plurality of related entities via the user interface, wherein each related entity of the related entities is determined to be related to the input entity;
receiving an attribute type selection via the user interface, the attribute type selection identifying a selected attribute type of the one or more related attribute types;
in response to receiving the attribute type selection, initiating display of at least one attribute value of the selected attribute type for the input entity;
receiving a related entity selection via the user interface;
upon receipt of the related entity selection, identifying an entity attribute value of the selected attribute type for the related entity selection; and
updating the display of the plurality of related entities, wherein display of each related entity is based on the selected attribute type of each related entity including the entity attribute value.

US Pat. No. 10,922,360

ANCILLARY SPEECH GENERATION VIA QUERY ANSWERING IN KNOWLEDGE GRAPHS

International Business Ma...

1. A processor-implemented method for generating ancillary speech in response to one or more natural language queries, the method comprising:receiving a query from a querent;
interpreting the one or more terms of the received query using a plurality of schema information;
rewriting the initial query into a plurality of related queries;
pruning one or more related queries from the plurality of related queries on at least one of one or more contemporary circumstances;
retrieving one or more preferences associated with the querent, where each of the one or more preferences is assigned a weight representing an importance of each preference to the querent;
filtering out one or more of the one or more pruned related queries that do not match the one or more preferences;
sorting the one or more filtered pruned related queries according to the weight of each matching preference; and
based on the sorting, answering a pruned query of the one or more filtered pruned related queries with a knowledge graph.

US Pat. No. 10,922,359

COMPUTERIZED SYSTEM AND METHOD FOR EXTRACTING ENTITY INFORMATION FROM TEXT COMMUNICATIONS AND DISPLAYING CONTENT BASED THEREFROM

VERIZON MEDIA INC., New ...

1. A method comprising the steps of:identifying, via a computing device, a message addressed to a user, said message at least comprising text within a body of the message;
analyzing, via the computing device, said message, and based on said analysis, determining a context of said message;
parsing, via the computing device, said message according to the determined context, and based on said parsing, identifying entity information within said message corresponding to said context, said entity information comprising a portion of text within said message referencing a real-world or digital entity;
extracting, via the computing device, said entity information;
generating, via the computing device, a search query based on said extracted entity information;
receiving, via the computing device, a result of the search query;
searching and identifying, via the computing device, digital content based on said received result;
generating, via the computing device, for inclusion in a user interface (UI), an electronic content card for said entity information, said content card comprising said digital content identified from said result; and
automatically causing, via the computing device, to be displayed on a device of said user without user input, said generated UI comprising a content card in association with said message.

US Pat. No. 10,922,358

SYSTEM AND METHOD FOR ANALYSIS OF STRUCTURED AND UNSTRUCTURED DATA

KPMG LLP, New York, NY (...

1. A computer-implemented method for analyzing at least one of structured and unstructured data, the method comprising:receiving at least one input file to be analyzed, wherein the at least one input file includes the structured and unstructured data;
splitting the at least one input file into a plurality of documents based on rules-based patterns and artificial intelligence trained on domain-specific knowledge to detect boundaries and split the document along the detected boundaries;
classifying, through rules-based patterns and machine learning, each page of the plurality of documents as one of structured or unstructured data, and the type of structured or unstructured data;
parsing, via rules-based patterns and machine learning, the pages of the plurality of documents classified as unstructured data into domain specific sections;
extracting relevant data from the parsed pages;
mapping each of the extracted relevant data to standardized output;
generating canonical data sets based on the standardized outputs; and
training and refining the machine learning based on the mapping of relevant data to the standardized output.

US Pat. No. 10,922,357

AUTOMATICALLY MAPPING NATURAL LANGUAGE COMMANDS TO SERVICE APIS

Amazon Technologies, Inc....

14. A non-transitory, computer-readable storage medium, storing program instructions that when executed by one or more computing devices cause the one or more computing devices to implement:receiving a request to map one or more application programming interface (API) functions to one or more natural language commands;
responsive to the request, evaluating the one or more application programming interface (API) functions corresponding to one or more web-based services according to one or more grammatical rules that apply a common command structure to a plurality of different web-based services to automatically generate a mapping of the one or more natural language commands to a corresponding one of the application programming interface (API) functions; and
selecting one of the API functions corresponding to one of the natural language commands using the generated mapping and invoking the selected one of the API functions for one of the web-based services mapped to the one of the natural language commands in response to identifying the one of the natural language commands in a natural language input.

US Pat. No. 10,922,356

EXPANDABLE DATA OBJECT MANAGEMENT AND INDEXING ARCHITECTURE FOR INTERSYSTEM DATA EXCHANGE COMPATIBILITY

Slack Technologies, Inc.,...

1. A group-based communication platform configured for generating a work graph based on one or more work objects, the group-based communication platform comprising:one or more memory storage areas; and
one or more processors collectively configured to:
intake one or more work objects from a validated external resource for distribution to one or more client devices via at least one of one or more group-based communication channels, wherein the one or more work objects comprise metadata and body content data;
determine a work object type for each of the one or more objects;
extract work object data from each of the one or more work objects, wherein the work object data extracted from each of the one or more work objects is identified based at least in part on the work object type, and wherein the work object data is extracted from the metadata and the body content data;
identify, based at least in part on the work object data, relationships established via each of the one or more work objects; and
establish, based at least in part on the relationships established via each of the one or more work objects; a work graph data structure interrelating one or more work objects shared via the group-based communication platform.

US Pat. No. 10,922,355

METHOD AND APPARATUS FOR RECOMMENDING NEWS

Baidu Online Network Tech...

1. A method for recommending news, comprising:receiving a voice request for playing news;
analyzing the voice request, and determining a target attribute associated with the voice request from a preset user attribute set based on an analysis result;
acquiring user attribute information corresponding to the target attribute; and
selecting out target news from a to-be-recommended news database for recommendation based on the analysis result of the voice request and the user attribute information corresponding to the target attribute, wherein the selecting out target news from a to-be-recommended news database for recommendation based on the analysis result of the voice request and the user attribute information corresponding to the target attribute comprises:
acquiring summary information of to-be-recommended news in the to-be-recommended news database, the summary information comprising a title and a content summary;
calculating a first similarity between the summary information of the to-be-recommended news and the analysis result;
calculating a second similarity between the summary information of the to-be-recommended news and the user attribute information corresponding to the target attribute;
obtaining a weighted summation of the first similarity and the second similarity;
selecting out the target news based on the weighted summation of the first similarity and the second similarity; and
pushing the target news.

US Pat. No. 10,922,354

REDUCTION OF UNVERIFIED ENTITY IDENTITIES IN A MEDIA LIBRARY

Apple Inc., Cupertino, C...

1. A method for combining feature vector clusters on an electronic device, the method comprising:obtaining, at the electronic device, cluster data, wherein the cluster data comprises:
first cluster data indicative of a first feature vector cluster comprising a plurality of first feature vectors determined to be similar to one another; and
second cluster data indicative of a second feature vector cluster comprising a plurality of second feature vectors determined to be similar to one another, wherein each feature vector of each one of the plurality of first feature vectors and the plurality of second feature vectors is representative of a face of an unverified entity appearing in a digital asset of a plurality of digital assets;
grouping, at the electronic device, the plurality of first feature vectors and the plurality of second feature vectors in a bundle of feature vectors based on determining that a distance between a centroid of the first feature vectors of the plurality of first feature vectors and a centroid of the second feature vectors of the plurality of second feature vectors is less than a first threshold distance;
presenting, at the electronic device, a bundle of digital assets representative of each digital asset of the plurality of digital assets that comprises a face represented by a feature vector of the bundle of feature vectors; and
facilitating, at the electronic device, identity verification of a single identity to every feature vector of the bundle of feature vectors using the presented bundle of digital assets.

US Pat. No. 10,922,353

HYBRID DETECTION RECOGNITION SYSTEM

Ricoh Company, Ltd., Tok...

1. A method comprising:receiving, by one or more processors, a first image;
determining, by the one or more processors, a first region of interest and a second region of interest in the first image;
determining, by the one or more processors, a first classification score for the first region of interest and a second classification score for the second region of interest using a convolutional neural network, the convolutional neural network assigning the first region of interest the first classification score corresponding to a class and the second region of interest the second classification score corresponding to the class;
determining, by the one or more processors, whether the first region of interest and the second region of interest share a similar spatial location;
responsive to determining that the first region of interest and the second region of interest share the similar spatial location, combining, by the one or more processors, the first classification score and the second classification score to determine a result class for the similar spatial location; and
identifying, by the one or more processors, a first product in the first image based on the combined classification score.

US Pat. No. 10,922,352

PLACARD-TO-PIN INTERACTION

CoStar Realty Information...

1. A computer-implemented method comprising:providing, for output and by an application server that is associated with a search system, an initial search results page that includes (i) an initial ranked list of properties that satisfy an initial search query, and (ii) representations of the properties that satisfy the initial search query, overlaid on an initial map;
receiving, by the application server that is associated with the search system, data indicating that a particular representation has been selected; and
in response to receiving the data indicating that the particular representation has been selected:
generating, by the application server that is associated with the search system, an updated search query using data for the particular representation that has been selected;
determining, by the application server that is associated with the search system and using the updated search query, an updated list of properties that satisfy the updated search query, the updated list of properties including one or more properties included in the initial ranked list of properties that satisfy the initial search query;
generating, by the application server that is associated with the search system, an updated ranked list of the properties that satisfy the updated search query, the updated ranked list including one or more properties included on the initial ranked list of properties that satisfy the initial search query; and
providing, for output and by the application server that is associated with the search system, an updated search results page that includes (i) the updated ranked list of the properties that satisfy the updated search query, the updated ranked list including one or more properties included on the initial ranked list of properties that satisfy the initial search query, and (ii) representations of properties that satisfy the updated search query, overlaid on an updated map that has an increased zoom level relative to the initial map.

US Pat. No. 10,922,351

DYNAMIC FEEDBACK IN A RECOMMENDATION SYSTEM

RCRDCLUB Corporation, Ne...

1. A method for managing a pool of media items, the method comprising:generating a profile vector of a user based upon vector representations of a plurality media items previously consumed by the user;
effecting a change to the profile vector in a manner that is inversely proportional to a total number of times that the user has consumed a specific media item;
selecting, by a processor and based on the profile vector of a user, a seed media item from among a plurality of media items, wherein a selection of the seed media item is based on dot products between the profile vector and a vector representation of media items of a first subset of the plurality of media items;
generating, by the processor, a first pool of media items based upon the seed media item, the first pool including a second subset of the plurality of media items;
receiving, by the processor, a feedback signal about a media item of the first pool; and
modifying, by the processor and based on the feedback signal, contents of the first pool to produce a second pool, wherein the second pool includes a media item not included in the first pool.

US Pat. No. 10,922,350

ASSOCIATING STILL IMAGES AND VIDEOS

Google LLC, Mountain Vie...

1. A system comprising one or more computers including one or more storage devices storing instructions that when executed by the one or more computers cause the one or more computers to perform operations comprising:receiving a search query submitted by a user of a user device;
identifying one or more images that are responsive to the search query;
determining that a video is related to one or more of the images responsive to the search query, wherein determining that the video is related to a particular image responsive to the search query comprises:
extracting one or more features from the particular image responsive to the search query;
extracting one or more features from the video;
comparing the features extracted from the particular image responsive to the search query to the features extracted from the video; and
determining that the video is related to the particular image responsive to the search query based on the comparison of the features extracted from the particular image responsive to the search query to the features extracted from the video; and
presenting the video alongside the images that are responsive to the search query on a display of the user device.

US Pat. No. 10,922,349

FILTERING REMOTE ACCESS MONITORING DATA

Amazon Technologies, Inc....

1. A computer-implemented method comprising:under control of one or more processing devices,
receiving, from an image capturing device, captured image data for a monitored location;
receiving, from a delivery system, delivery information for an item delivered at the monitored location, wherein the delivery information includes: (i) an identifier for the monitored location; and (ii) temporal information indicating when the item was delivered at the monitored location;
identifying a portion of the captured image data showing delivery of the item, wherein identifying the portion of the captured image data comprises:
identifying a monitoring threshold, wherein the monitoring threshold corresponds to the identifier for the monitored location, and wherein the monitoring threshold identifies a desired size of the portion of the captured image data,
determining a starting point, in the captured image data, of the portion of the captured image data based at least in part on the temporal information indicating when the item vas delivered at the monitored location,
identifying the portion of the captured image data based at least in part on the starting point in the captured image data, and
determining that a size of the portion of the captured image data satisfies the desired size of the portion of the captured image data; and
transmitting the portion of the captured image data to a device associated with the monitored location.

US Pat. No. 10,922,348

REPRESENTATION OF A DATA ANALYSIS USING A FLOW GRAPH

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method, comprising:generating, by a device operatively coupled to a processing unit, a directed acyclic graph that traces a flow of objects during execution of a data analysis program, wherein vertices of the directed acyclic graph correspond to respective function calls of a plurality of function calls during the execution of the data analysis program, and an edge connected to the node represents an output of a function associated with the function call;
annotating, by the device, for respective recognized function calls of the plurality of function calls that are determined to have matching annotation labels in a set of annotation databases, first vertices of the vertices of the directed acyclic graph corresponding to the respective recognized function calls with their matching annotation labels, wherein the annotating generates an annotated directed acyclic graph comprising annotated function calls;
removing, by the device, second vertices of the vertices from the annotated directed acyclic graph corresponding to respective unrecognized function calls of the plurality of function calls that are determined not to have matching annotation labels in the set of annotation databases, and removing, by the device, edges connected to the second vertices from the annotated directed acyclic graph;
annotating, by the device the node of the directed acyclic graph with a name of the function associated with the function call,
annotating, by the device, the edge with a name of the object being output by the function;
annotating, by the device, first the vertices based on an annotation database of the set of annotation databases, selected based on a type of programming language of the data analysis program;
identifying, by the device, a taxonomy of functions;
taxonomizing, by the device, the annotated directed acyclic graph based on the taxonomy of functions and the respective recognized function calls, resulting in the respective recognized function calls being semantically grouped by concept, resulting in a semantic directed acyclic graph;
facilitating, by the device, identifying a similar data analysis program based on the semantic directed acyclic graph, wherein the similar data analysis program comprises data analysis functions and data sets that are conceptually similar to the data analysis program; and
tracking, by the device, semantic labels of the set of semantic labels matched by the semantic labeling component over a plurality of runs of data analysis programs.

US Pat. No. 10,922,347

HIERARCHICAL DICTIONARY WITH STATISTICAL FILTERING BASED ON WORD FREQUENCY

1. A method for organizing a plurality of words associated with a document, comprising:inputting, by a processor of a computing device, each of the plurality of words associated with the document to a memory coupled to the computing device, the memory including instructions to perform:
for each of the plurality of words:
identifying a hash value corresponding to a word and determining whether a bucket associated with the hash value in a first hash map is available, the first hash map having a first word capacity;
based upon the determination, storing the word and updating a frequency of the word in the first hash map; and
in a second hash map, storing the word and ranking the word relative to each other of the plurality of words based on the frequency, the second hash map having a second word capacity, the second word capacity being greater than the first word capacity; and
after a predetermined period of time has elapsed, transferring a portion of the plurality of words based upon the ranking to a third hash map, the third hash map having a third word capacity, the third word capacity being greater than the second word capacity.

US Pat. No. 10,922,346

GENERATING A SUMMARY BASED ON READABILITY

Micro Focus LLC, Santa C...

1. A method executed by a computer system, comprising:extracting a set of sentences from a digital document;
scoring, by a computer, each respective sentence of the set of sentences using a respective informativeness measure that is computed:
i) based on a similarity score representing a similarity of the respective sentence with at least one other sentence of the set of sentences, and
ii) based on a number of words in the respective sentence that have term frequency-inverse document frequency (tf-idf) values indicating that the number of words are key words;
scoring each respective sentence of the set of sentences using a respective readability measure that is calculated based on a number of words in the respective sentence that are on a reading list;
selecting selected sentences in the set of sentences based on the respective readability measures and the respective informativeness measures, wherein the selected sentences in the set of sentences are selected using a linear program optimization that maximizes informativeness and readability of an electronic readable summary as measured by the respective informativeness measures and the respective readability measures of the respective sentences in the set of sentences;
identifying a low readability, high informativeness sentence from the set of sentences, wherein the low readability, high informativeness sentence has an informativeness measure that is greater than informativeness measures of other sentences of the set of sentences, and has a readability measure that is less than readability measures of the other sentences;
creating a concatenated sentence by concatenating at least one contextual sentence with the low readability, high informativeness sentence, wherein the concatenated sentence has a higher readability than the low readability, high informativeness sentence;
computing a readability measure of the concatenated sentence satisfying a specified criterion; and
generating the electronic readable summary of the digital document, the electronic readable summary including the concatenated sentence and the selected sentences.

US Pat. No. 10,922,345

SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIES

People.ai, Inc., San Fra...

