US Pat. No. 10,970,525

SYSTEMS AND METHODS FOR USER DETECTION AND RECOGNITION

Tinoq Inc., Santa Clara,...

1. A system of user detection, comprising:a camera configured to rotate to a plurality of positions;
a sensor that is attached to a device and sends a notification signal to a processor when it detects a user is using the device,
a memory that stores a module; and
the processor coupled, locally or remotely, to the camera, configured to run the module stored in the memory that is configured to cause the processor to:
receive the notification signal from the sensor,
send a command to the camera to cause the camera to (1) rotate to a device's position from the plurality of positions, and (2) capture a photo or a video clip at the device's position,
receive the photo or the video clip from the camera,
determine whether a user is captured in the photo or the video clip, and
determine that the user is associated with the device to which the sensor is attached,
wherein the sensor senses or detects movements of an exercise device and/or the user using the exercise device.

US Pat. No. 10,970,524

FACE RECOGNITION SYSTEM, FACE RECOGNITION METHOD, DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD, AND DISPLAY CONTROL PROGRAM

NEC CORPORATION, Tokyo (...

1. A display control apparatus comprising:a memory; and
a processor coupled to the memory and configured to:
acquire similarity information based on a similarity between respective pairs of partial regions of face images, the similarity being calculated by collation processing between the respective pairs of the partial regions of the face images;
generate a display data representing the similarity information based on a factor of similarity, for each partial region of the face images, indicating whether the partial region is a first region or a second region, the first region being a region the similarity of which exceeds a threshold and the second region being a region the similarity of which does not exceed the threshold; and
output the display data.

US Pat. No. 10,970,523

TERMINAL AND SERVER FOR PROVIDING VIDEO CALL SERVICE

HYPERCONNECT, INC., Seou...

1. An application stored in a non-transitory computer-readable storage medium for a first terminal to perform a method of providing a video call service, the method comprising:receiving a first video stream of a first user of the first terminal when the application that provides the video call service is executed;
extracting facial feature points of the first user from the first video stream;
predicting whether the first user is a bad user by applying distribution information of the facial feature points of the first user to a learning model for bad user identification for filtering items, wherein the learning model is trained based on distribution information of facial feature points of a plurality of users and information of the filtering items corresponding to the distribution information of the facial feature points of the plurality of users, wherein the distribution information of facial feature points of the plurality of users is obtained from a combination of at least two of facial parts of the plurality of users, wherein the filtering items indicate a compliance item of the application; and
controlling display of a component on an execution screen of the application based on a result of the predicting.

US Pat. No. 10,970,522

DATA PROCESSING METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM

GUANGDONG OPPO MOBILE TEL...

1. A data processing method, comprising:acquiring first image data of images stored in a local device and second image data of images stored in another device;
comparing the first image data with the second image data to determine a storage type of an image contained in the first image data and/or contained in the second image data, the storage type comprising at least one of: both storing in the local device and storing in the another device, only storing in the local device, and only storing in the another device;
establishing a mapping relation between a first face group contained in the first image data and a second face group contained in the second image data according to the storage type; and
processing the first image data and the second image data with regard to the first face group and the second face group having the mapping relation with each other, wherein the first image data contains first face data of an image stored in the local device and the first face group corresponding to a face contained in the first face data, the second image data contains second face data of an image stored in the another device and the second face group corresponding to a face contained in the second face data;
establishing the mapping relation between the first face group contained in the first image data and the second face group contained in the second image data according to the storage type comprises:
when the image has the storage type of both storing in the local device and storing in the another device, matching the first face data of the image with the second face data of the image; and
when the first face data of the image and the second face data of the image contain a same face, mapping a second face group corresponding to the same face to a first face group corresponding to the same face.

US Pat. No. 10,970,521

IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD

TOSHIBA TEC KABUSHIKI KAI...

1. A color correction apparatus for a merchandise image, comprising:a first interface circuit connectable to a memory;
a second interface circuit connectable to a camera; and
a processor configured to:
acquire dictionary images of merchandises from the memory via the first interface circuit;
issue a control signal to the camera via the second interface circuit, to acquire an image of a shelf displaying a merchandise;
detect a calibration plate in the image of the shelf;
calculate a color correction value for the image according to a color of a block of the calibration plate, the color of the block matching a reference color;
correct color in the image of the shelf using the calculated color correction value to provide a color-corrected image; and
compare the color-corrected image of the merchandise to each of the dictionary images and identify the merchandise in the image of the shelf.

US Pat. No. 10,970,520

APPARATUS AND METHOD FOR IMAGE ANALYSIS USING VIRTUAL THREE-DIMENSIONAL DEEP NEURAL NETWORK

JLK INSPECTION, Cheongju...

1. An image analysis apparatus using a virtual three-dimensional deep neural network, the apparatus comprising:an image acquisition unit for stacking a plurality of two-dimensional image data in a predetermined order;
a three-dimensional image generation unit for generating a plurality of three-dimensional data on the basis of a plurality of information of different forms on the plurality of two-dimensional image data of a stacked form received from the image acquisition unit; and
a deep learning algorithm analysis unit for applying a two-dimensional convolutional neural network to each of the plurality of three-dimensional data received from the three-dimensional image generation unit, and combining results of applying the two-dimensional convolutional neural network to the plurality of three-dimensional data.

US Pat. No. 10,970,519

VALIDATING OBJECTS IN VOLUMETRIC VIDEO PRESENTATIONS

1. A method comprising:obtaining, by a processor, a volumetric video presentation depicting a scene, wherein the volumetric video presentation is associated with a metadata file containing identifying information for the scene;
identifying, by the processor, user-generated content that depicts the scene, by matching metadata associated with the user-generated content to the metadata file associated with the volumetric video presentation;
comparing, by the processor, a first object appearing in the volumetric video presentation to a corresponding second object appearing in the user-generated content, wherein the comparing comprises:
identifying a relative time and location at which the first object appears in the volumetric video presentation;
identifying a relative time and location at which the second object appears in the user-generated content; and
aligning frames of the volumetric video presentation with frames of the user-generated content based on the relative time and location at which the first object appears in the volumetric video presentation and the relative time and location at which the second object appears in the user-generated content;
assigning, by the processor, a score to the first object based on the comparing, wherein the score indicates a probability that the first object has not been manipulated; and
altering, by the processor, the volumetric video presentation to filter the first object from the volumetric video presentation when the score falls below a threshold.

US Pat. No. 10,970,518

VOXEL-BASED FEATURE LEARNING NETWORK

Apple Inc., Cupertino, C...

1. A system, comprising one or more processors and a memory coupled to the one or more processors, wherein the memory comprises program instructions configured to:implement, via the one or more processors, a voxel feature learning network, wherein the voxel feature learning network is configured to:
receive a point cloud comprising a plurality of points located in a three-dimensional space;
group respective sets of the points of the point cloud into respective voxels, wherein the respective points are grouped into the respective voxels based on locations of the respective points in the three-dimensional space and locations of the voxels in the three-dimensional space, wherein each voxel corresponds to a volume segment of the three-dimensional space;
determine, for each of one or more of the respective voxels, a plurality of point-wise concatenated features from the respective points included in the respective voxel, wherein to determine the point-wise concatenated features for a given one of the respective voxels, the program instructions are configured to:
identify a plurality of point-wise determined features;
determine a locally aggregated feature from the identified plurality of point-wise determined features via element-wise max-pooling across the plurality of point-wise determined features; and
augment, based on the locally aggregated feature, the respective ones of the point-wise features for the points to form respective point-wise concatenated features;
determine, for each of one or more of the respective voxels, a voxel feature, wherein the voxel feature is determined based on the plurality of point-wise concatenated features determined from the respective points included in the voxel; and
provide a four-dimensional (4D) tensor representation of the point cloud comprising the determined voxel features.