1. A method comprising:identifying, by one or more processors, a first electronic activity and a second electronic activity associated with a data source provider that has been transmitted by a sender of the first electronic activity and the second electronic activity and received by one or more recipients of the first electronic activity and the second electronic activity, the first electronic activity and the second electronic activity readable by the one or more recipients;
parsing, by the one or more processors, the first electronic activity to identify one or more electronic accounts associated with at least the sender or the one or more recipients of the first electronic activity;
determining, by the one or more processors, responsive to parsing the first electronic activity, that the first electronic activity is sent from or received by an electronic account of the one or more electronic accounts, the electronic account corresponding to the data source provider;
determining, by the one or more processors, responsive to parsing the second electronic activity, that the second electronic activity is sent from or received by the electronic account of the one or more electronic accounts;
selecting, by the one or more processors based on the electronic account, one or more filtering policies associated with the data source provider to apply to the first electronic activity and the second electronic activity, the selected one or more filtering policies including at least one of i) a keyword policy configured to identify electronic activities including a predetermined keyword; ii) a regex pattern policy configured to identify electronic activities including one or more character strings that match a predetermined regex pattern; or iii) a logic-based policy configured to identify electronic activities based on participants of the electronic activities satisfying a predetermined group of participants;
determining, by the one or more processors, by applying the selected one or more filtering policies to the first electronic activity, to restrict the first electronic activity from being matched with one or more record objects of a system of record of the data source provider based on the first electronic activity satisfying at least one of the selected one or more filtering policies, the system of record of the data source provider including a plurality of record objects;
restricting, by the one or more processors, the first electronic activity from being matched with one or more record objects of the system of record;
determining, by the one or more processors, by applying the selected one or more filtering policies to the second electronic activity, to match the second electronic activity with one or more record objects of the system of record of the data source provider based on the second electronic activity not satisfying any of the selected one or more filtering policies;
matching, by the one or more processors, responsive to determining to match the second electronic activity with the one or more record objects, the second electronic activity with a first record object of the one or more record objects responsive to a match policy; and
transmitting, by the one or more processors, to the system of record, instructions to store an association between the second electronic activity and the first record object in the system of record.

US Pat. No. 10,922,344

IMPORTING DOCKETING DATA

Black Hills IP Holdings, ...

1. A method for importing docketing data, the method comprising:retrieving, from a storage device, a data structure that includes docketing information for a plurality of matters comprising a first matter from a source docketing system;
searching a publicly available database to retrieve information associated with the first matter;
verifying that data in at least one field of the first matter matches data in a corresponding field of the retrieved information;
obtaining an expected activity type sequence that indicates a second activity type is expected to be present following occurrence of a first activity type;
automatically detecting existence of an error in the first matter based on a combination of two or more fields of the first matter, the automatically detecting existence of the error comprising determining that a sequence of a plurality of activity types of the first matter does not match the expected activity type sequence; and
storing the first matter in a target docketing system.

US Pat. No. 10,922,343

DATA SEARCH DEVICE, DATA SEARCH METHOD, AND RECORDING MEDIUM

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable recording medium storing a data search program that causes a computer to execute a process comprising:receiving a search character string for target text data; and
searching for the search character string by a logical operation between index information associated with appearance positions in the target text data of each of characters or words appearing in the target text data as bitmap data and search bitmap data generated to be associated with an appearance order in the search character string of respective characters or respective words constituting the search character string, wherein
the searching includes performing full-text searching using a bitmap index (BI) while considering continuity of the positions of the respective characters or the respective words, without performing substantive matching,
the receiving includes receiving the target text data,
the process further includes generating the index information with respect to each of characters or words appearing in the target text data and encoding the text data in units of the characters or in units of the words,
the receiving includes receiving a search character string for the encoded target text data, and
the searching includes searching for the search character string by a logical operation between the generated index information and search bitmap data generated to be associated with an appearance order in the search character string of respective characters or respective words constituting the search character string, wherein the searching includes searching for the search character string by searching for the search character string using the bitmap index without decoding the encoded target text data.

US Pat. No. 10,922,342

SCHEMALESS SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING AND UTILIZING A CHATBOT KNOWLEDGE BASE OR THE LIKE

STRATIFYD, INC., Charlot...

1. A system for automatically building a knowledge base, comprising:memory storing question-and-answer detection instructions forming a textual analytics tool executed by a processor and operable for parsing a query to a platform utilizing an existing knowledge base to identify a missing question-and-answer pair associated with the existing knowledge base;
the memory storing answer formulation instructions executed by the processor and operable for manually or automatically generating an answer to the query to form a potential question-and-answer pair;
the memory storing question-and-answer validation instructions executed by the processor and operable for manually or automatically validating the formulated potential question-and-answer pair; and
the memory storing question-and-answer substitution instructions executed by the processor and operable for updating the existing knowledge base with the validated formulated potential question-and-answer pair to form a new knowledge base;
wherein the potential question-and-answer pair associated with the query and question-and-answer pairs associated with the existing knowledge base are vector encoded by a deep neural network (DNN) and compared for semantic similarity distance to determine if the existing knowledge base is expanded to form the new knowledge base, wherein the DNN is trained with training data utilizing a text clustering algorithm to discover hidden topics and provide a taxonomy that informs data inclusion in the new knowledge base; and
wherein the platform is operable for receiving another query and responding utilizing the new knowledge base.

US Pat. No. 10,922,341

NON-TABULAR DATASOURCE CONNECTOR

Splunk Inc., San Francis...

1. A method comprising:activating, by a native data search and processing system, a datasource connector of the native data search and processing system, the datasource connector configured to communicate with an external source;
receiving, by the native data search and processing system, a plurality of attributes of a query in a native language of the native data search and processing system, the plurality of attributes being displayed and received via a customized user interface configured to assist in building a query language statement;
formatting, by the datasource connector, the plurality of attributes of the query into the query language statement in a native language of the external source, the native language of the external source being different from the native language of the native data search and processing system;
causing display of the query language statement in the native language of the external source on the customized user interface displaying the plurality of attributes, the display of the query language statement being automatically updated after each input of an attribute of the plurality of attributes on the customized user interface;
making, by the datasource connector, an application programming interface (API) call to the external source in response to activation of a search trigger associated with the displayed query language statement on the customized user interface, the API call including transmission of the query language statement to the external source, the API call causing the external source to perform a query using the query language statement;
receiving, by the datasource connector, results of the query performed at the external source, the results being in a non-tabular format;
reformatting, by the datasource connector, the results in the non-tabular format into a tabular format;
persisting the results, as a lookup table, for use in a further query performed within the native data search and processing system; and
performing the further query in the native language of the native data search and processing system using either the lookup table or in real-time using the results.

US Pat. No. 10,922,340

CONTENT EXTRACTION FOR LITERARY WORK RECOMMENDATION

AMAZON TECHNOLOGIES, INC....

1. A system for providing book recommendations, the system comprising:one or more processors; and
one or more non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform acts comprising:
receiving, from a user device of a user, a request for a book recommendation, the request representing a string of text entered by the user via the user device;
analyzing the request using natural language processing (NLP);
determining, based on analyzing the request using NLP, one or more keywords that are associated with the book recommendation;
determining, based on the one or more keywords, a plot, a setting, and a genre of the book recommendation;
searching a database of digital books based on the plot, the setting, and the genre of the book recommendation to identify one or more digital works related to the plot, the setting, and the genre of the book recommendation, wherein digital books in the database of digital books are stored in association with metadata that indicates the plot, the setting, and the genre of the digital books, and wherein the metadata is generated based at least in part on using NLP to analyze at least one of a review of individual digital books or text of the individual digital books;
determining, based on searching the database of digital books:
a first similarity value indicating a first similarity between first metadata stored in association with a first digital book and the one or more keywords; and
a second similarity value indicating a second similarity between second metadata stored in association with a second digital book and the one or more keywords, wherein the first digital book and the second digital book are responsive to the request;
determining that the first similarity value is greater than the second similarity value; and
sending, to the user device, responsive to the request, and based on the first similarity value being greater than the second similarity value, a recommendation of the first digital book.

US Pat. No. 10,922,339

PORTABLE GLOBE CREATION FOR A GEOGRAPHICAL INFORMATION SYSTEM

Google LLC, Mountain Vie...

1. A method for providing a portable globe for a geographical information system (GIS) from a remote device to a local device, comprising:receiving, by one or more processors, one or more queries associated with at least one selected region corresponding to a geographical region of a master globe;
organizing, by the one or more processors, geospatial data from the master globe based on the at least one selected region, the geospatial data including geospatial data associated with the at least one selected region and geospatial data associated with a geographic area located outside the at least one selected region; and
creating the portable globe based on organized geospatial data from the master globe based on the at least one selected region, wherein the portable globe is smaller in data size than the master globe; and
transmitting the portable globe to a local device configured to render the portable globe, wherein the at least one selected region is capable of being rendered at the local device during a period of reduced network connectivity between the local device and the remote device.

US Pat. No. 10,922,338

METHODS, SYSTEMS, NETWORKS, AND MEDIA FOR GENERATING LOCATION BASED CLUSTERS OF MERCHANTS BASED ON CONSUMER TRANSACTION ACTIVITY

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for generating merchant clusters based upon monitored consumer transaction activity, comprising:obtaining, by a processor, transaction activity of consumers;
generating, by the processor, a reference cluster based on the obtained transaction activity;
generating, by the processor, at least one regional merchant cluster for each of a plurality of different geographic regions based on the obtained transaction activity;
determining, by the processor, at least one match score of the at least one regional merchant cluster in the plurality of different geographic regions against the reference cluster thereof;
generating, by the processor, a reference vector and a regional vector for each of the plurality of different geographic regions;
generating, by the processor, a cluster labeling scheme, for each of the plurality of different geographic regions, based on comparing each of the regional merchant clusters in that corresponding geographic region against the reference cluster; and
realigning, by the processor, cluster labels for each of the regional merchant clusters in each of the plurality of different geographic regions based on the corresponding cluster labeling scheme generated for the corresponding geographic region.

US Pat. No. 10,922,337

CLUSTERING OF DATA RECORDS WITH HIERARCHICAL CLUSTER IDS

AMPERITY, INC., Seattle,...

1. A system comprising:a database that stores at least one database table comprising a plurality of records; and
a memory coupled to a processor; the memory comprising a plurality of instructions that cause the processor to:
access a subset of records derived from at least one database table;
generate a hierarchical clustering for the subset of records by iteratively performing ordinal classifications on a plurality of pairwise comparisons over a plurality of iterations, the hierarchical clustering comprising a plurality of tiers, wherein each tier corresponds to a respective degree of confidence among the records within the tier, wherein the ordinal classifications are performed by an ordinal classifier that generates a non-binary output based on training data comprising ordinal, non-binary labels;
assign a respective hierarchical cluster ID to each record in the subset of records according to the hierarchical clustering, the hierarchical cluster ID comprising a series of values, wherein each value reflects a respective tier among the plurality of tiers; and
receive a hierarchical cluster ID from a client device to allow a selection of a cluster corresponding to one tier among the plurality of tiers of the hierarchical clustering according to the hierarchical cluster ID.

US Pat. No. 10,922,336

SYSTEMS AND METHODS FOR INDEXING AND AGGREGATING DATA RECORDS

Palantir Technologies Inc...

1. A system comprising:a memory device configured to store a set of instructions; and
one or more processors configured to execute the set of instructions to:
access a plurality of data records comprising a plurality of data values;
identify those of the plurality of data records having a matching data value within the plurality of data values of the data record, wherein the identified data records also include one or more non-matching data values;
determine a measure of the identified data records, wherein the measure of the identified data records is based on an aggregation of the identified data records; and
generate a summarized data record indicating the matching data value and the measure of the identified data records, wherein the summarized data record does not include at least some of the non-matching data values of the identified data records.

US Pat. No. 10,922,335

USER TARGETING USING AN UNRESOLVED GRAPH

Facebook, Inc., Menlo Pa...

1. A method comprising:identifying, by an online system, a set of unresolved identifiers, wherein an unresolved identifier defines a context in which a client device accesses one or more online systems, and wherein the context has not been determined to be associated with a specific user;
identifying, by the online system, for each unresolved identifier of the set of unresolved identifiers, information associated with the unresolved identifier, the information describing characteristics of one or more access events associated with the unresolved identifier;
for each pair of unresolved identifiers:
determining, by the online system, based on the information associated with each unresolved identifier, a similarity score for the pair of unresolved identifiers;
determining, by the online system, that the determined similarity score exceeds a threshold similarity score; and
responsive to determining that the similarity score exceeds the threshold similarity score:
clustering, by the online system, the pair of unresolved identifiers in a graph, the clustering indicating a prediction that the pair of unresolved identifiers are associated with a common user; and
displaying, by the online system, on one or more user devices associated with at least one unresolved identifier of the set of unresolved identifiers, a content item, wherein the displaying is based on the clustering of the unresolved identifiers in the graph.

US Pat. No. 10,922,334

MIXTURE MODEL BASED TIME-SERIES CLUSTERING OF CRIME DATA ACROSS SPATIAL ENTITIES

Conduent Business Service...

1. A crime analysis system comprising:at least one processor; and
a storage device communicatively coupled to said at least one processor, said storage device storing instructions which, when executed by said at least one processor, cause said at least one processor to perform operations comprising:
receiving information provided by at least one data collection source;
storing said information, wherein said stored information is formatted;
processing said information to generate crime clustering data associated with at least one region and at least one crime, wherein said processing of said information to generate crime clustering data associated with said at least one region and said at least one crime further comprises:
extracting features from said information;
identifying feature distribution associated with said extracted features; and
clustering said information according to feature extraction and feature distribution, wherein said clustering of said information further comprises: applying a mixture model based time-series clustering framework to said identified extracted features, wherein said mixture model based time-series clustering framework uses a set of statistical and domain-level features for clustering across spatial entities, and wherein said mixture model based time-series clustering framework handles heterogeneity in time series-data from a scheduled job according to spatial parameters and crime types;
processing said crime clustering data associated with at least one region and at least one crime to generate benchmarking of said at least one region with at least one other region;
providing crime clustering data associated with at least one region and at least one crime, and benchmarking of said at least one region with at least one other region for presentation through a user interface; and
permitting a granulating of said at least one region and said at least one other region to be adjustable according to a user preference.

US Pat. No. 10,922,333

EFFICIENT MANAGEMENT OF CLIENT SYNCHRONIZATION UPDATES

Dropbox, Inc., San Franc...

1. A computer-implemented method comprising:receiving a first set of operations configured to converge a server state representing content items stored on a server of a content management system and a file system state representing content items stored on a client device;
receiving a second set of operations, prior to completing executing the first set of operations, the second set of operations configured to converge the server state and the file system state after a client synchronization service identifies a change to at least one of the server state and the file system state;
identifying a first operation in the first set of operations that is not in the second set of operations;
initiating canceling the first operation;
identifying a second operation in both the first set of operations and the second set of operations; and
initiating execution of the second operation without waiting for the cancellation of the first operation to be completed.

US Pat. No. 10,922,332

DIGITAL ASSET MANAGEMENT SYSTEM (DAMS)

Verizon Media Inc., New ...

1. A computer-implemented method comprising the following operations performed by at least one processor:determining that a client device is connected to a network;
identifying metadata and client assets of the client device to be synchronized and server assets to be synchronized corresponding to the metadata when the client device is connected to the network, the client assets being stored at a client memory, the server assets being stored at a database, wherein the metadata includes information related to one or more of: client asset type, server asset type, size, shared data, music metadata, video metadata, and GPS data;
determining a synchronization setting for the client assets and the server assets, each synchronization setting being based on user input;
determining whether a client asset is associated with an exclusion flag;
identifying client asset usage patterns, including relationships between client assets;
automatically assigning tags to the client assets based on the identified relationships;
determining a storage capacity of a client memory corresponding to the client device;
downloading the server assets to the client device when the client memory is determined not to be at fully capacity, when the synchronization setting associated with the server assets has not been met, and when the server assets are not associated with an exclusion flag;
downloading the client assets to the server and automatically clustering groups of client assets based one or more of the identified client device usage patterns and the automatically assigned tags; and
transmitting instructions to the client device to display the downloaded client assets as a collection based on the automatic clustering of groups of client assets.

US Pat. No. 10,922,331

CLONING A PLUGGABLE DATABASE IN READ-WRITE MODE

Oracle International Corp...

1. A computer-executed method comprising:receiving an instruction to clone, to a destination location, a particular pluggable database that resides within a source container database;
wherein a container database management system, that manages the source container database, maintains a database session for the particular pluggable database; and
in response to receiving the instruction, creating a copy of the particular pluggable database comprising:
determining an initial time stamp that marks a time occurring before any files, of a plurality of files in the particular pluggable database, are copied in connection with the received instruction to clone;
at least partly while one or more changes are made to the plurality of files in the particular pluggable database via the database session, copying files, of the plurality of files in the particular pluggable database, to the destination location to produce the copy of the particular pluggable database at the destination location;
wherein the one or more changes includes a particular change made to a particular file of the plurality of files to produce a changed particular file;
wherein copying the files to the destination location comprises copying the changed particular file to the destination location;
recording the particular change in a particular redo entry in one or more redo logs maintained by the container database management system;
determining a final time stamp that marks a time occurring after said copying the files, of the plurality of files in the particular pluggable database, is complete;
performing recovery on the copy of the particular pluggable database based, at least in part, on a set of redo entries, from the one or more redo logs, that comprise information for a set of changes made to the plurality of files in the particular pluggable database between times marked by the initial time stamp and the final time stamp;
wherein the set of redo entries includes the particular redo entry;
wherein the method is performed by one or more computing devices.

US Pat. No. 10,922,330

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, INFORMATION PROCESSING SYSTEM, AND CONTENT REQUESTING TERMINAL

SONY CORPORATION, Tokyo ...

14. An information processing system comprising:a content requesting terminal configured to send a content request;
a population forming server configured to form a population and collecting information of users belonging to the population; and
a content providing device including:
at least one processor configured to:
obtain, from the population forming server, a recommender list for each genre of a plurality of genres, in which, for each genre of the plurality of genres, a recommender is associated with an evaluation score of the recommender, the evaluation score indicating a degree to which a respective genre, of the plurality of genres, of content recommended by the recommender is in accordance with a preference of a user;
select recommended content based on the content request received from the content requesting terminal and the recommender list for a selected genre associated with the content request;
initiate a sending of the recommended content to the content requesting terminal;
receive an evaluation score of the recommended content from the user having used the recommended content; and
update the recommender list for the selected genre by updating, based on the received evaluation score, the evaluation score of the recommender in associated with the selected recommended content, and evaluation scores of recommenders having a relationship with the recommender associated with the selected recommender content.

US Pat. No. 10,922,329

SYSTEMS AND METHODS FOR INTEREST-DRIVEN BUSINESS INTELLIGENCE SYSTEMS INCLUDING GEO-SPATIAL DATA

Workday, Inc., Pleasanto...

22. A method for creating a report utilizing an interest-driven business intelligence system, comprising:generating, using an intermediate processing layer, metadata describing raw data;
deriving, using the intermediate processing layer, reporting data requirements from at least one report specification based on the metadata; and
compiling, using the intermediate processing layer, an interest-driven data pipeline based upon the reporting data requirements, wherein the compiling of the interest-driven data pipeline comprises:
generating extract, transform, and load (ETL) processing jobs to generate geo-spatial data from the raw data by:
filtering the raw data based on the metadata describing the raw data;
determining bounding data based on the metadata describing the raw data, wherein the bounding data corresponds with one or more coordinates that identify a single point, a set of points, and/or a location within a map, and wherein the bounding data comprises at least one dimension identified in the metadata describing the raw data;
bounding the filtered raw data based on the bounding data;
generating geo-spatial data based on the bounded filtered raw data, wherein the geo-spatial data includes a set of data; and
storing the geo-spatial data in a data mart; mart using a defined bounding area, comprising:
aggregating the set of data into bins of data; and
utilizing the bins of data to identify pieces of the set of data that fall on the defined bounding area, pieces of the set of data that fall outside the defined bounding area, or both, wherein the defined bounding area corresponds to bounding data describing one or more locations within a space;
generating reporting data including data satisfying the reporting data requirements based on the geo-spatial data; and
storing the reporting data in the data mart for exploration by an interest-driven data visualization system.

US Pat. No. 10,922,328

METHOD AND SYSTEM FOR IMPLEMENTING AN ON-DEMAND DATA WAREHOUSE

Oracle International Corp...

1. A method implemented with a processor for transferring a plurality of data to a server from a database, the plurality of data retrieved by querying core data and a plurality of database views associated with the core data, comprising:identifying a request for accessing, by an application at a logic server, multiple core data items stored in a core data source in a database system and multiple related data items stored among multiple related data sources different from the core data source, wherein each core data item of the multiple core data items respectively corresponds to a respective related data item of the multiple related; and
in response to the request, reducing a total number of database calls from the logic server to the database system into a reduced number of database calls for accessing the multiple core data items and the multiple related data items at least by:
receiving, at the database system, a first single database call from the logic server to the database system for requesting the multiple core data items on the database system;
in response to the first single database call,
retrieving the multiple core data items from the database system; and
storing the multiple core data items in a common form in a first staging table within the database system;
receiving, at each related data source of the multiple related data sources, a respective single database call from the logic server for requesting a respective set of related data items from the each related data source;
in response to the respective single database call received at the each related data source of the multiple related data sources,
retrieving a respective set of related data items from the each related data source;
storing the respective set of related data items in the common form utilized by the logic server in a respective portion of a second staging table within the database system,
the second staging table comprising at least respective columns that respectively correspond to] respective sets of related data items retrieved by respectively querying the multiple related data sources within the database system such that a first set of related data items retrieved by querying a first related data source of the multiple related data sources is placed into a first column, and a second set of related data items retrieved by querying a second related data source of the multiple related data sources is placed into a second column of the second staging table;
in response to a single core data database call from the logic server, transferring the multiple core data items in a first unitary batch from the first staging table in the database system to the lotic server; and
in response to a single related data database call from the logic server, transferring the respective sets of related data items in a second unitary batch from the second staging table within the database system to the logic server, wherein
reduced number of database calls comprises:
the first single database call,
the single core data database call for transferring the first unitary batch from the first staging table,
the single related data database call for transferring the second unitary batch from the second staging table, and
a first number of single database calls respectively issued a total number of related data sources in the multiple related data sources.

US Pat. No. 10,922,327

SEARCH GUIDANCE

EBAY INC., San Jose, CA ...

1. A method comprising:receiving a search query from a user of a client machine;
based on the search query, identifying, by a processor of a machine, a recommended search;
based on the search query, further determining, by the processor of the machine, an aspect as an aspect recommendation based on a listing offering attribute that is a search query modifier, wherein the aspect recommendation is associated with the recommendation search to be used in combination to constrain search results to the aspect recommendation,
wherein the aspect of the aspect recommendation is determined based on:
accessing user data features associated with aspects, via a user experience generator, wherein the user data features identify aspects that are search query modifiers for search queries run by the user, wherein the user experience generator generates an experience comprising the recommended search; and
using the user experience generator, applying a plurality of recommended search generation rules that instruct on generating recommended searches for the aspects;
generating a set of results based on a combination of the recommended search and the aspect; and
automatically transmitting the set of results responsive to the combination recommended search and aspect to the client machine, the results being constrained to the aspect.

US Pat. No. 10,922,326

TRIGGERING KNOWLEDGE PANELS

Google LLC, Mountain Vie...

1. A method performed by data processing apparatus, the method comprising:receiving a query from a client device;
obtaining search results that are responsive to the received query;
identifying two different factual entities that each correspond to the received query and that are both identified using a same word;
determining, for each of the two identified factual entities, a topicality score that specifies a measure of topical relatedness between the factual entity and content presented by resources linked to by the obtained search results;
selecting, from among the two different factual entities, a particular factual entity for which a knowledge panel is to be provided with the obtained search results based, at least in part, on the topicality score for each of the two factual entities, the knowledge panel for the particular factual entity including a plurality of different types of content for the particular factual entity, the plurality of different types of content including at least one content item, for the particular factual entity, received from a first resource and at least one content item, for the particular factual entity, received from a second resource different than the first resource;
determining that the knowledge panel for the particular factual entity is to be provided with the obtained search results, the determination being based, at least in part, on content of the knowledge panel and characteristics of the obtained search results, the characteristics including a performance of one or more resources referenced by the identified search results when search results that reference the one or more resources were provided in response to the received query; and
providing, to the client device, data that presents the knowledge panel at the client device.

US Pat. No. 10,922,325

MATCHING DEVICE, MATCHING METHOD, AND PROGRAM

OMRON Corporation, Kyoto...

1. A matching apparatus comprising a processor configured with a program to perform operations comprising:operation as a sensor-side metadata acquisition unit that acquires sensor-side metadata comprising information regarding a sensor that outputs sensing data;
operation as an application-side metadata acquisition unit that acquires application-side metadata comprising information regarding an application that provides a service with use of the sensing data;
operation as a matching unit that performs matching between the sensor-side metadata and the application-side metadata in which a first related term that is related to a term in the acquired sensor-side metadata and a second related term that is related to a term in the acquired application-side metadata are in common with each other, and extracts a candidate sensor that provides sensing data that matches needs of the application, wherein operation as the matching unit comprises:
operation as a relevancy calculation unit that calculates at least either one of a first relevancy between the term in the sensor-side metadata and the first related term and a second relevancy between the term in the application-side metadata and the second related term; and
operation as a sensor candidate extraction unit that, with the use of at least either one of the first related term and the first relevancy or the second related term and the second relevancy, performs matching between the sensor-side metadata and the application-side metadata, and extracts the candidate sensor that can provide sensing data that matches needs of the application; and
operation as an instruction unit that transmits, to a sensor management apparatus that manages the sensor, a dataflow control command that includes information that specifies the sensor extracted by the matching unit and the application.

US Pat. No. 10,922,324

IDENTIFYING AND SCORING DATA VALUES

INTERNATIONAL BUSINESS MA...

1. A method, comprising:presenting on a display text including at least a first term;
communicating at least one query including the first term to an enterprise glossary and receiving from the enterprise glossary information corresponding to the first term;
based on the information corresponding to the first term, determining, using a processor, for the first term a first score, the first score based, at least in part, on a lifecycle of the first term and at least one data asset parameter assigned to the first term;
assigning the first score to a first data value; and
presenting on the display the first data value.

US Pat. No. 10,922,323

SERVICE PROCESSING METHOD, SERVER AND COMPUTER STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A service processing method, comprising:for each of a plurality of services, determining, by a server, a reservation amount of the service and a usage amount of the service according to service usage information of a client; wherein the services refer to offline services or online services which are reserved with a client and used on the client;
processing, by the server, the reservation amount of the service and a usage-reservation ratio parameter of the service based on a characteristic value strategy to obtain a characteristic value of the service, comprising:
adjusting, by the server, the reservation amount of the service by virtue of a first factor to obtain a first parameter, the first factor being a logarithm operator or a ratio operator;
adjusting, by the server, the usage-reservation ratio parameter of the service by virtue of a second factor and a third factor to obtain a second parameter, the second factor and the third factor being power exponent operators; and
determining, by the server, the characteristic value of the service based on the first parameter and the second parameter;
wherein the usage-reservation ratio parameter of the service refers to a ratio of the usage amount of the service to the reservation amount of the service; the characteristic value of the service is configured to represent quality of the service and a recommendation degree of the service; and
calling, by the server, a graphical interface of the client to present a ranking result of the characteristic values of the plurality of services.

US Pat. No. 10,922,322

SYSTEMS AND METHODS FOR SPEECH-BASED SEARCHING OF CONTENT REPOSITORIES

Nuance Communications, In...

1. A method of searching for content in at least one content repository in response to a user voice query, the method comprising acts of:receiving the user voice query;
performing speech recognition on the user voice query to generate N best speech recognition results for the user voice query, wherein N is equal to one or more, and wherein the N best speech recognition results comprise a first speech recognition result;
performing a supervised search of the at least one content repository to identify a set of one or more supervised search results, wherein each one of the one or more supervised search results is associated with a score indicative of a predicted relevance of the one of the one or more supervised search results to the user voice query, wherein performing the supervised search comprises processing the first speech recognition result using one or more classifiers that classify the first speech recognition result into at least one class that identifies previously classified content in the at least one content repository;
performing an unsupervised search of the at least one content repository to identify a set of one or more unsupervised search results, wherein each one of the one or more unsupervised search results is associated with a score indicative of a predicted relevance of the one of the one or more unsupervised search results to the user voice query, wherein performing the unsupervised search comprises performing a word search of the at least one content repository using one or more words derived from the first speech recognition result; and
generating a set of combined results from among the set of one or more supervised search results and the set of one or more unsupervised search results based at least in part on the scores of the supervised search results and the scores of the unsupervised search results.

US Pat. No. 10,922,321

INTERPRETING USER QUERIES BASED ON DEVICE ORIENTATION

Google LLC, Mountain Vie...

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by the one or more processors, a query provided from a user device; and
obtaining, by the one or more processors, an approximate location and an approximate orientation of the user device;
determining a first geometric shape defined by a range measured from the approximate location, wherein the approximate location is approximately centered within the first geometric shape and surrounded by the first geometric shape;
extending a portion of the first geometric shape to form an extended portion of the first geometric shape that extends from the first geometric shape by an extended range that is greater than the range of the first geometric shape and in a direction of the approximate orientation of the user device, wherein the extended portion is centered on the approximate orientation of the user device and is less in degrees than the first geometric shape is in degrees;
obtaining, by the one or more processors, a set of entities comprising one or more entities, each entity in the set of entities being at least partially within the first geometric shape defined by the range measured from the approximate location of the user device or within the extended portion of the first geometric shape;
selecting, by the one or more processors, an entity from the set of entities; and
providing, by the one or more processors, a revised query based on the query and the entity.

US Pat. No. 10,922,320

SYSTEM AND METHOD FOR ANONYMIZING ADDRESS DATA

SAP SE, Walldorf (DE)

1. A non-transitory machine-readable medium storing a program executable by at least one processing unit of a device, the program comprising sets of instructions for:receiving, from an application, a first set of address data that describes a first geographic location and a request to anonym ize the first set of address data;
determining a first set of geo-location coordinates of the first geographic location based on the first set of address data;
determining a population class associated with the first set of address data;
determining a distance value based on the population class associated with the first set of address data;
determining a second set of geo-location coordinates based on the first set of geolocation coordinates and the distance value;
based on the second set of geo-location coordinates, determining a second set of address data that describes a second geographical location as an anonymized version of the first set of address data; and
sending the second set of address data to the application.

US Pat. No. 10,922,319

CONSISTENCY MITIGATION TECHNIQUES FOR REAL-TIME STREAMS

eBay Inc., San Jose, CA ...

12. A method comprising:reading, from a message queue, a message object having a snapshot identifier including a combination of a timestamp and a sequence counter;
adding the message object to an aggregating cache, the aggregating cache comprising a data structure that includes a linked list of message objects ordered based on respective snapshot identifiers, the adding of the message object to the aggregating cache including inserting the message object into the linked list;
applying, using one or more processors of a machine, an aggregating function to the message objects in the linked list, the applying of the aggregating function to the message objects yielding aggregated message objects;
persisting the aggregated message objects to a database, the persisting of the aggregated message objects to the database including writing a row to the database, the row including a result of the aggregating function; and
clearing the message objects from the aggregating cache based on the message objects being persisted to the database.

US Pat. No. 10,922,318

SYSTEMS AND METHODS FOR CACHING QUERIES AND QUERY RESULTS

Apollo Graph, Inc., San ...

1. A method of operating a proxy device for a logical endpoint device, the logical endpoint device capable of responding to electronically received query requests made in a particular query language, the logical endpoint device and proxy device capable of communicating via a communications network, the method comprising:electronically receiving at the proxy device one or more query requests directed to the logical endpoint device from one or more client devices capable of communicating via the communications network;
processing, utilizing at least one processor of the proxy device, a first query request of the one or more electronically received query requests to determine whether a particular result of the first query request is cacheable based at least in part on a particular cache policy of the logical endpoint device specified by one or more caching parameters via a network protocol of the communications network, the particular cache policy of the logical endpoint device specifying one or more cacheable portions and one or more non-cacheable portions of a schema of the particular query language, wherein the processing the first query request to determine whether the particular result of the first query request is cacheable comprises the at least one processor of the proxy device traversing particular paths and/or fields of the schema of the particular query language specified to be cacheable by the particular cache policy of the logical endpoint device; and
obtaining at the proxy device the particular result of the first query request from a cache responsive at least in part to a determination by the at least one processor of the proxy device that the particular result of the first query request is cacheable and responsive at least in part to the particular result of the first query request having been previously cached, wherein the processing the first query request and the obtaining the cached particular result of the first query request to occur without accessing the logical endpoint device.

US Pat. No. 10,922,317

SYSTEMS AND METHODS FOR DETERMINING IF A USER IS A MEMBER OF A DEFINED SEGMENT

Braze, Inc., New York, N...

1. A method of determining whether a user is member of a segment of users comprising a plurality of predetermined segment definitions, comprising:creating a database that includes a plurality of records, where each record includes a plurality of fields for storing information about a single user's characteristics and behavior;
populating the fields of the database records with any available information about the characteristics and/or behavior of the corresponding users;
creating and storing a plurality of predetermined segment definitions, where each predetermined segment definition can be evaluated using data stored in one or more of the fields of a user's database record to determine if the user is a member of the segment;
updating the information in the fields of the users' database records as new information about the users' characteristics and/or behavior is received;
ordering selected ones of the plurality of predetermined segment definitions based on predetermined criteria to generate a segment definition comprising the selected ones of the plurality of predetermined segment definitions; and
determining, upon request, if a user is a member of the segment definition comprising the selected ones of the plurality of predetermined segment definitions by evaluating each of the selected ones of the plurality of predetermined segment definitions in the sequence in which they are ordered using information in the user's database record, wherein evaluation of the selected ones of the plurality of predetermined segment definitions is halted when evaluation of one of the predetermined segment definitions excludes the user from the segment definition comprising the selected ones of the plurality of predetermined segment definitions.

US Pat. No. 10,922,316

USING COMPUTING RESOURCES TO PERFORM DATABASE QUERIES ACCORDING TO A DYNAMICALLY DETERMINED QUERY SIZE

Amazon Technologies, Inc....

1. A system, comprising:a memory to store program instructions which, if performed by at least one processor, cause the at least one processor to perform a method to at least:
receive a database query;
responsive to the database query:
apply a size classifier to features of query plan generated to perform the database query, wherein the size classifier that is trained from a plurality of prior database queries according to a machine learning technique to output a probability that indicates a size of the database query; and
perform the database query using one or more computer resources allocated to perform database queries of the indicated size of the database query.