US Pat. No. 10,970,517

TEXTURE RECOGNITION DEVICE AND OPERATION METHOD OF TEXTURE RECOGNITION DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. An operation method of a texture recognition device, wherein the texture recognition device comprises:a light source array comprising a plurality of light;
an image sensor array comprising a plurality of groups of image sensors, wherein each group of the plurality of groups of image sensors comprises a plurality of image sensors, the image sensor array is configured to receive light emitted from the light source array and reflected to the image sensor array by a texture for a texture collection, and the plurality of groups of image sensors comprise a first group of image sensors; and
the operation method comprises:
in a first period, allowing the light source array to operate to provide a first photosensitive light source, allowing the first group of image sensors, which is capable of receiving first light emitted by the first photosensitive light source and reflected by the texture, to be in a state of sensing and generating a detection electrical signal, and allowing at least one group of image sensors that is capable of receiving the first light except the first group of image sensors to be in a state of not sensing and not generating a detection electrical signal,
wherein the plurality of groups of image sensors further comprise a second group of image sensors, and the operation method further comprises:
in a second period different from the first period, allowing the light source array to operate to provide a second photosensitive light source, allowing the second group of image sensors, which is capable of receiving second light emitted by the second photosensitive light source and reflected by the texture, to be in a state of sensing and generating a detection electrical signal, and allowing at least one group of image sensors that is capable of receiving the second light except the second group of image sensors to be in a state of not sensing and not generating a detection electrical signal,
wherein the first photosensitive light source does not overlap with the second photosensitive light source,
wherein each image sensor of the plurality of groups of image sensors comprises a photosensitive component, allowing the first group of image sensors to be in the state of sensing and generating the detection electrical signal and allowing the at least one group of image sensors except the first group of image sensors to be in the state of not sensing and not generating the detection electrical signal comprise:
allowing photosensitive components in the first group of image sensors to be under negative bias, and allowing photosensitive components in the at least one group of image sensors except the first group of image sensors to be under non-negative bias,
wherein a first terminal of each of the photosensitive components of a same group of the plurality of groups of image sensors is connected with a same bias line, photosensitive components of different groups of image sensors are respectively connected with different bias lines, and the different bias lines are respectively connected with a bias bus through first switch components; and
the operation method comprises:
in the first period, turning on a first switch component connected with the bias line which is connected with the first group of image sensors, and
in the second period, turning on a first switch component connected with the bias line which is connected with the second group of image sensors,
wherein each group of the plurality of groups of image sensors comprises of at least two non-adjacent rows of image sensors.

US Pat. No. 10,970,516

SYSTEMS AND METHODS FOR BIOMETRIC RECOGNITION

Synaptics Incorporated, ...

1. A device for updating biometric data, the device comprising:a biometric sensor; and
a processor configured to:
reject an authentication attempt based on a biometric input from the biometric sensor failing a plurality of first match determinations for a plurality of templates stored in a biometric data repository, wherein the plurality of first match determinations are made based on a plurality of match scores failing to satisfy a first match threshold;
identify a first template of the plurality of templates by determining a best match score in the plurality of match scores that fail to satisfy the first match threshold;
accept an additional authentication attempt based on an additional biometric input from the biometric sensor passing an auxiliary match determination; and
update the biometric data repository based on the biometric input.

US Pat. No. 10,970,515

METHOD AND ELECTRONIC DEVICE FOR VERIFYING FINGERPRINT

Samsung Electronics Co., ...

1. An electronic device comprising:a housing;
a display exposed through a part of the housing and disposed within the housing;
a fingerprint sensor disposed at a portion of the housing or the display and coupled with the display;
a processor electrically connected to the display and the fingerprint sensor; and
a memory electrically connected to the processor,
wherein the memory is configured to store instructions which, when executed, cause the processor to:
detect fingerprint data through the fingerprint sensor,
divide the detected fingerprint data based on at least one block,
determine, if the number of black pixels corresponding to the at least one block is equal to or less than a threshold value, the at least one block as a valid region,
determine a first group based on the at least one block corresponding to the valid region and
perform, in response to matching the fingerprint data corresponding to the determined first group against fingerprint data stored in the memory, an authentication function based on the fingerprint data corresponding to the determined first group.