US Pat. No. 10,922,315

UNIFIED OPTIMIZATION OF ITERATIVE ANALYTICAL QUERY PROCESSING

SAP SE

1. A computer-implemented method comprising:receiving an intermediate representation of an input procedure comprising a plurality of statements, wherein the plurality of statements comprises a plurality of query statements, and a plurality of imperative statements comprising a loop;
enumerating a plurality of query execution plan candidates for the input procedure via the intermediate representation of the input procedure, wherein the enumerating comprises:
considering a plurality of query statements as sink operation candidates for a loop;
performing at least one sink operation on a query statement, wherein the at least one sink operation moves the query statement inside a loop boundary; and
excluding a sink operation from consideration based on a data dependency between at least two statements identified in a data dependency graph;
performing query inlining that combines at least two query statements;
estimating computing execution resource demands for respective of the plurality of query execution plan candidates; and
determining an optimal query execution plan for the input procedure, wherein the determining comprises finding a candidate query execution plan having a lowest estimated computing execution resource demand.

US Pat. No. 10,922,314

INCREMENTALLY UPDATING A DATABASE STATISTIC

MICRO FOCUS LLC, Santa C...

1. A non-transitory computer readable storage medium storing instructions that, when executed by a computer, cause the computer to:access a plurality of datasets sampled from a column of a database at different times;
compare a first skew associated with a first dataset of the plurality of datasets to a second skew associated with a second dataset of the plurality of datasets, based on a comparison of a first value for a statistic derived from the first dataset with a second value for the statistic derived from the second dataset, wherein the first skew or the second skew is a degree of change in a respective dataset;
based on the comparison of the first skew to the second skew, selectively combine a subset of data from the first dataset and a subset of data from the second dataset to provide a combined subset of data;
use the combined subset of data to determine a third value for the statistic;
based on the comparison of the first skew to the second skew, use the second value or the third value for the statistic to estimate a count of unique values in the column of the database;
receive a query to retrieve data from the database;
generate an execution plan for the query based on the count of unique values in the column; and
execute the query based on the execution plan to provide query results.

US Pat. No. 10,922,313

IMPLEMENTING COMPOSITE CUSTOM INDICES IN A MULTI-TENANT DATABASE

salesforce.com, inc., Sa...

1. A computer-implemented method of improving a query, the computer system having one or more processors and at least one accessible memory device configurable to provide a multitenant database system, the method comprising:maintaining, with the one or more processors, in a database of the multitenant database system having separate tenant-level data tables, contextual metadata for multiple tenants of the multitenant database system;
receiving, with the one or more processors, an original query from a user associated with a tenant, the original query associated with data accessible by the tenant stored in the multitenant database system, wherein the multi-tenant database system utilizes a two-column custom index associated with data stored therein;
retrieving, with the one or more processors from the multitenant database system, tenant-level contextual metadata associated with the data accessible by the tenant, wherein at least a portion of the data accessible by the tenant is stored in a shared table that is shared between tenants within the multi-tenant database system;
determining, with the one or more processors, a tenant-selective query syntax, by analyzing metadata generated from information about the tenant and metadata generated from the data accessible only by the tenant;
generating, with the one or more processors, an improved query, wherein the improved query is based at least in part upon the original query and the tenant-selective query syntax, and the improved query is generated prior to submission to an underlying database manager, wherein the query is rewritten to use the ordering of the two-column custom index; and
executing, with the one or more processors, the improved query on data stored in the database of the multitenant database system.

US Pat. No. 10,922,312

OPTIMIZATION OF DATA PROCESSING JOB EXECUTION USING HASH TREES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:generating a hash tree for an initial dataset, the generating using computed hashes of records of the initial dataset, the records of the initial dataset assigned to blocks of the initial dataset;
executing a data processing job against the initial dataset, the data processing job comprising a set of calculations against data of the records of the initial dataset;
based on a modification to the initial dataset to produce a modified dataset, generating a hash tree for the modified dataset using computed hashes of records of the modified dataset, the records of the modified dataset assigned to blocks of the modified dataset;
comparing the hash tree for the initial dataset to the hash tree for the modified dataset, and identifying, based on the comparing, one or more blocks of the modified dataset that are updated compared to the initial dataset; and
re-executing the data processing job against the modified dataset, wherein the re-executing performs only those calculations, of the set of calculations, that use data of the records of the identified one or more blocks that are updated compared to the initial dataset, and does not perform other calculations, of the set of calculations, that do not use data of the records of the one or more blocks.

US Pat. No. 10,922,311

DYNAMIC UPDATING OF QUERY RESULT DISPLAYS

Deephaven Data Labs LLC, ...

1. A method for dynamically updating a remote computer data system data object, the method comprising:exporting, with a processor, a data object to a client separate from the processor and adding an exported data object handle to an update propagation graph (UPG) of nodes, the nodes representing data object dependencies, the exported data object handle being added as a child of the data object in the UPG of nodes, the exported data object handle linking the data object to the exported data object on the client, wherein the data object includes one or more data values structured along one or more dimensions of the data object;
determining, with a processor, that a state of a logical clock has transitioned to a state indicating a start of a data object refresh cycle, the logical clock comprising a step value and the state, the state being selected from a group comprising the state indicating the start of a data object refresh cycle and a state indicating an idle state;
receiving notifications with a listener device;
processing with a processor any received notifications through the update propagation graph (UPG) of nodes, the nodes representing data object dependencies;
transmitting, with the processor, data object change notifications to any nodes corresponding to data objects affected by the received notifications, wherein one or more of the nodes, in turn, send update notifications to one or more downstream data sources, the one or more downstream data sources including the exported data object handle linking the data object to the exported data object on the client such that the one or more of the nodes sending update notifications includes sending one or more of the update notifications to the client to update the exported data object specific to the client separate from the processor;
applying data object notifications to respective data objects to generate updated data objects;
determining that one of the updated data objects has a link to the exported data object on the client and sending one or more data object update notifications to the client corresponding to the updated data object;
after the determining, transitioning the state of the logical clock to the state indicating an idle state and updating the step value of the logical clock to a different value;
receiving, at the client, one or more data object update notifications, the data object update notifications include one or more of updated data and updated indexing information; and
propagating, with the client, changes through a UPG on the client, the client being remote from the processor and the UPG on the client being different than the UPG of nodes processed by the processor,
wherein a component is configured to store a hard reference to the data object for each exported data object handle such that the data object persists when there is at least one hard reference to the data object corresponding to the exported data object handle, and
wherein the hard reference is removed when the client disconnects or when the client releases a reference to the data object.

US Pat. No. 10,922,310

MANAGING DATA RETRIEVAL IN A DATA GRID

Red Hat, Inc., Raleigh, ...

1. A data grid comprising:a first node configured to receive a communication and responsively switch from (i) a first setting in which the first node is configured to respond to a request for data from a client device by locally serving a first version of the data to the client device, to (ii) a second setting in which the first node is configured to respond to the request for the data from the client device by obtaining a second version of the data from a remote node in the data grid and forwarding the second version of the data to the client device;
a second node that is remote from the first node; and
a third node that is remote from the first node and the second node, the third node including:
a processing device; and
a memory device on which instructions executable by the processing device are stored for causing the processing device to:
receive a write command from the second node for storing the second version of the data in the data grid; and
in response to receiving the write command:
determine, based on information in a database, that the first node in the data grid is configured to locally serve the first version of the data, wherein the information in the database specifies which node in the data grid is configured to locally serve the data;
in response to determining that the first node is configured to locally serve the first version of the data, transmit the communication for causing the first node to switch from the first setting to the second setting; and
update the database to indicate that the second version of the data is to be locally served by the second node.

US Pat. No. 10,922,309

DISTRIBUTED LEDGER INTERACTION SYSTEM AND METHODS

DRAGONCHAIN, INC., Belle...

1. A transistor-based distributed ledger interaction method comprising:invoking transistor-based circuitry configured to obtain a first value of a first quantified user-identified variable, wherein said first quantified user-identified variable is obtained as an upstream data element output from a first version of an upstream code sequence based on a first value of an input data element;
invoking transistor-based circuitry configured to obtain a first value of a first output data element based on said first value of said first quantified user-identified variable, wherein a manually triggered first execution of a first version of a primary code sequence generated said first value of said first output data element based on said first value of said first quantified user-identified variable and wherein said first execution of said first version of said primary code sequence was configured to result from human input generated after said first quantified user-identified variable was changed to said first value of said first quantified user-identified variable;
invoking transistor-based circuitry configured to establish a particular second version of said primary code sequence so as to be triggered automatically by a subsequent change to said first value of said first quantified user-identified variable;
invoking transistor-based circuitry configured to trigger a first execution of said particular second version of said primary code sequence by changing said first value of said first quantified user-identified variable to a second value of said first quantified user-identified variable and so as to change said first value of said first output data element to said second value of said output data element; wherein said particular second version of said primary code sequence comprises one or more smart contracts; wherein an execution of said one or more smart contracts is triggered by changing said first value of said first quantified user-identified variable to said second value of said first quantified user-identified variable; and wherein a cryptographic utility token transfer occurs as a component of said execution of said one or more smart contracts triggered by changing said first value of said first quantified user-identified variable to said second value of said first quantified user-identified variable.

US Pat. No. 10,922,308

PREDICTIVE DETERMINATION OF CONSTRAINT DATA FOR APPLICATION WITH LINKED DATA IN GRAPH-BASED DATASETS ASSOCIATED WITH A DATA-DRIVEN COLLABORATIVE DATASET PLATFORM

data.world, Inc., Austin...

1. A method comprising:receiving subsets of data as columnar data associated with a data arrangement into a collaborative dataset consolidation system at ingestion, the data arrangement being a tabular data arrangement including each of the subsets of data as a column;
forming a graph-based data arrangement from a subset of data in a column based on a portion of the ingested data;
identifying an ontological reference associated with the graph-based data arrangement;
predicting a subset of constraint data to validate the graph-based data arrangement;
analyzing the graph-based data arrangement against the subset of constraint data to determine an action, at least one action includes validating data in the graph-based data arrangement and applying the aggregated constraint data to validate the ingested data, validating the ingested data, and integrating the ingested data as graph data into the graph data arrangement responsive to the aggregated constraint data, identifying a plurality of user accounts associated with the subsets of constraint data, and generating electronic notifications to each of the user accounts including data specifying implementation of a corresponding one of the subsets of constraint data;
integrating graph-based data arrangement into a graph data arrangement responsive to determining data representing a validation;
identifying classification types associated with a plurality of columns of the ingested data;
determining subsets of constraint data associated with the classification types associated with different portions of the graph data arrangement; and
aggregating the subsets of constraint data to form aggregated constraint data.

US Pat. No. 10,922,307

AUTOMATED TRANSACTION ENGINE

NextWorld, LLC, Denver, ...

1. A system comprising:one or more computer readable storage media;
a processing system operatively coupled with the one or more computer readable storage media; and
program instructions stored on the one or more computer readable storage media for operating an automated transaction engine, wherein the program instructions, when read and executed by the processing system, direct the processing system to at least:
in a transaction engine, receive an activity snapshot from an application running on a client device, wherein the application monitors transaction activity on the client device and generates activity snapshots of the transaction activity in response to triggering events;
in the transaction engine, assign a transaction identifier to the activity snapshot identifying a transaction to which the activity snapshot pertains;
in the transaction engine, associate the activity snapshot with a workflow state of the transaction using business logic; and
in the transaction engine, generate a transient record that links the activity snapshot and the workflow state to the transaction;
wherein the triggering events include one or more of an expiration of a time interval, a logical transaction boundary, a metadata defined trigger point, and a metadata boundary.

US Pat. No. 10,922,306

SYSTEMS AND METHODS FOR AUTOMATED BULK USER REGISTRATION SPANNING BOTH A CONTENT MANAGEMENT SYSTEM AND ANY SOFTWARE APPLICATIONS EMBEDDED THEREIN

AON GLOBAL OPERATIONS PLC...

1. A system for supporting bulk user registration within an analytics ecosystem, comprising:a bulk user setup interface for
presenting, to an administrator on a computing device, one or more controls for providing a user registration request, wherein providing the user registration request comprises entering, for each user of a plurality of users of the analytics ecosystem, respective user information, the user information comprising user identification information, user attribute information, and user role information, and
providing, to the analytics ecosystem via a network, the user registration request including the user information for the plurality of users,
wherein the bulk user setup interface is provided, at least in part, via a content management system; and
a bulk user setup request handler registered as an interface for the content management system, the bulk user setup request handler for
receiving the user registration request from the computing device,
validating the user registration request, wherein validating comprises confirming values in the role information for each user of the plurality of users and values in the attribute information for each user of the plurality of users are valid values for the content management system,
supplying, to the content management system, individual registration requests, each registration request comprising identification information, role information, and attribute information for one of the plurality of users,
transforming the user registration request for ingestion by a third-party system, wherein transforming comprises converting at least one of the role information and the attribute information to match registration parameters of the third-party system, and
supplying the transformed user information to the third-party system.

US Pat. No. 10,922,305

MAINTAINING STORAGE PROFILE CONSISTENCY IN A CLUSTER HAVING LOCAL AND SHARED STORAGE

VMWARE, INC., Palo Alto,...

1. A method comprising:accessing, by a computer processor, a first task list comprising a plurality of tasks, tasks in the plurality of tasks being operations that configure a target host machine to bring the target host machine into conformance with a reference host machine;
when a task from the first task list does not specify to add or delete configuration information corresponding to a storage device to or from the target host machine, then adding, by the computer processor, the task to a second task list; and
when a task in the first task list specifies to add or delete configuration information corresponding to a storage device to or from the target host machine, then selectively adding, by the computer processor, the task to the second task list depending on whether the storage device associated with the task is accessible by the reference host machine,
wherein the second task list is used in place of the first task list, wherein tasks in the second task list are operations to configure the target host machine to bring the target host machine into conformance with the reference host machine.

US Pat. No. 10,922,304

DISTRIBUTED DATA PROTECTION MANAGEMENT IN MULTI-CLOUD COMPUTING ENVIRONMENT

EMC IP Holding Company LL...

1. A method comprising:in a multi-cloud computing environment associated with an enterprise comprising two or more cloud platforms with one or more respective data protection ecosystems, maintaining a distributed ledger system comprising a plurality of nodes operatively coupled in a peer-to-peer communications protocol, wherein a given one of the data protection ecosystems is operatively coupled to a given one of the plurality of nodes of the distributed ledger system;
managing one or more data sets processed by the one or more data protection ecosystems in association with the distributed ledger system, wherein managing comprises storing transaction data associated with the processing of the one or more data sets on the distributed ledger system; and
enabling a multi-cloud environment-wide view of the stored transaction data representing processing activities of the one or more data sets across the two or more cloud platforms;
wherein the one or more data protection ecosystems comprise first and second data protection ecosystems respectively associated with first and second cloud platforms;
wherein the first data protection ecosystem is operatively coupled to a first node of the distributed ledger system and wherein the second data protection ecosystem is operatively coupled to a second node of the distributed ledger system;
wherein managing the one or more data sets comprises at least the first and second nodes of the distributed ledger system accessing the stored transaction data;
wherein the first node is a local blockchain node for the first cloud platform and the second node is a local blockchain node for the second cloud platform;
wherein the first node is configured to receive event data associated with the processing of one or more data sets by the first data protection ecosystem and to convert the event data into transaction data for storage in the first node;
wherein the second node is configured to receive event data associated with the processing of one or more data sets by the second data protection ecosystem and to convert the event data into transaction data for storage in the second node;
wherein managing the one or more data sets comprises at least one of the first node accessing the stored transaction data of the second node and the second node accessing the stored transaction data of the first node; and
wherein the method is implemented via one or more processing devices each comprising a processor coupled to a memory.

US Pat. No. 10,922,303

EARLY DETECTION OF CORRUPT DATA PARTITION EXPORTS

Amazon Technologies, Inc....

1. A system, comprising:a plurality of nodes of a distributed storage system, wherein at least some of the nodes store database partitions of a database,
wherein at least one of the nodes is configured to:
send a first copy of one of the database partitions to a recipient node, wherein the recipient node is a node of the distributed storage system or a node of another storage system;
validate, responsive to sending the first copy, a second copy of the database partition, wherein the second copy is stored in a data storage of the at least one node; and
based on a determination that the second copy of the database partition stored in the data storage cannot be validated, cause the first copy of the database partition to be invalidated at the recipient node.

US Pat. No. 10,922,302

DATA TIME STAMPS

Vital Connect, Inc., San...

1. A system, comprising:a first device configured to:
collect a data sample,
transmit a device timing table, and
transmit the collected data sample,
wherein the first device includes a crystal oscillator,
wherein the device timing table includes:
a powered-on device tick count recorded, per a frequency of the crystal oscillator, when the first device is powered-on,
a powered-off device tick count recorded, per the frequency of the crystal oscillator, when the first device is powered-off, and
a data sample tick count for the collected data sample;
a second device configured to:
receive the device timing table and the collected data sample from the first device, and
determine a real-time clock time stamp for the collected data sample based on the device timing table;
wherein the determine the real-time clock time stamp for the collected data sample based on the device timing table includes:
determine a real-time tick-rate for the first device,
assign a real-time time stamp to the powered-on device tick count,
determine a difference by subtracting the powered-on device tick count from the tick-count for the respective data samples, and
calculate the real-time clock time stamp for the collected data sample by utilizing the real-time tick-rate for the first device and the difference between the data sample tick count for the collected data sample and the powered-on device tick count.