US Pat. No. 10,970,514

COMPENSATION STRUCTURE AND DRIVING METHOD THEREOF, DISPLAY PANEL, AND DISPLAY DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A display panel, comprising:a first compensation structure and a second compensation structure,
a light-emitting element, and
a first control line and a second control line,
wherein each of the first compensation structure and the second compensation structure comprises:
a photoelectric sensing circuit, configured to generate a first electrical signal and a second electrical signal respectively according to a first optical signal and a second optical signal which have been received by the photoelectric sensing circuit, the first and second optical signals both from the light-emitting element;
a fingerprint identification circuit, configured to be connected to the photoelectric sensing circuit to receive the first electrical signal, and to utilize the first electrical signal for determining a fingerprint image; and
a compensation circuit, configured to be connected to the photoelectric sensing circuit to receive the second electrical signal, and to utilize the second electrical signal for optical compensation such that the first electrical signal is adjusted,
wherein the fingerprint identification circuit comprises:
a first switch circuit, connected to the photoelectric sensing circuit and configured to output the first electrical signal to a first node in response to a first control signal;
a follower circuit, connected to the first node and configured to output a voltage of the first node to the second node; and
a second switch circuit, respectively connected to a reset signal terminal and the first switch circuit, and configured to write a reset voltage from the reset signal terminal to the first node in response to a second control signal;
the compensation circuit comprises a third switch circuit which is connected to the photoelectric sensing circuit and configured to output the second electrical signal to a third node in response to a third control signal;
the first control line is connected to and control the first switch circuit of the first compensation structure and the third switch circuit of the second compensation structure respectively;
the second control line is connected to and control the third switch circuit of the first compensation structure and the first switch circuit of the second compensation structure respectively.

US Pat. No. 10,970,513

ARRAY SUBSTRATE, DISPLAY SCREEN, AND ELECTRONIC DEVICE

GUANGDONG OPPO MOBILE TEL...

1. An array substrate, comprising a first base material, and a display circuit layer and a recognition circuit layer laminated on the first base material;wherein the display circuit layer comprises a plurality of gate lines, a plurality of data lines, and a plurality of thin-film transistors (TFT), projections of the plurality of gate lines on the first base material and projections of the plurality of data lines on the first base material defining a plurality of sub-pixel projection areas, and each of projections of the plurality of TFTs on the first base material falling into a corresponding area of the plurality of sub-pixel projection areas; and
wherein the recognition circuit layer comprises a plurality of photoelectric sensors, projections of the plurality of photoelectric sensors on the first base material falling into a corresponding area of the sub-pixel projection areas, and the photoelectric sensor being configured to sense target lights carrying user fingerprint information;
wherein the target lights are visible lights, and the display circuit layer is located between the first base material and the recognition circuit layer;
wherein each of the plurality of photoelectric sensors comprises a cathode, a photosensitive layer, and an anode sequentially laminated; the cathode is located on one side of the photosensitive layer towards the first base material; and the anode is made of a transparent conductive material and is located on one side of the photosensitive layer away from the cathode; and
wherein the array substrate further comprises a plurality of pixel electrodes, each of projections of the plurality of pixel electrodes on the first base material falls into a corresponding area of the plurality of sub-pixel projection areas, each of the plurality of pixel electrodes is electrically coupled with a corresponding one of the plurality of TFTs, and the plurality of pixel electrodes and the anodes of the plurality of photoelectric sensors are disposed on the same layer.

US Pat. No. 10,970,512

FINGERPRINT SENSING APPARATUS AND METHOD HAVING LARGE-AREA SENSING MECHANISM

NOVATEK Microelectronics ...

1. A fingerprint sensing apparatus having a large-area sensing mechanism, comprising:at least three optical fingerprint sensing circuits configured to perform sensing within a plurality of sensing areas to obtain a plurality of sensed images, wherein each of the sensing areas corresponds to one of the optical fingerprint sensing circuits; and
a processing circuit electrically coupled to the optical fingerprint sensing circuits to receive the sensed images and configured to splice the sensed images together to form an integrated sensed image,
wherein a number of the optical fingerprint sensing circuits is 4 and a plurality centers each corresponding to one of the sensing areas are arranged to form a parallelogram;
wherein no more than two of the sensing areas are overlapped at the same time and the sensing areas together form a continuous area.

US Pat. No. 10,970,511

SYSTEM AND METHOD FOR CORRECTING DISTORTIONS IN A BIOMETRIC IMAGE

Synaptics Incorporated, ...

1. A method for compensation for distortion in a biometric image, the method comprising:acquiring first sensor data from a sensing device;
generating the biometric image based at least in part on the first sensor data;
acquiring second sensor data from the sensing device, the second sensor data corresponding to a calibration image displayed on a display device, wherein the calibration image comprises elements associated with pixels of the display device; and
generating a corrected biometric image based at least in part on the biometric image and the second sensor data.

US Pat. No. 10,970,510

SENSOR AND SENSOR-EQUIPPED DISPLAY DEVICE

Japan Display Inc., Toky...

1. A sensor comprising:a first control line;
a first signal line;
a first auxiliary line;
a first detection electrode;
a first detection switch connected to the first detection electrode, the first control line and the first signal line;
a second detection switch connected to the first detection electrode, the first control line and the first auxiliary line;
a first circuit connected to the first control line, and supplying a drive signal to the first control line to change a state of the first detection switch and the second detection switch to either of a first connection state and a second connection state; and
a second circuit connected to the first signal line and the first auxiliary line,
wherein
the first detection electrode is electrically connected to the first signal line and electrically disconnected from the first auxiliary line in the first connection state, and
the first detection electrode is electrically connected to the first auxiliary line and electrically disconnected from the first signal line in the second connection state.

US Pat. No. 10,970,509

FINGERPRINT RECOGNITION APPARATUS

Novatek Microelectronics ...

1. A fingerprint recognition apparatus, comprising:a pixel array, obtaining a fingerprint data;
a control circuit, coupling to the pixel array and obtaining characteristic values of the pixel array;
an effective fingerprint distribution judgement circuit, coupling to the pixel array and determining a first part of the pixel array as an effective fingerprint zone and a second part of the pixel array as an invalid fingerprint zone according to the characteristic values of each row of the pixel array; and
a multi-compressing circuit, coupling to the effective fingerprint distribution judgement circuit and compressing the fingerprint data in the effective fingerprint zone with a first compression method and compressing the fingerprint data in the invalid fingerprint zone with a second compression method.

US Pat. No. 10,970,508

METHOD AND APPARATUS FOR PERFORMING DIFFERENT DECODING ALGORITHMS IN DIFFERENT LOCATIONS

COGNEX CORPORATION, Nati...

1. A method for decoding codes applied to objects for use with an image sensor that includes a two dimensional field of view (FOV), the method comprising:obtaining, using the image sensor, an image, wherein the image includes a first region corresponding to a central portion of the image sensor FOV and a second region;
attempting to decode a first code candidate in the first region of the image using a first decode algorithm; and
attempting to decode a second code candidate in only the second region of the image using a second decode algorithm, wherein the first decode algorithm requires a greater amount of time to complete than the second decode algorithm.

US Pat. No. 10,970,507

DISABLE SCANNER ILLUMINATION AND AIMER BASED ON PRE-DEFINED SCANNER POSITION

Zebra Technologies Corpor...

1. A method for controlling illumination of barcode reader, the method comprising:receiving, at the barcode reader, an angular position of the barcode reader, wherein the angular position is relative to a reference angular position of the barcode reader;
determining when the angular position of the barcode reader is in a disable angular region; and
in response to the angular position of the barcode reading being in the disable angular region, disabling at least one of an illumination system in the barcode reader to prevent the barcode reader from illuminating a field of view or an aiming system in the barcode reader to disable the barcode reader from transmitting an aiming visual indicator.