US Pat. No. 10,922,301

APPARATUS, COMPUTER PROGRAM, AND METHOD FOR TRIGGER-BASED TRACKING OF DATABASE MODIFICATIONS

AMDOCS DEVELOPMENT LIMITE...

1. A computer program product comprising computer executable instructions stored on a non-transitory computer readable medium that when executed by a processor instruct the processor to:identify, by a system, one or more input tables of a database;
generate, by the system, one or more triggers for the one or more input tables, the one or more triggers executable to cause the system to catch operations that modify the one or more input tables of the database;
install, by the system, the one or more triggers in connection with an application configured for modifying the database;
in response to at least one of the one or more triggers being triggered by the application, track, by the system, one or more modifications made to the one or more input tables of the database by the application, including for each of the one or more modifications made to the one or more input tables of the database by the application:
insert, into a log table by the system, a record of the modification that includes a timestamp and a transaction sequence number;
extract, by the system from the log table, a subset of the records in the log table that reflect the latest data in the database, using the transaction sequence number stored in each record of the log table;
pack, by system into a package file, the subset of the records extracted from the log table;
validate, by the system, the package file against a database schema of each of a plurality of additional databases to which the package file is to be deployed;
responsive to validating the package file, simultaneously deploy, by the system, the package file to the plurality of additional databases for making the modifications recorded in the package file to each of the plurality of additional databases;
wherein the application, after the installation of the one or more triggers, is capable of switching the system between a first mode of operation for tracking the one or more modifications made to the one or more input tables of the database and a second mode of operation for avoiding the tracking.

US Pat. No. 10,922,300

UPDATING SCHEMA OF A DATABASE

VMware, Inc., Palo Alto,...

1. A method for updating schema of a database, the method comprising:initiating execution of an application in a computing environment, wherein the application persists data in a database, wherein the schema of the database is updatable responsive to an update of the application;
during the initiating execution of the application, determining whether the schema is updated, the determining whether the schema is updated comprising:
comparing a version of the schema executing in the database to a version of the schema maintained in the application, wherein the version of the schema executing in the database is in code of the database and the version of the schema maintained in the application is in code of the application; and
provided the version of the schema executing in the database is different than the version of the schema maintained in the application, determining that the schema is updated;
responsive to the determining that the schema is updated:
receiving a first instance of the schema executing in the database;
receiving a second instance of the schema maintained in the application;
comparing the first instance of the schema to the second instance of the schema;
determining a difference between the first instance of the schema and the second instance of the schema; and
updating the first instance of the schema to incorporate the difference between the first instance of the schema and the second instance of the schema.

US Pat. No. 10,922,299

CORRELATING MULTIPLE TABLES IN A NON-RELATIONAL DATABASE ENVIRONMENT

The Von Drakk Corporation...

1. A method for correlating multiple tables in a non-relational database environment comprising the steps of:a) Initiating a computer software application comprising a database management system application capable of creating at least six tables including at least three data tables, at least one index table, at least one stitch object table, and at least one stitch map object table, the at least six tables each having a unique corresponding table identifier and the at least six tables including:
i. a first data table comprising a plurality of first data table records, the plurality of first data table records comprising a plurality of first data table fields, the plurality of first data table fields having a plurality of associated first data table field names and the plurality of first data table fields storing a plurality of first data table field values;
ii. a second data table comprising a plurality of second data table records, the plurality of second data table records comprising a plurality of second data table fields, the plurality of second data table fields having a plurality of associated second data table field names and the plurality of second data table fields storing a plurality of second data table field values;
iii. a third data table comprising a plurality of third data table records, the plurality of third data table records comprising a plurality of third data table fields, the plurality of third data table fields having a plurality of associated third data table field names and the plurality of third data table fields storing a plurality of third data table field values;
iv. an index table, the index table comprising a plurality of index table records, each index table record comprising an index data value field and an index data table name field;
v. a stitch object table, the stitch object table comprising a plurality of stitch object key-object pairs, each stitch object key-object pair comprising a stitch object key value and a corresponding stitch object data object, the stitch object data object comprising a table of unique table identifiers and corresponding unique column identifiers associated with the stitch object key value; and,
vi. a stitch map object table, the stitch map object table comprising a plurality of stitch map object key-object pairs, each stitch map object key-object pair comprising a stitch map object key value and a corresponding stitch map object data object, the stitch map object data object comprising a table of unique table identifiers and corresponding unique row identifiers associated with the stitch map object key value;
b) initiating the computer software application comprising running the computer software application on a computer;
c) Creating a first index table in the non-relational database management system application comprising a plurality of first index table records;
d) Designating the first data table as the current data table;
e) Designating a first data table field record as the current data record;
f) Designating a current value as the first data table field value of the first data table record of the first data table;
g) Searching the first index table to determine whether the current value is present in the first index value field of any of the plurality of first index table records;
h) Adding a new first index table record to the first index table, storing the current value in the first index value field of the new first index table record, and storing the unique corresponding table identifier of the current data table in the first index table name field of the new first index table record if the current value is not present in the first index value field of any of the plurality of first index table records;
i) Appending the unique corresponding table identifier of the current data table to the first table association field of the first index table record containing the current value if the current value is present in the first index value field of any of the plurality of first index table records;
j) Determining whether the current data record contains any values which have not been evaluated as in steps (g) through (i) and if so, selecting a next value from the current data record which has not been evaluated as the current value and returning to step (g), otherwise moving to the next step;
k) Determining whether the current data table contains any records containing any values which have not been evaluated as in steps (g) through (i) and if so, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (g), otherwise moving to the next step;
l) Determining whether any of the plurality of data tables contain any records containing any values which have not been evaluated as in steps (g) through (i), and if so designating a next data table containing at least one unevaluated value as the current data table, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (g), otherwise moving to the next step;
m) Creating a first stitch object table in the non-relational database management system application comprising a plurality of first stitch object table key-object pairs, each of the first stitch object table key-object pairs containing a first stitch object key value and a first stitch object data object;
n) Designating the first data table as the current data table;
o) Designating a first data table field record as the current data record;
p) Designating a current value as the first data table field value of the first data table record of the first data table;
q) Searching the first stitch object table to determine whether the current value is present in the first stitch object key value field of any of the plurality of first stitch object key-object pairs;
r) Adding a new first stitch object table key-object pair to the first stitch object table, storing the current value in the first stitch object key value field of the new first stitch object table key-object pair, and storing the unique corresponding table identifier of the current data table and the data table field name of the data table field corresponding to the current value in the first stitch object table data object of the new first stitch object table key-object pair if the current value is not present in the first stitch object key value field of any of the plurality of first stitch object table key-object pairs;
s) Adding the unique corresponding table identifier of the current data table and the data table field name of the data table field corresponding to the current value in the first stitch object table data object of an existing first stitch object table key-object pair if the current value is present in the first stitch object key value field of any of the plurality of first stitch object table key-object pairs but the unique corresponding table identifier of the current data table and the data table field name of the data table field corresponding to the current value are not present in that first stitch object table key-object pair;
t) Determining whether the current data record contains any values which have not been evaluated as in steps (q) through (t) and if so, selecting a next value from the current data record which has not been evaluated as the current value and returning to step (q), otherwise moving to the next step;
u) Determining whether the current data table contains any records containing any values which have not been evaluated as in steps (q) through (t) and if so, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (q), otherwise moving to the next step;
v) Determining whether any of the plurality of data tables contain any records containing any values which have not been evaluated as in steps (q) through (t), and if so designating a next data table containing at least one unevaluated value as the current data table, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (q), otherwise moving to the next step;
w) Creating a first stitch map object table in the non-relational database management system application comprising a plurality of first stitch object table key-object pairs;
x) Designating the first data table as the current data table;
y) Designating a first data table field record as the current data record;
z) Designating a current value as the first data table field value of the first data table record of the first data table;
aa) Searching the first stitch map object table to determine whether the current value is present in the first stitch map object key value field of any of the plurality of first stitch map object table key-object pairs;
bb) Adding a new first stitch map object table key-object pair to the first stitch map object table, storing the current value in the first stitch map object key value field of the new first stitch map object table key-object pair, and storing the unique corresponding table identifier of the current data table and a corresponding current data table row number corresponding to the current value in the first stitch map object table data object of the new first stitch map object table key-object pair if the current value is not present in the first stitch map object key value field of any of the plurality of first stitch map object table key-object pairs;
cc) Adding the unique corresponding table identifier of the current data table and the corresponding current data table row number corresponding to the current value in the first stitch map object table data object of an existing first stitch map object table key-object pair if the current value is present in the first stitch map object key value field of any of the plurality of first stitch map object table key-object pairs but the unique corresponding table identifier of the current data table and the data table field name of the data table field corresponding to the current value are not present in that first stitch map object table key-object pair;
dd) Determining whether the current data record contains any values which have not been evaluated as in steps (aa) through (cc) and if so, selecting a next value from the current data record which has not been evaluated as the current value and returning to step (aa), otherwise moving to the next step;
ee) Determining whether the current data table contains any records containing any values which have not been evaluated as in steps (aa) through (cc) and if so, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (aa), otherwise moving to the next step;
ff) Determining whether any of the plurality of data tables contain any records containing any values which have not been evaluated as in steps (aa) through (cc), and if so designating a next data table containing at least one unevaluated value as the current data table, designating a next current data record from the current data table containing at least one unevaluated value and designating an unevaluated data value in the next current data record as the current value and returning to step (aa), otherwise ending the method.

US Pat. No. 10,922,298

SYSTEM AND METHOD FOR INDEXING TIME-SERIES-BASED DATA

WALMART APOLLO, LLC, Ben...

1. A method comprising:receiving, at a computer server from a computing device, an inquiry from a user, the inquiry comprising an event having a time period and a changed attribute;
retrieving, by the computer server from a computer database, at least one result event indicator, based on the time period and the changed attribute, from a hash table stored in the computer database, wherein:
the hash table comprises a hash function, the hash function being configured to locate the at least one result event indicator in the hash table based on the time period and a name of the changed attribute;
the at least one result event indicator comprises information about one or more matched event records in one or more event databases;
the one or more event databases store one or more event records including the one or more matched event records; and
each of the one or more event records comprises an updated column name and a timestamp; and
retrieving, by the computer server, a search result based on the inquiry and the one or more matched event records associated with the at least one result event indicator.

US Pat. No. 10,922,297

GARBAGE COLLECTION FOR IN-MEMORY ROW STORAGE

SAP SE, Walldorf (DE)

1. A system comprising:at least one processor; and
at least one memory storing instructions which, when executed by the at least one processor, cause operations comprising:
processing a plurality of database statements affecting a plurality of rows in an in-memory row store, the plurality of database statements including a database statement comprising a first database transaction;
registering the database statement at a start of execution of the database statement, the start of execution occurring at a first time;
unregistering the registered database statement at an end of execution of the database statement;
determining, from among the plurality of database statements, a second time at which execution of an oldest currently registered database statement was started;
assigning a garbage collection thread to a second database transaction committed at a third time, the second database transaction affecting at least one row of the plurality of rows;
activating, when the third time is less than the second time, the garbage collection thread to reclaim memory within the in-memory row store;
in response to the activating, determining, by the garbage collection thread, whether a current row version is a latest committed row version of the at least one row affected by the second database transaction and whether the current row version is transactionally active based on an indicator indicative of the transactionally active state; and
in response to determining the current row version is the latest row version and the current row version is not transactionally active, reclaiming, by the garbage collection thread, the current row version from the in-memory row store by removing the at least one row from the in-memory row store.

US Pat. No. 10,922,296

IN-MEMORY ROW STORAGE DURABILITY

SAP SE, Walldorf (DE)

1. A system comprising:at least one processor; and
at least one memory storing instructions which, when executed by the at least one processor, cause operations comprising:
processing a database transaction affecting at least a first row in an in-memory row store and at least a second row in a persistent page store, the database transaction comprising a plurality of relational database statements;
logging, as part of the processing and prior to committing the database transaction, changes to the second row within a page store transaction log;
logging, as part of committing the database transaction, a final aggregated result of the first row within a row store transaction log that is separate and distinct from the page store transaction log, wherein changes to the first row caused by the database transaction are inserted concurrently at different non-overlapping physical locations in the row store transaction log; and
altering at least a portion of the in-memory row store based on accessing the row store transaction log.

US Pat. No. 10,922,295

MINIMIZE GARBAGE COLLECTION IN HL7 MANIPULATION

Health Catalyst, Inc.

1. A method comprising:receiving a Health Level-7 (HL7) message;
creating, in a memory, a hierarchical data structure of the HL7 message including one or more fragment objects hierarchically organized, a first fragment object in the hierarchical data structure representing a fragment of the HL7 message and specifying a start index and an end index of the fragment in the HL7 message;
creating a second fragment object for the fragment, the second fragment object specifying a start index and an end index of a storage location storing an updated value of the fragment; and
modifying the HL7 message by replacing the first fragment object with the second fragment object in a child list of a fragment object representing a parent of the fragment.

US Pat. No. 10,922,294

METHODS AND SYSTEMS FOR FAST SET-MEMBERSHIP TESTS USING ONE OR MORE PROCESSORS THAT SUPPORT SINGLE INSTRUCTION MULTIPLE DATA INSTRUCTIONS

Oracle International Corp...

1. A method comprising:storing, in a particular column of a database table, encoded column values that include duplicate values and that have been encoded using an encoding dictionary;
generating a dictionary bit-vector, wherein each bit in the dictionary bit-vector:
has a position, within the dictionary bit-vector, that corresponds to a position, within said encoding dictionary, of a corresponding distinct dictionary entry from said encoding dictionary, and
has a bit value that indicates whether the corresponding distinct dictionary entry represents a value that satisfies a search condition;
copying a first value into a first subregister and a second value into a second subregister;
wherein the first subregister and the second subregister are subregisters in a first single SIMD register;
wherein the first value corresponds with a first column value in a first row of the particular column of the database table, and the second value corresponds with a second column value in a second row of the particular column of the database table;
gathering a first bit from the dictionary bit-vector and a second bit from the dictionary bit-vector based on the first value in the first subregister and the second value in the second subregister, respectively;
determining whether the first column value satisfies the search condition based on the first bit and whether the second column value satisfies the search condition based on the second bit.

US Pat. No. 10,922,293

COMPUTER-BASED DATA COLLECTION, MANAGEMENT, AND FORECASTING

Blackhawk Network, Inc., ...

4. A data collection, management, and forecasting computer system comprising:a datastore
one or more processors; and
one or more non-transitory computer readable memory storing instructions which when executed by the one or more processors causes the computer system to reduce a data storage capacity requirement for the computer system and increase the one or more processors' processing speed by:
collecting historical data for a plurality of items;
storing the historical data for a plurality of items in a first part of the datastore;
categorizing each of the plurality of items;
storing a categorization of each of the plurality of items in a second part of the datastore;
assigning at least one of the plurality of items as an index item for at least another of the plurality of items, wherein the assigning enables forecasting a value, wherein forecasting the value comprises:
(1) use a first factor and a second factor with reference to a first context parameter of the plurality of context parameters to calculate the forecast value of the one of the plurality of items needed over the future period of time, if a period of time for the historical data collected for the one of the plurality of items needed over the future period of time with reference to the first context parameter is above a first threshold, wherein the first factor and the second factor are related to the plurality of items,
(2) use the first factor of the one of the plurality of items needed over the future period of time with reference to the first context parameter of the plurality of context parameters and using a second factor of the index item with reference to the first context parameter, to calculate the forecast value of the one of the plurality of items needed over the future period of time, if the period of time for the historical data collected for the one of the plurality of items needed over the future period of time is below the first threshold with reference to the first context parameter and above a second threshold with reference to the first context parameter, and if a period of time for the historical data collected for the index item with reference to the first context parameter is greater than a third threshold;
(3) use the first factor of the one of the plurality of items needed over the future period of time with reference to the first context parameter of the plurality of context parameters and using the second factor of the index item with reference to an index context parameter of the plurality of context parameters, to calculate the forecast value of the one of the plurality of items needed over the future period of time, if the period of time for the historical data collected for the one of the plurality of items needed over the future period of time is below the first threshold with reference to the first context parameter and above the second threshold with reference to the first context parameter, and if the period of time for the historical data collected for the index item with reference to the first context parameter is less than the third threshold;
(4) use the first factor of the index item with reference to the first context parameter and using the second factor of the index item with reference to the first context parameter, to calculate the forecast value of the one of the plurality of items needed over the future period of time, if the period of time for the historical data collected for the one of the plurality of items needed over the future period of time is below the first threshold with reference to the first context parameter and below the second threshold with reference to the first context parameter, and if the period of time for the historical data collected for the index item with reference to the first context parameter is greater than the third threshold;
(5) use the first factor of the index item with reference to the first context parameter and using the second factor of the index item with reference to the index context parameter, to calculate the forecast value of the one of the plurality of items needed over the future period of time, if the period of time for the historical data collected for the one of the plurality of items needed over the future period of time is below the first threshold with reference to the first context parameter and below the second threshold with reference to the first context parameter, if the period of time for the historical data collected for the index item with reference to the first context parameter is less than the third threshold, and if the period of time for the historical data collected for the index item with reference to the first context parameter is greater than a fourth threshold; or
(6) use the first factor of the index item with reference to the index context parameter and using the second factor of the index item with reference to the index context parameter, to calculate the forecast value of the one of the plurality of items needed over the future period of time, if the period of time for the historical data collected for the one of the plurality of items is below the first threshold with reference to the first context parameter and below the second threshold with reference to the first context parameter, if the period of time for the historical data collected for the index item with reference to the first context parameter is less than the third threshold, and if the period of time for the historical data collected for the index item with reference to the first context parameter is less than the fourth threshold,
collecting data for a plurality of context parameters related to at least one of the plurality of items;
storing the historical data for the plurality of context parameter in a third part of the datastore; and
forecasting a value for one of the plurality of items needed over a future period of time.

US Pat. No. 10,922,292

METAMORPHIC STORAGE OF PASSCODES

Webcloak, LLC, Irvine, C...

1. A system for securing sensitive data, comprising:a database storing a first data storage scheme and a second data storage scheme,
wherein each of the first and second data storage schemes denotes at least one location for storing at least a portion of the sensitive data within a data block object, and
wherein each data storage scheme comprises a plurality of random numbers, each of which corresponds to one of the at least one location for storing the sensitive data within the data block object;
a security controller module comprising one or more processors and software instructions that when executed by the one or more processors, program the processor to perform the following steps:
instantiating a data block object for storing the sensitive data,
wherein a first byte and a last byte of the data block object are assigned unique identifiers; and
wherein the plurality of byte addresses denoted by the first data storage scheme and the plurality of byte addresses denoted by the second data storage scheme are non-overlapping;
storing the sensitive data within the data block object according to the first data storage scheme, wherein the security controller module is programmed to store the sensitive data within the data block object according to the first data storage scheme by:
dividing the sensitive data into a plurality of chunks; and
respectively storing the plurality of chunks in the data block object at the byte addresses denoted by a plurality of random numbers of the first storage scheme, wherein the plurality of random numbers is at least twice the maximum size of the sensitive data and additionally includes a size of a delimiter;
providing access to the data block object;
generating a new scramble table; and
automatically morphing the data block object by storing the sensitive data within the data block object according to the second data storage scheme, wherein the automatic morphing of the data block object is executed according to program instructions stored in the new scramble table; and
a password extraction module configured to execute, by the one or more processors, the following steps:
transfer the sensitive data into a buffer;
recompile the sensitive data;
extract the password from the sensitive data; and
determine whether the recompiled sensitive data is encrypted.

US Pat. No. 10,922,291

DATA PIPELINE BRANCHING

Palantir Technologies Inc...

1. A method comprising:identifying a master branch of a data pipeline comprising ordered data transformation operations, the master branch having a master branch entry in a branch data structure, the master branch entry comprising a first reference to a snapshot of an initial dataset, a first logic implementing a data transformation operation, and a second reference to a snapshot of a first derived dataset resulting from applying the first logic to the initial dataset;
creating a first test branch having a first test branch entry in the branch data structure, wherein creating the first test branch comprises:
storing, in the first test branch entry of the branch data structure, the first reference to the snapshot of the initial dataset, and
storing, in the first test branch entry of the branch data structure, a first copy of the first logic and the second reference to the snapshot of the first derived dataset;
receiving a request to modify the first test branch, the request comprising at least one change to the first copy of the first logic;
modifying the first test branch independently of the master branch to include a second logic reflecting the at least one change to the first copy of the first logic, wherein modifying the first test branch comprises:
updating the first logic with the second logic in the first test branch entry of the branch data structure, and
generating a second derived dataset by applying the second logic to the snapshot of the initial dataset; and
responsive to receiving user input requesting a merge of the modified first test branch into the master branch:
replacing, in the master branch entry of the branch data structure, the first logic with the second logic, and
replacing, in the master branch entry of the branch data structure, the second reference to the snapshot of the first derived dataset with a third reference to a snapshot of the second derived dataset;
wherein the method is performed using one or more processors.

US Pat. No. 10,922,290

METHOD AND APPARATUS FOR ORGANIZING DATABASE SYSTEM IN A CLOUD ENVIRONMENT

TMAX CLOUD CO., LTD., Se...

1. A method for organizing a database system in a cloud environment, the method comprising:receiving a database service request;
determining whether there is a database system in use satisfying the database service request;
when there is a database system in use satisfying the database service request, performing a database installation process for the database system in use;
when there is no database system in use satisfying the database service request, performing a resource allocation process including:
selecting, by a resource allocator, a storage node based on a storage type and a storage size of the requested database,
creating, by an image manager, a cloud virtual image of an instance desired by a user through software provisioning to distribute the cloud virtual image to a specific storage node so that the instance can be operated on that node, and
building, by the resource allocator, a storage server corresponding to an instance for processing an input/output (I/O) stream of the requested database on the selected storage node;
managing, by a database manager, information on the database service request and the built storage server as meta information; and
organizing, by a computing node, a new database system responding to the database service request based on the meta information.

US Pat. No. 10,922,289

DEVICE FOR AND METHOD OF DETERMINING A LENGTH OF A RELEVANT HISTORY

Koninklijke Philips N.V.,...

1. A device including a processor for determining a length of a history of instances of a first type of data for reducing a data set comprising instances of the first type of data, the instances of the first type of data comprising information for predicting at least one instance of a second type of data, the device comprising:a second data set unit for obtaining a second set of data comprising instances of the second type of data, instances of the second type of data comprising data being based on a characteristic of a physical entity;
a first data set unit for obtaining a first set of data comprising sequences of instances of the first type of data, each sequence providing a history of instances of the first type of data for a corresponding element of the second set, each sequence comprising instances preceding the moment in time at which the corresponding element of the second set is determined, the instances of the first type of data being ordered according to time in the sequences, instances of the first type of data comprising data being based on measured sensor;
a first conditional entropy unit for obtaining a first conditional entropy for the second set of data given the first set of data;
a threshold unit for obtaining a maximum entropy increase threshold indicating a factor by which the first conditional entropy may increase when the length of the sequences in the first set of data is reduced;
a length determining unit for determining the length of the relevant history by determining a smallest length for the sequences of a reduced first set of data for which a second conditional entropy for the second set of data given the reduced first set of data is within the maximum entropy increase threshold from the first conditional entropy, the reduced first set of data comprising sequences of the smallest length and the sequences of the reduced set of data comprising the most recent instances of the first type of data of their corresponding sequences in the first set of data; and
an output unit for providing the smallest length for the sequences as the length of the relevant history for reducing the amount of history stored for the data of the first type.

US Pat. No. 10,922,288

METHOD FOR STORING DATA ELEMENTS IN A DATABASE

International Business Ma...

1. A method for storing a first data element in a database comprising at least one storage medium, a database management unit and at least one communication interface, the database comprising a plurality of tables, the plurality of tables comprising a plurality of rows, the rows comprising a plurality of columns of data elements, the tables being divided into a plurality of data sections, each data section of the plurality of data sections comprising a subset of the plurality of rows and one or more data elements from a column of the plurality of columns, each data section being stored in an individual data section-file in the at least one storage medium, the method comprising:providing, by a computer processor, at least one table-mapping file for enabling access to a table of the plurality of tables in the storage medium;
receiving, by the computer processor, the first data element at the database via the at least one communication interface;
determining, by the computer processor, the table, column, and data section the first data element is to be stored in by the database management unit;
determining, by the computer processor, a ratio of queries to storing operations for the table using information included in an access-log file by the database management unit;
comparing, by the computer processor, the determined ratio to a predefined threshold ratio by the database management unit;
if the determined ratio exceeds the predefined threshold ratio, retrieving, by the computer processor, a plurality of map records from the at least one table-mapping file;
storing, by the computer processor, the first data element in the individual data section-file corresponding to the determined table, column and data section by the database management unit; and
updating, by the computer processor, the at least one table-mapping file corresponding to the table, columns and data section the first data element has been stored in by the database management unit.

US Pat. No. 10,922,287

INTELLIGENT LAYOUT OF COMPOSITE DATA STRUCTURES IN TIERED STORAGE

Cisco Technology, Inc., ...

1. A computer-implemented method, comprising:determining a read/write cost for each of a plurality of fields in an object based on storage of the each of the plurality of fields as persistent data or non-persistent data, wherein the read/write cost including re-computation cost factors, each re-computation cost factor is a cost of re-computing a corresponding field value of each of the plurality of fields when the corresponding field is lost through storage as non-persistent data;
identifying at least one field, among the plurality of fields, having the read/write cost that exceeds a predetermined threshold, based at least in part on the re-computation cost factor of the at least one field if stored as either persistent or non-persistent data; and
determining whether to store the at least one field to a first memory device or a second memory device based on the read/write cost, wherein at least one of the first memory device and the second memory device is a non-persistent memory device.

US Pat. No. 10,922,286

NETWORK SLINGHOP VIA TAPESTRY SLINGSHOT

UMBRA TECHNOLOGIES LIMITE...

1. A network system for providing long haul network connection between endpoint devices, comprising:a first endpoint device;
a second endpoint device;
a first exchange server;
a second exchange server;
a first access point server coupled between the first endpoint device and the first exchange server;
a second access point server coupled between the second endpoint device and the second exchange server;
a first storage node coupled between the first exchange server and the second exchange server;
a second storage node coupled between the first exchange server and the second exchange server;
wherein the first exchange server is configured to (1) convert first packetized traffic received from the first endpoint device, via the first access point server, into a carrier file, and (2) write the carrier file to the second storage node; and
wherein the second exchange server is configured to (1) read the carrier file from the second storage node and (2) convert the carrier file into second packetized traffic, wherein the second packetized traffic is sent to the second end device via the second access point server.

US Pat. No. 10,922,285

TABLE DATA PERSISTENCE

Pivotal Software, Inc., ...

1. A method, comprising:receiving a command for creating a database table, the command including an identifier of a data store persisted on a distributed file system;
creating the database table in response to the command;
receiving and inserting updated data as one or more data records in the database table;
storing at least a portion of the data records as log files of the data store on the distributed file system, comprising:
determining that an amount of data records stored in a memory device satisfies a memory overflow condition; and
in response, moving one or more data records from the memory device to the log files; and
in response to receiving a request to access the data records stored on the distributed file system, retrieving the data records from the log files using a mapper procedure of a plurality of mapper procedures of a mapping process.

US Pat. No. 10,922,284

EXTENSIBLE FRAMEWORK FOR MANAGING MULTIPLE HADOOP CLUSTERS

Cloudera, Inc., Palo Alt...

1. A computer-implemented method of managing data in a large-scale computer network coupling one or more client computers to a server and having multiple clusters having respective applications, comprising:accessing, by a client computer through a cluster access subsystem of the server, the multiple clusters wherein each cluster has an identity federation subsystem, wherein the server has a user authentication subsystem;
discovering details about each cluster including hosts, size, and services running on each respective cluster;
propagating, through the identity federation subsystem and user authentication subsystem, identities of users logged in to each service in each cluster;
encoding, in a web shell component, web-based data of services of an accessed cluster to a web browser of a client computer of the one or more client computers;
forwarding requests from the web browser to the cluster access subsystem of the accessed cluster that wraps the requests in a security protocol interaction that preserves an identity of a user of the client computer for the propagation;
deploying, from an application deployment subsystem, commands to deploy the applications using an application descriptor for each application of the deployed applications; and
storing, in an application registration subsystem, data about how each application can be accessed through service endpoints including a network address and port identifier for access by queries by any other component, application, or service in the network, wherein the services are invoked through representational state transfer (REST) application programming interfaces (APIs), and further comprising exchanging, through an API layer, state information maintained in an application registry, cluster store, and data asset store with each applications of the deployed applications to provide functionality of centralized cluster management and asset management to the user.

US Pat. No. 10,922,283

FILE SYNCHRONIZATION

RACKWARE, INC., Fremont,...

1. An apparatus comprising:an origin tracking module that tracks data change information for each of at least one data change in an origin file stored on an origin device, the data change information comprising a location of the data change in the origin file and a length of the data change;
a synchronization detecting module that detects a synchronization event associated with the origin file;
a synchronizing module that copies the data of the origin file for each of the at least one data change in the origin file at the tracked location and length to a target file stored on a target device; and
a snapshot module that creates a snapshot of the origin file prior to tracking data changes in the origin file, wherein a current data change tracking session is concluded in response to the snapshot being created,
wherein said modules comprise one or more of hardware circuits, programmable hardware devices, and a processor executing code.

US Pat. No. 10,922,282

ON-DEMAND COLLABORATION USER INTERFACES

Box, Inc., Redwood City,...

1. A computer implemented method for on-demand generation of a collaboration network graph comprising:detecting a user interaction with one or more entities to raise one or more entity interaction events at a collaboration system, the collaboration system comprising the one or more entities corresponding to files or other content objects that are operated on by two or more users of the collaboration system;
performing a first configuration of a graph platform to gather data pertaining to the one or more entity interaction events and organize the data into one or more data structures that codify nodes of a collaboration network graph and edges of the collaboration network graph, wherein the nodes of the collaboration network graph refer to individual ones of the one or more entities and wherein the edges of the collaboration network graph refer to one or more parameter values that characterize relationships between the nodes of the collaboration network graph;
performing a second configuration of the graph platform to apply one or more behavior overlays to the first configuration of the graph platform,
wherein a first behavior overlay of the behavior overlays causes a first set of operations on the collaboration network graph,
wherein a second behavior overlay of the behavior overlays causes a second set of operations on the collaboration network graph, and
wherein the first set of operations is different from the second set of operations;
establishing at least one feed definition;
receiving at least one feed request, the at least one feed request referencing the at least one feed definition in one or more request attributes; and
generating, in response to receiving the at least one feed request, one or more entity-specific collaboration feeds, the one or more entity-specific collaboration feeds being generated based at least in part on the collaboration network graph and at least one of the first behavior overlay or the second behavior overlay.

US Pat. No. 10,922,281

APPLICATION AWARE DEDUPLICATION

EMC IP HOLDING COMPANY LL...

1. A method for performing deduplication in a file system, the method comprising:receiving a file from a client to store in a storage of a file system, wherein the file has a format associated with an application;
determining the format of the file, wherein the file includes subfiles;
chunking the file based on the format of the file, wherein at least one of the chunks corresponds to more than one of the subfiles of the file; and
deduplicating the chunks with respect to other chunks stored in the storage.

US Pat. No. 10,922,280

POLICY-BASED DATA DEDUPLICATION

Nutanix, Inc., San Jose,...

1. A method comprising:receiving, from a first data producer, a first occurrence of a subject data item to store at a data storage site based at least in part on a first deduplication parameter;
receiving, from a second data producer, a second occurrence of the subject data item to store at the data storage site based at least in part on a second deduplication parameter; and
reconciling the first deduplication parameter against the second deduplication parameter to determine an applicable action to apply to storage the subject data item at the data storage site, wherein:
if the first deduplication parameter and the second deduplication parameter are compatible, both the first occurrence of the subject data item and the second occurrence of the subject data item are maintained using a single data item stored at the data storage site,
if the first deduplication parameter and the second deduplication parameter are not compatible, the first occurrence of the subject data item and the second occurrence of the subject data item are maintained using separate data items stored at the data storage site, andwherein a determination of whether the first deduplication parameter and the second deduplication parameter are compatible is based on a determination that the first deduplication parameter or the second deduplication parameter can satisfy both a first storage rule corresponding to the first deduplication parameter and a second storage rule corresponding to the second deduplication parameter, the first storage rule being associated with a first storage policy of the first data producer, and the second storage rule being associated with a second storage policy of the second data producer.

US Pat. No. 10,922,279

SERVER FOR INGESTING AND UPDATING RENDERABLE DATA OBJECTS FROM A FLAT FILE SERVER

Groupon, Inc., Chicago, ...

1. An ingestion system comprising an ingestion module, a flat file module, a compliance module, and a deduplication module, wherein:the ingestion module comprises an ingestion processor and an ingestion memory including ingestion computer program code, the ingestion memory and the ingestion computer program code configured to, with the ingestion processor, cause the ingestion module to:
transmit a poll request to the flat file module requesting a flat file data object;
receive the flat file data object, wherein the flat file data object contains at least one of strings, integers, Booleans, objects, arrays of objects, arrays of Booleans, arrays of strings, or arrays of integers;
parse the flat file data object into a renderable data object comprising an array of parts according to defined properties for ingesting the flat file data object;
transmit the renderable data object to the compliance module and the deduplication module; and
store the renderable data object in a renderable object database;
the flat file module comprises a flat file processor and a flat file memory including flat file computer program code, the flat file memory and the flat file computer program code configured to, with the flat file processor, cause the flat file module to:
receive the poll request from the ingestion module; and
transmit the flat file data object to the ingestion module;
the compliance module comprises a compliance processor and a compliance memory including compliance computer program code, the compliance memory and the compliance computer program code configured to, with the compliance processor, cause the compliance module to:
determine compliance of the renderable data object by comparing each part of the array of parts with object constraints in the defined properties to identify one or more non-compliant parts of the renderable data object;
determine a compliance alert that identifies the one or more non-compliant parts of the renderable data object; and
transmit the compliance alert to the flat file module; and
the deduplication module comprises a deduplication processor and a deduplication memory including deduplication computer program code, the deduplication memory and the deduplication computer program code configured to, with the deduplication processor, cause the deduplication module to:
identify one or more candidate duplicate parts from the array of parts;
compare the candidate duplicate parts from the array of parts with a part registry stored in a deduplication database to generate a duplication score for the renderable data object; and
output the duplication score for the renderable data object.