US Pat. No. 10,970,506

BIOPTIC DATA READER WITH WIDE-ANGLE FIELD-OF-VIEW

DATALOGIC USA, INC., Eug...

1. A data reading system for reading encoded data on an item, the data reading system comprising:a platter supported by a lower base section, the platter having a first end, an opposite second end, and a mid-region positioned between the first and second ends, the mid-region having a first scan window arranged thereon;
a bonnet arranged adjacent the first end of the platter, the bonnet extending upwardly from the platter and including a front face oriented toward the second end of the platter, the front face including a second scan window arranged thereon;
a single first imager housed in the lower base section adjacent the first scan window on the platter, the single first imager having a non-segmented and non-redirected first field-of-view directed upwardly through the first scan window and toward the bonnet, wherein the first field-of-view of the single first imager encapsulates at least the second scan window on the bonnet, the single first imager operable to capture a first image of the item as the item passes across the first scan window; and
a single second imager housed in the bonnet adjacent the second scan window, the single second imager having a non-segmented and non-redirected second field-of-view directed through the second scan window and toward the platter, wherein the second field-of-view of the single second imager encapsulates at least the first scan window on the platter, the single second imager operable to capture a second image of the item as the item passes across the second scan window, wherein the first and second fields of view are each wide-angle fields-of-view, wherein the first and second fields-of-view are arranged at an angle ranging between 70° and 120 °.

US Pat. No. 10,970,505

SPLIT-TYPE CODE READING APPARATUS

Advanced New Technologies...

1. An apparatus for two-part barcode reading, comprising:a supporting base with a reading window that comprises:
a cavity formed in the supporting base;
a reflector disposed inside of the cavity, wherein the reflector is parallel to a surface when the supporting base is placed on the surface;
a translucent plate that covers an opening of the cavity and forms an acute angle with the reflector; and
a hole disposed on a side of the cavity opposite to the reflector, wherein the hole is covered by a second plate which allows light to pass through and forms an enclosed space to include the reflector therein; and
a handheld code scanner with a camera, wherein the camera is aligned with the hole when the handheld code scanner is detachably placed on the supporting base, so that incoming light reflected by the reflector is capable of being directed to the camera through the hole.

US Pat. No. 10,970,504

METHOD FOR READING MACHINE-READABLE MARKS ON RACKS AND RECEPTACLES

GEN-PROBE INCORPORATED, ...

1. A method of reading machine-readable marks on a moveable support and objects of a sample instrument, the method comprising the steps of:(a) capturing a first image of the moveable support as the moveable support moves from a first position to a second position using an image capture device;
(b) determining whether a first fiducial machine-readable mark on the moveable support is in the first image;
(c) determining, when the first fiducial machine-readable mark is in the first image, whether a first machine-readable mark on an object coupled to the moveable support is in the first image at a predetermined position relative to the first fiducial machine-readable mark; and
(d) associating information decoded from the first machine-readable mark on the object with a first location on the moveable support associated with the first fiducial machine-readable mark.

US Pat. No. 10,970,503

IMAGING ARRANGEMENTS AND BARCODE READERS INCLUDING SUCH IMAGING ARRANGEMENTS

Zebra Technologies Corpor...

1. An imaging arrangement for use in a barcode reader, comprising:a housing;
a light source configured to emit light along a central light axis, the light source being disposed in the housing;
a lens having a first surface and a second surface opposite the first surface, the lens being disposed in the housing, the first surface configured to face the light source and structured to substantially collimate light received from the light source into a collimated beam, the second surface including surface structures structured to generate a patterned beam in response to receiving the collimated beam; and
an aperture, the aperture being disposed between the light source and the lens, the aperture sized to enable a first portion of the light emitted from the light source to pass through the lens and to prevent a second portion of the light emitted from the light source from passing through the lens,
wherein the aperture is disposed adjacent the first surface to enable a portion of the first surface to extend through the aperture toward the light source.

US Pat. No. 10,970,502

DATA COLLECTION SYSTEMS AND METHODS TO CAPTURE IMAGES OF AND DECODE INFORMATION FROM MACHINE-READABLE SYMBOLS

Datalogic IP Tech, S.r.l....