US Pat. No. 10,922,278

SYSTEMS AND METHODS FOR DATABASE COMPRESSION AND EVALUATION

14. A method comprising:compressing a variant table to create a variant decomposition diagram (VDD) by recursively decomposing the variant table into a plurality of subtables; and
negating, using one or more processors, the VDD to generate a negative VDD.

US Pat. No. 10,922,277

LOGGING FILE SYSTEM METADATA CHANGES USING A SINGLE LOG HOLD PER CACHED BLOCK OF METADATA

EMC IP Holding Company LL...

1. A computer-implemented method of logging modifications to file system metadata resulting from file system requests, comprising executing, on at least one processor, the acts of:receiving a plurality of file system requests;
maintaining a metadata log in persistent storage, wherein each log entry in the metadata log contains metadata to be modified by a corresponding one of the plurality of file system requests;
storing a single log hold for each of a plurality of blocks of cached metadata, the single log hold for each block indicating a file system request that modifies the metadata contained in that block and that corresponds to a log entry that is located the closest, of all log entries corresponding to file system requests that modify the metadata contained in that block, to a head of the metadata log, the storing including—
i) processing a first one of the file system requests by adding a log hold indicating the first one of the file system requests to a block of cached metadata modified by the request,
ii) processing a second one of the file system requests, wherein the second one of the file system requests also modifies the block of cached metadata modified by the first one of the file system requests, by not adding a log hold to the block of cached metadata modified by the first one of the file system requests in response to detecting that a location of a log entry corresponding to the first one of the file system requests is closer to the head of the metadata log than a location of a log entry corresponding to the second one of the file system requests, and
iii) processing a third one of the file system requests, wherein the third one of the file system requests also modifies the block of cached metadata modified by the first one of the file system requests, by, in response to detecting that a location of a log entry corresponding to the third one of the file system requests is closer to the head of the metadata log than the location of a log entry corresponding to the first one of the file system requests,
a) without releasing the log entry corresponding to the first one of the file system requests from the metadata log, removing the log hold indicating the first one of the file system requests from the block, and
b) adding a log hold indicating the third one of the file system requests to the block;
flushing the blocks of cached metadata to the persistent storage, wherein the flushing includes releasing the single log hold for each block flushed;
releasing log entries from the metadata log that correspond to individual ones of the file system requests for which all log holds have been released; and
maintaining a reference counter for each file system request, wherein the reference counter for each file system request indicates a total number of blocks of cached metadata that are each both i) modified by the request, and ii) for which the request has a log entry located closer to the head of the metadata log than any other log entry in a plurality of log entries for a plurality of file system requests that modify the block.

US Pat. No. 10,922,276

ONLINE FILE SYSTEM CHECK

Hewlett Packard Enterpris...

1. A method comprising:receiving a request to allocate storage space in a storage volume of a file system, wherein the storage volume comprises a non-reserved zone and a soft-reserved zone;
if the storage volume is not undergoing an online file system check, then allocating storage space from the non-reserved zone of the storage volume;
verifying consistency of the soft-reserved zone to determine that all blocks in the soft-reserved zone are free blocks prior to mounting the file system in an online file system check mode; and
if the storage volume is undergoing the online file system check, then:
allocating storage space from the soft-reserved zone of the storage volume to allow writing of data on the storage volume while the storage volume is undergoing the online file system check, and
re-assigning, without migration of data written on the soft-reserved zone during the online file system check, the allocated storage space from the soft-reserved zone to the non-reserved zone by updating metadata associated with blocks of the soft-reserved zone to indicate that the allocated storage space belongs to the non-reserved zone,
wherein the metadata associated with blocks of the soft-reserved zone is identified via a superblock in a reserved metadata section of the file system, wherein the superblock comprises a descriptor of the soft-reserved zone, and wherein the soft-reserved zone is defined as a linked-list of descriptors in the superblock.

US Pat. No. 10,922,275

UNIVERSE AUTOMATIC GENERATION OF BUSINESS LAYER FRAGMENTS

SAP SE, Walldorf (DE)

1. A system comprising:a memory storing processor-executable instructions; and
a processor to execute the processor-executable instructions to cause the system to:
add a dedicated data storage structure to a first set container of a semantic layer universe, the first set container being a data structure hosting at least one set including one or more set tables and information stored in the first set container specifying each set table it contains and a structure of each set table contained in the first set container, the specified structure of each set table contained in the first set container being indicative a schema of a first database;
automatically create at least one data foundation table for each of the one or more set tables in the first set container based on the information stored in the first set container containing the one or more set tables;
automatically generate, at least one object consistent with the schema of the first database as indicated by the information stored in the first set container specifying the structure of each set table stored in the first set container based on the at least one automatically created data foundation table;
store the automatically generated at least one object in the dedicated storage structure; and
store the dedicated data storage structure in the first set container.

US Pat. No. 10,922,274

METHOD AND APPARATUS FOR PERFORMING AUTO-NAMING OF CONTENT, AND COMPUTER-READABLE RECORDING MEDIUM THEREOF

SAMSUNG ELECTRONICS CO., ...

1. A method of performing auto-naming of content, the method being performed by a device and comprising:determining, by a processor, whether an auto-naming command corresponds to a content storage request or the auto-naming command corresponds to a content transmission request;
determining, by the processor, a type of the content to be a first content type based on the auto-naming command corresponding to the content storage request and determining, by the processor, the type of the content to be a second content type based on the auto-naming command corresponding to the content transmission request, wherein the first content type includes a type of a first file received through a communication unit of the device, and the second content type includes a type of a second file transmitted to outside of the device through the communication unit of the device,
based on the determined type of the content, selecting, by the processor, parameters to obtain at least one auto-naming result, wherein the selecting comprises selecting a first set of parameters from among different parameters based on the determined type of the content being the first content type, and selecting a second set of parameters from among the different parameters based on the determined type of the content being the second content type;
obtaining, by the processor, inference information regarding the content by using the selected first set of parameters or the selected second set of parameters, which are attributes related to context of the content;
performing, by the processor, the auto-naming of the content by using the inference information; and
displaying, on a display of the device, the at least one auto-naming result.

US Pat. No. 10,922,273

FORWARD-PRIVATE DYNAMIC SEARCHABLE SYMMETRIC ENCRYPTION (DSSE) WITH EFFICIENT SEARCH

University of South Flori...

1. A method for searching encrypted files, the method comprising:selecting, with a client computing device, a specific keyword to search a plurality of encrypted files stored at a server computing device;
if the specific keyword has not been previously used to search the plurality of encrypted files;
using an encrypted keyword index stored at the server computing device to identify one or more encrypted files of the plurality of encrypted files that contain the specific keyword, wherein the encrypted keyword index comprises a plurality of cells, wherein each of the plurality of cells comprises a cell value that represents a keyword-file relationship and a bit state indicating if a most recent operation performed on the cell was a search operation or an update operation;
storing the keyword-file relationship for each of the one or more encrypted files that contain the specific keyword in an encrypted dictionary at the server computing device;
if the specific keyword has previously been used to search the plurality of encrypted files;
using the encrypted dictionary to identify one or more encrypted files of the plurality of encrypted files that contain the specific keyword based upon the keyword-file relationships for the specific keyword previously stored in the encrypted dictionary at the server computing device; and
using the encrypted keyword index to identify one or more encrypted files that contain the specific keyword that have not been stored in the encrypted dictionary, wherein identifying the additional encrypted files comprises identifying the cells of the encrypted keyword index having a cell value that represents a keyboard-file relationship related to the specific keyword and having a state bit that indicates that the most recent operation performed on the cell was an update operation.

US Pat. No. 10,922,272

PROVIDING DATA ACROSS MULTIPLE CLUSTERS IN A SINGLE NAMESPACE

EMC IP HOLDING COMPANY LL...

1. A system, comprising:a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
providing, by a computing node of the system that is a member of a first storage cluster and of a second storage cluster, first data in a first namespace to a first client computing device that is stored in the first storage cluster;
in response to determining that the first client computing device is accessing second data at a junction between the first storage cluster and the second storage cluster, serving, by the computing node, as a proxy to provide third data in the first namespace to the second client computing device that is stored in the second storage cluster; and
in response to determining that a second client computing device is accessing the second data at the junction, referring, by the computing node, the second client computing device to access the second storage cluster.

US Pat. No. 10,922,271

METHODS AND SYSTEMS FOR CLUSTERING FILES

MINEREYE LTD., Hod Hasha...

1. A method of clustering files, comprising, by a processing unit:obtaining a clustering structure comprising a plurality of nodes arranged in hierarchical levels Li, with i from 1 to N,
wherein each node is representative of a category of files, wherein said category is representative of files sharing similarities,
wherein each node of level Li is linked to a parent node of level Li?1, with i from 2 to N, thereby indicating that each data belonging to a category represented by said node also belongs to a category represented by said parent node,
wherein each node is associated with at least one acceptance threshold,
wherein each node associated with at least one centroid representative of files belonging to a category represented by said node,
obtaining at least one data (Dsignal) representative of a file (Dfile) to be assigned to a category;
(O1) comparing said data to each centroid of each node of the first level,
(O2) when said comparison matches the acceptance threshold of one or more nodes, selecting a node among these nodes, and when said comparison does not meet an acceptance threshold of any node, creating a new node in the first level, wherein a centroid of said new node is determined based at least on Dsignal;
(O3) comparing Dsignal to each centroid of each node of a next level which is linked to said selected node,
(O4) when said comparison matches the acceptance threshold of one or more nodes, selecting a node among these nodes, and when said comparison does not meet an acceptance threshold of any node, creating a new node, wherein, for a level Li with i>1, said new node is linked to said selected node, wherein a centroid of said new node is determined based at least on Dsignal;
repeating O3 and O4 until a stopping condition is met, thereby indicating that said data Dsignal or said file Dfile belongs to a category of files represented by said selected node, wherein a centroid and an acceptance threshold of said selected node are updated based on said data Dsignal.

US Pat. No. 10,922,270

ADAPTIVE DATA RECORDING METHOD IN VEHICLE IMAGE RECORDING DEVICE

PITTASOFT CO., LTD., Seo...

1. An adaptive data recording method of recording data in a storage medium using a file allocation table (FAT) file system by a data recording device, the method comprising steps of:i) receiving the data;
ii) creating at least one file in which the data is recorded, configuring a cluster chain by sequentially connecting cluster addresses according to an FAT of the storage medium, and recording the data at an actual position of each cluster address;
iii) when a file termination interrupt occurs, terminating the file by terminating the cluster chain of the file under data recording, creating a new file, configuring a new cluster chain, and continuously recording the data, wherein, when the file is terminated according to the file termination interrupt, the size of the file to be terminated is changed to a predetermined fixed size by adding at least one cluster address to the cluster chain if the size of the file in which the data is recorded up to the file termination interrupt satisfies a predetermined size range within the predetermined fixed size; and
iv) if a residual capacity of the storage medium is less than a predetermined spare capacity when creating the new file, selecting at least one file which is terminated after previous data recording, and continuously recording the data reusing the cluster chain of the selected file, wherein, when the new file is terminated, an unused portion of the reused cluster chain of the selected file is maintained even if the size of the new file is smaller than that of the selected file.

US Pat. No. 10,922,269

PROACTIVE OPTIMIZATIONS AT MULTI-TIER FILE SYSTEMS

Amazon Technologies, Inc....

1. A system, comprising:a recommendations manager of a storage service, implemented at one or more computing devices, wherein the recommendations manager is configured to:
train one or more machine learning models, including a first machine learning model, using a first collection of usage metrics of a first storage object group;
generate, based at least in part on one or more predictions obtained from the first machine learning model, a particular proactive placement recommendation to transfer a particular storage object of the first storage object group from a first storage device group of the storage service to a different storage device group; and
transmit the particular proactive placement recommendation to an object migrator component of the storage service configured to initiate the transfer of the particular storage object.

US Pat. No. 10,922,268

MIGRATING DATA FROM A SMALL EXTENT POOL TO A LARGE EXTENT POOL

International Business Ma...

1. A computer-implemented method, comprising:identifying a request to migrate data associated with a volume from a source storage pool having rank extents with a first rank extent size to a destination storage pool having rank extents with a second rank extent size greater than the first rank extent size;
creating a correspondence between logical volume extents of the volume and physical offset locations within rank extents of the destination storage pool, the rank extents each including a predetermined portion of storage allocated within a corresponding storage pool; and
migrating data from one or more ranks of the source storage pool to one or more ranks of the destination storage pool, according to the correspondence between the logical volume extents of the volume and the physical offset locations within the rank extents of the destination storage pool.

US Pat. No. 10,922,267

VECTOR PROCESSOR TO OPERATE ON VARIABLE LENGTH VECTORS USING GRAPHICS PROCESSING INSTRUCTIONS

Optimum Semiconductor Tec...

1. A processor, comprising: a vector register file comprising at least one vector register to hold a varying number of elements; a vector length register file comprising a first vector length register; and a processing logic, communicatively coupled to the vector register file and the vector length register file, to execute a graphics processing instruction as a single instruction to perform one or more operations on the varying number of elements, the graphics processing instruction comprising: a first identifier representing the at least one vector register, and a second identifier representing the first vector length register storing a number N of operations to be performed on the varying number of elements, wherein the number N of operations is independent from a number M of elements that the at least one vector register packed therein, and wherein the number N of operations stored in the first vector length register is larger than a number of elements that each of the at least one vector register is able to hold in a hardware implementation.

US Pat. No. 10,922,266

USERSPACE SPLIT DATA-CENTRIC HETEROGENEOUS COMPUTING ARCHITECTURE

EMC IP HOLDING COMPANY LL...

1. A non-transitory storage medium having stored therein instructions that are executable by one or more hardware components to perform operations comprising:transmitting, by an application running in a host CPU, a notification to an application in a coprocessor/accelerator indicating that inbound data generated by the application is ready;
receiving, by the application in the coprocessor/accelerator, the notification and delegating, by the application in the coprocessor/accelerator, an IO command to the application running in the host CPU;
forwarding, by the application running in the host CPU, the IO command to an OS of the host CPU;
transmitting, by the OS of the host CPU, an IO request to an IO device;
initiating, by the IO device, a P2PDMA to transmit data associated with the IO request to a memory of the coprocessor/accelerator; and
processing, by the application in the coprocessor/accelerator, the data.

US Pat. No. 10,922,265

TECHNIQUES TO CONTROL REMOTE MEMORY ACCESS IN A COMPUTE ENVIRONMENT

INTEL CORPORATION, Santa...

1. An apparatus, comprising:memory;
an interface coupled with the memory, the interface comprising logic and circuitry, the logic operable on the circuitry to:
process a transaction request to perform a transaction with the memory, the transaction request comprising a synchronization indication to indicate utilization of transaction synchronization to perform the transaction,
send a request to a caching agent to perform the transaction based on the synchronization indication,
receive a response from the caching agent, the response to indicate whether the transaction conflicts or does not conflict with another transaction, and
perform the transaction if the response indicates the transaction does not conflict with another transaction, or delay the transaction for a period of time if the response indicates the transaction does conflict with another transaction.

US Pat. No. 10,922,264

CAN TRANSCEIVER

NXP B.V., Eindhoven (NL)...

19. A transceiver for sending and receiving data from a controller area network (CAN) bus, wherein the transceiver is configured to detect if a node, after losing an arbitration, has sent a dominant bit on the CAN bus, wherein the transceiver is further configured to send a predefined bit pattern on the CAN bus after receiving the dominant bit from the node and prohibiting the node for a predetermined period from sending data on the CAN bus.

US Pat. No. 10,922,263

SERIAL COMMUNICATION DEVICE

C-SKY Microsystems Co., L...

1. A serial communication device, configured to implement data transmission between a master machine and a slave machine, comprising:a first interface circuitry communicatively coupled to an advanced bus of the master machine;
a second interface circuitry communicatively coupled to a data interface of the slave machine;
a control circuitry configured to acquire through the first interface circuitry control information sent by the master machine and to output a set of control signals based on the control information;
a transceiving enable circuitry configured to generate a shift enable signal according to one or more control signals of the set of control signals;
a shift register circuitry configured to:
acquire through the first interface circuitry data sent by the master machine, serially shift out the data when the shift enable signal is valid, and send the serially shifted-out data to the slave machine through the second interface circuitry; and
acquire through the second interface circuitry serial data uploaded by the slave machine, serially shift in the serial data when the shift enable signal is valid, obtain data according to the serially shifted-in data, and upload the obtained data to the master machine through the first interface circuitry; and
an interrupt generating circuitry configured to generate an interrupt request signal according to one or more control signals of the set of control signals, the shift enable signal, and the serially shifted-in data, wherein the interrupt request signal notifies the master machine to resend the control information.

US Pat. No. 10,922,262

SEMICONDUCTOR LAYERED DEVICE WITH DATA BUS INVERSION

Micron Technology, Inc., ...

1. An apparatus, comprising:a first plurality of first-in first-out (FIFO) circuits configured to receive at least a first portion of a plurality of corresponding bits of data, and further configured to provide a plurality of corresponding bits of first latched data;
a second plurality of FIFO circuits configured to receive at least a second portion of the plurality of corresponding bits of data, and further configured to provide a plurality of corresponding bits of second latched data; and
a DBI calculator configured to receive the plurality of corresponding bits of the first latched data and the plurality of corresponding bits of the second latched data and further configured to provide a current DBI calculation result signal after a data bus inversion (DBI) calculation time,
wherein the first plurality of FIFO circuits and the second plurality of FIFO circuits are configured to hold the plurality of corresponding bits of first latched data and corresponding bits of second latched data, respectively for the DBI calculation time, before providing the plurality of corresponding bits of first latched data and corresponding bits of second latched data, respectively.

US Pat. No. 10,922,261

MEMORY CLOCK FREQUENCY ADJUSTING METHOD, MAINBOARD, AND COMPUTER OPERATING SYSTEM

GIGA-BYTE TECHNOLOGY CO.,...

1. A memory clock frequency adjusting method, suitable for a computer device comprising a basic input output system and a memory, wherein the memory clock frequency adjusting method comprises:executing a boot process of the computer device, the memory being operated at a standard memory clock frequency recorded in a serial presence detect of the memory and set by the basic input output system;
determining whether the computer device is successfully booted by the basic input output system to decide whether to re-execute the boot process of the computer device; and
adjusting a setting of the memory clock frequency by the basic input output system if the computer device re-executes the boot process to lower the memory clock frequency, such that the memory is operated at the lowered memory clock frequency,
wherein the step of adjusting the setting of the memory clock frequency by the basic input output system to lower the memory clock frequency comprises:
determining whether the memory clock frequency is a default memory clock frequency of a minimum threshold;
when the memory clock frequency is the default memory clock frequency of the minimum threshold, the basic input output system stops adjusting the memory clock frequency; and
when the memory clock frequency is not the default memory clock frequency of the minimum threshold, the basic input output system lowers the memory clock frequency according to a default frequency adjusting range multiple times to re-execute the boot process of the computer device multiple times until the computer device is successfully booted,
wherein the default memory clock frequency of the minimum threshold is lower than the standard memory clock frequency recorded in the serial presence detect of the memory, and the default memory clock frequency of the minimum threshold is a lowest memory clock frequency at which the memory is capable of being operated.

US Pat. No. 10,922,260

MODULAR CARRIER FORM FACTORS FOR COMPUTING PLATFORMS

liqid inc., Broomfield, ...

1. A storage card apparatus comprising:a carrier insertable into a modular bay of a 2U rackmount chassis assembly; and
a storage card assembly coupled to the carrier and comprising:
a storage card connector configured to mate with a connector of the modular bay of the rackmount chassis assembly;
at least four M.2 storage devices, wherein each M.2 storage device comprises a Peripheral Component Interconnect Express (PCIe) interface and solid-state storage media and wherein each M.2 storage device is configured to store and retrieve data responsive to storage operations received over the PCIe interface;
a first circuit board having three of the M.2 storage devices coupled to associated M.2 connectors mounted thereto; and
a second circuit board having at least one of the M.2 storage devices coupled to an associated M.2 connector mounted thereto;
the second circuit board having the storage card connector, PCIe switch circuitry, and holdup circuitry coupled thereto configured to provide power to elements of the storage card assembly after removal of power from the storage card connector;
at least one connector coupling the first circuit board to the second circuit board; and
the PCIe switch circuit communicatively coupled to each PCIe interface of the at least four M.2 storage devices and configured to receive the storage operations issued by a host system over the storage card connector and transfer the storage operations for delivery to selected ones of the at least four M.2 storage devices via associated PCIe interfaces of the selected ones of the at least four M.2 storage devices.

US Pat. No. 10,922,259

SYSTEM AND METHOD FOR EXTENDED PERIPHERAL COMPONENT INTERCONNECT EXPRESS FABRICS

Futurewei Technologies, I...

1. A system for extending peripheral component interconnect express (PCIe) fabric comprising:a central processing unit (CPU);
a host root complex for a host PCIe fabric associated with a first set of bus numbers and a first memory mapped input/output (MMIO) space, wherein the host root complex is configured to forward requests between the CPU and the host PCIe fabric; and
a root complex end point (RCEP) for an extended PCIe fabric associated with a second set of bus numbers and a second MMIO space separate from the first set of bus numbers and the first MMIO space, respectively, wherein the RCEP is an endpoint of the host PCIe fabric, and wherein the RCEP is configured to host the extended PCIe fabric and handle a direct memory access (DMA) request from the extended PCIe fabric by replacing an ID of an endpoint contained in the DMA request with an ID of the RCEP.

US Pat. No. 10,922,258

CENTRALIZED-DISTRIBUTED MIXED ORGANIZATION OF SHARED MEMORY FOR NEURAL NETWORK PROCESSING

ALIBABA GROUP HOLDING LIM...

1. A processor, comprising:a memory architecture having M-number of processing elements each having at least N-number of processing units and a local memory, wherein M, N comprising integers greater than 1 and the memory architecture comprising:
a first processing element of the M-number of processing elements comprising:
a first set of N-number of processing units configured to perform a computing operation, and
a first local memory configured to store data capable of being utilized by the N-number of processing units, wherein first local memory has a full write port, a full read port, a narrow write port, and a narrow read port, wherein the first local memory is configured to acquire private data via the full write port and to send private data via the full read port, and wherein the first local memory is configured to acquire shared data via the narrow write port and send shared data via the narrow read port; and
a data hub capable of receiving data from the M-number of processing elements and capable of providing shared data from one of the M-number of processing elements to other processing elements of the M-number of processing elements.

US Pat. No. 10,922,257

COUPLER FOR AN AUTOMATION SYSTEM

WAGO Verwaltungsgesellsch...

1. A coupler for an automation system for controlling a process, the coupler comprising:a network interface for connection to an Ethernet-based network for receiving an Ethernet telegram having process data of the process and having control data;
a local bus interface for connection to a local bus for transmitting a local bus telegram; and
a circuit formed between the network interface and the local bus interface,
wherein the circuit includes an arithmetic circuit for retrieving the process data from a payload data area of the Ethernet telegram,
wherein the circuit includes a first data filter circuit, which differs from the arithmetic circuit, for filtering out a predetermined subset of the control data from a header of the Ethernet telegram preceding the payload data area,
wherein the circuit is configured to generate the local bus telegram and to insert the process data and the predetermined subset of the control data into the local bus telegram, and
wherein the local bus telegram is shorter than the Ethernet telegram.

US Pat. No. 10,922,256

DISPLAY APPARATUS AND CONTROL METHOD FOR HIGH DISPLAY BANDWIDTH THEREOF

WISTRON CORP., New Taipe...

1. A display apparatus, comprising:a display panel; and
a display controller, electrically connected to a universal serial bus (USB) Type-C interface of a host via a USB Type-C interface of the display apparatus,
wherein in response to the USB Type-C interface of the display apparatus being in a USB Type-C default pin-assignment mode, the display controller receives an image signal from the host via two of four USB SuperSpeed channels of the USB Type-C interface of the display apparatus, and displays the image signal on the display panel,
wherein in response to a display mode of the display apparatus satisfying a specific condition and the display apparatus being in the USB Type-C default pin-assignment mode, the display controller controls the USB Type-C interface to enter a USB Type-C first pin-assignment mode from the USB Type-C default pin-assignment mode, and the host utilizes the four USB SuperSpeed channels of the USB Type-C interface of the display apparatus to transmit the image signal to the display controller.

US Pat. No. 10,922,255

EMBEDDED UNIVERSAL SERIAL BUS 2 REPEATER

TEXAS INSTRUMENTS INCORPO...

1. A method, comprising:receiving, at a circuit, data via an idle differential signal line;
performing a squelch detection on the differential signal line;
determining a value of a common mode voltage (Vcm) with reference to a reference voltage (VREF) by performing a comparison; and
verifying a result of the squelch detection with a result of the comparison.

US Pat. No. 10,922,254

COUPLING AND DECOUPLING DEVICES IN A MODULE

Skyworks Solutions, Inc.,...

1. A radio-frequency module comprising:a serial bus including a first serial data line associated with serial data and a second serial data line associated with serial data;
a first switch coupled to a first device and a third line; and
a control component coupled to the serial bus and the first switch, the control component configured to determine whether first data is detected on the first serial data line, determine whether second data is detected on the second serial data line, and adjust a configuration of the first switch when the first data is detected on the first serial data line and the second data is detected on the second serial data line to couple the first device to or decouple the first device from the third line, the first data including a first portion of a command, the second data including a second portion of the command, the first portion and the second portion of the command being in a first format, the first data and the second data received and decoded simultaneously on the first serial data line and the second serial data line.

US Pat. No. 10,922,253

IMPLEMENTING INTERRUPT REMAPPING VIA INPUT/OUTPUT MEMORY MANAGEMENT UNIT FAULTS

VMWARE, INC., Palo Alto,...

1. A system, comprising:a computing device comprising a processor, a memory, an input/output memory management unit (IOMMU), and a peripheral device;
machine-readable instructions stored in the memory that, when executed by the processor, cause the processor to at least:
allocate a memory address for a respective interrupt request of the peripheral device;
configure the peripheral device to write to the memory address to raise an interrupt with the processor;
remove the memory address from a page table assigned to the IOMMU;
determine that the peripheral device has attempted to write to the memory address based at least in part on detection of a page table fault raised by the IOMMU in response to an attempt to write to the memory address by the peripheral device; and
raise an interrupt for the respective interrupt request with the processor of the computing device on behalf of the peripheral device.

US Pat. No. 10,922,252

EXTENDED MESSAGE SIGNALED INTERRUPTS (MSI) MESSAGE DATA

QUALCOMM Incorporated, S...

1. A method of passing information in a Peripheral Component Interconnect (PCI) express (PCIe) system, comprising:receiving at a host a signal from a PCIe endpoint comprising:
a header; and
a body comprising:
extended message signaled interrupt (MSI) message data comprising a system level identifier for the PCIe endpoint set by the host and indicating interrupt authorization in at least one of a first sixteen bits; and
MSI message data in at least one of a second sixteen bits;
wherein the first sixteen bits are between the header and the second sixteen bits;
extracting, at a root complex of the host, the body from the signal to form an MSI vector with the extended MSI message data still in a body of the MSI vector; and
passing over an internal bus the MSI vector to an interrupt controller in the host with the extended MSI message data still in the body of the MSI vector.

US Pat. No. 10,922,251

ELECTRONIC DEVICE AND METHOD FOR CONTROLLING SAME

Samsung Electronics Co., ...

1. An electronic device, comprising:a connector comprising Universal Serial Bus, USB, port including a plurality of pins;
a memory; and
a processor configured to:
obtain identification information of a first external electronic device through the connector;
identify whether the first external electronic device supports a designated mode based on, at least, the identification information;
based on the identification that the first external electronic device supports the designated mode, obtain first additional information related to the first external electronic device;
based on the identification that the first external electronic device does not support the designated mode, obtain second additional information comprising a Vendor Identifier (VID) related to the first external electronic device; and
store at least part of the identification information or the second additional information in the memory,
wherein the processor is configured to identify whether the VID matches a predetermined VID, provide functions of the first external device based on the VID matching the predetermined VID, and provide part of the functions of the first external device based on the VID not matching the predetermined VID.

US Pat. No. 10,922,250

MONITORING AND STEERING SERVICE REQUESTS TO ACCELERATION COMPONENTS

Microsoft Technology Lice...

1. A method in a system comprising a host configured to send messages, corresponding to a service, to any of a set of acceleration components, the method comprising:tracking an input buffer occupancy corresponding to each of the set of acceleration components; and
upon a first input buffer occupancy of a first acceleration component from among the set of the acceleration components meeting a predetermined criterion, generating a first penalty value for the first acceleration component based at least on the first input buffer occupancy associated with the first acceleration component, and comparing a second value indicative of an availability of the second acceleration component to receive messages from the host to a second dynamically updated value to determine whether the host can send a next message to the second acceleration component.

US Pat. No. 10,922,249

INPUT/OUTPUT CONTROL CODE FILTER

Microsoft Technology Lice...

1. A computer-implemented method for verifying functionality of one or more device drivers running on a computing device, wherein the device drivers are accessible via an input/output control (IOCTL) that executes a system call for device-specific operations for a device under test that is controlled by the device drivers, the method comprising:receiving a plurality of IOCTLs usable to configure, from user space, specified system calls to be executed in kernel space for the device under test, the system calls directed to the one or more drivers associated with the device under test;
executing a filter function configured to determine which of IOCTLs were completed without generating an error and caused the driver to perform a specified function, thereby indicating that the specified function is installed and available in the device under test;
recording the IOCTLs and associated binding information that perform a specified action without generating an error; and
storing the IOCTLs that completed without generating an error and associated binding information in a format usable for subsequent replay of the stored IOCTLs.

US Pat. No. 10,922,248

SLAVE DEVICE AND HOST DEVICE

PANASONIC INTELLECTUAL PR...

1. A slave device that is to be connected to a host device through at least one of a first interface standard and a second interface standard, the slave device comprising:a first terminal group used for the first interface standard and a second terminal group used for the second interface standard, the first terminal group and the second terminal group being provided at positions identical to terminal groups of another slave device to be connected through a third interface standard different from the first interface standard and the second interface standard; and
a signal input and output part that supplies a signal to a predetermined terminal in the first terminal group within a predetermined period from supply of power to the slave device, the signal notifying the host device whether the second terminal group is compliant with the second interface standard.

US Pat. No. 10,922,247

INTERFACE COMPONENTS

Micron Technology, Inc., ...

1. A method, comprising:communicating, via a controller, with respective ones of a plurality of interface components over respective ones of a plurality of first channels;
communicating, via a first interface component of the plurality of interface components, with a first plurality of memory devices over a first one of a plurality of second channels and with a second plurality of memory devices over a second one of the plurality of second channels;
wherein a second interface component is coupled in series with the first interface component; and
communicating, via the second interface component, with a third plurality of memory devices over a first one of a plurality of third channels and with a fourth plurality of memory devices over a second one of the plurality of third channels.

US Pat. No. 10,922,246

SYSTEM AND METHOD OF POLYCHROMATIC IDENTIFICATION FOR A KVM SWITCH

HIGH SEC LABS LTD., Caes...

1. A peripheral devices switching system configured to be coupled to a plurality of host computers, the system comprising:at least one set of peripheral devices, wherein at least one peripheral device of the at least one set of peripheral devices comprises one or more polychromatic light sources; and
a peripheral devices switch that is configured to be coupled to said at least one set of peripheral devices and said plurality of host computers, wherein the peripheral devices switch is configured to be assigned with a color corresponding to each host computer of the plurality of host computers, and wherein the peripheral devices switch is configured to couple between said at least one set of peripheral devices and an active host computer of the plurality of host computers,
wherein the peripheral devices switch is configured to indicate the active host computer by instructing the at least one peripheral device to illuminate the one or more polychromatic light sources by the color that is assigned to the active host computer.

US Pat. No. 10,922,245

INTELLIGENT BLUETOOTH BEACON I/O EXPANSION SYSTEM

Geotab Inc., Oakville (C...

16. A system comprising:a plurality of objects, each object of the plurality of objects being associated with a device of a plurality of devices;
a vehicle; and
at least one monitoring device comprising:
at least one processor; and
at least one non-transitory computer-readable storage medium having encoded thereon executable instructions that, when executed by the at least one processor, cause the at least one processor to carry out a method comprising:
determining objects associated with the vehicle, wherein determining the objects associated with the vehicle comprises:
at a first location of the vehicle, identifying a first set of devices within communication range of the at least one monitoring device;
for each first device of the first set of devices within communication range of the at least one monitoring device at the first vehicle location:
 obtaining information indicating a first location of the first device;
 comparing the information indicating the first location of the first device to a geofence associated with the vehicle; and
 when a result of the comparing indicates that the first device is located within the geofence associated with the vehicle at the first vehicle location, determining that the first device is associated with the vehicle at the first vehicle location;
at a second location of the vehicle, identifying a second set of devices within communication range of the at least one monitoring device;
for each second device of the second set of devices within communication range of the at least one monitoring device at the second vehicle location:
 obtaining information indicating a second location of the second device;
 comparing the information indicating the second location of the second device to the geofence associated with the vehicle; and
 when a result of the comparing indicates that the second device is located within the geofence associated with the vehicle at the second vehicle location; and
determining whether an object of the plurality of objects is associated with the vehicle based on determinations of whether the first set of devices is associated with the vehicle at the first vehicle location and the second set of devices is associated with the vehicle at the second vehicle location, wherein determining whether the object of the plurality of objects is associated with the vehicle comprises:
determining that the object of the plurality of objects is associated with the vehicle in response to determining that i) a device associated with the object is determined to be associated with the vehicle at the first vehicle location and ii) the device associated with the object is determined to be associated with the vehicle at the second vehicle location.

US Pat. No. 10,922,244

SECURE STORAGE OF DATA THROUGH A MULTIFACETED SECURITY SCHEME

Wells Fargo Bank, N.A., ...

1. A method comprising:storing, by a computing system and across a subset of nodes of a plurality of nodes on a network, a plurality of data blocks, each data block generated by encrypting one or more fragments of data;
storing, by the computing system, instructions for assembling a file from the plurality of data blocks;
moving, by the computing system, each of the plurality of data blocks to a different subset of nodes on the network;
storing, by the computing system, updated instructions for assembling the file, wherein the updated instructions enable reassembling the file after moving the plurality of data blocks to the different subset of nodes; and
continuing to move at least some of the data blocks to other subsets of nodes on the network, wherein the data blocks are moved at a frequency based on utilization of the nodes on the network, and wherein the data blocks are moved more frequently during periods of low utilization.