1. A data collection system, comprising:a scan engine comprising:
a two-dimensional image sensor having a field-of-view, and which in operation captures a sequence of frames of two-dimensional images;
a set of image processor circuitry communicatively coupled to the two-dimensional image sensor to receive at least some of the frames of two-dimensional images therefrom, and which in operation logically associates a respective identifier with each of the frames of two-dimensional images, the respective identifier which uniquely identifies the respective frame of the two-dimensional images for other ones of the frames of two-dimensional images in the sequence of frames of two-dimensional images;
a set of decoding processor circuitry directly or indirectly communicatively coupled to the two-dimensional image sensor to receive at least some of the frames of two-dimensional images therefrom, and which in operation decodes a number of machine-readable symbols represented in the frames of two-dimensional images;
a first output interface communicatively coupled to the set of image processor circuitry to provide, therefrom, a set of the frames of two-dimensional images with the respective identifiers as at least one of raw two-dimensional images or two-dimensional images as captured by the two-dimensional image sensor, with only the respective identifiers appended thereto; and
a second output interface communicatively coupled to the set of decoding processor circuitry to provide, therefrom, information decoded from machine-readable symbols by the set of decoding processor circuitry, in parallel with the set of the frames of two-dimensional images with the respective identifiers provided by first output interface.

US Pat. No. 10,970,501

BARCODE SCANNING SYSTEM WITH IMAGE OR VIDEO OUTPUT(S)

Datalogic USA, Inc., Eug...

1. A code reader, comprising:at least one imager configured to capture image data of a scene including a machine-readable indicia;
a first circuit in electrical communication with said at least one imager, and configured to receive the image data from said at least one imager;
a second circuit in communication with said at least one imager and said first circuit, and configured to:
control operation of said at least one imager;
process the image data including the machine-readable indicia to decode and/or identify data represented by the machine-readable indicia; and
output the decoded machine-readable indicia data to a computer;
a third circuit in electrical communication with said first circuit, and configured to:
process image data to produce processed image data; and
output the processed image data to the computer; and
a second imager in electrical communication with said first circuit, and configured to capture second image data of the scene including the machine-readable indicia, said first circuit communicating the second image data to said third circuit.

US Pat. No. 10,970,500

SCANNING DEVICE AND METHOD FOR USE IN AN AUTOMATED ANALYSER

STRATEC SE, Birkenfeld (...

1. A scanning device for use in an automated analyser, the scanning device comprising a camera, a camera slide, a drive unit, one V-shaped deflection mirror with two angled deflecting sides and a deflection mirror mount with an oblong hole, wherein the camera is positioned on the camera slide and the V-shaped deflection mirror is mounted on the deflection mirror mount and the deflection mirror mount is connected to the camera slide over the oblong hole, defining the distance between two focus levels between the camera and the V-shaped deflection mirror.

US Pat. No. 10,970,499

DYNAMICALLY CHANGING A TAG'S DISPLAYED CONTENT BASED ON THE TYPE OF CUSTOMER INTERACTION WITH AN ITEM

Sensormatic Electronics, ...

1. A method for dynamically changing displayed content of a tag attached to a first retail item, comprising:performing operations by at least one sensor of the tag to detect when an individual has a first interaction with the first retail item while the individual is located in proximity to the first retail item;
determining, by the tag, an interaction type for the first interaction, while the individual is still located in proximity to the first retail item;
selecting at least one first accessory from a plurality of accessories for the first retail item based on the interaction type;
obtaining information for the selected at least one first accessory that is to be presented to the individual;
dynamically changing the displayed content of the tag to include the information obtained for the selected at least one first accessory, while the individual is still in proximity to the tag; and
dynamically changing the displayed content of the tag to include information about at least one second accessory selected from the plurality of accessories based on a second interaction that the individual has with the first retail item while the individual is located in proximity to the first retail item, where the second accessory is different than the first accessory and the second interaction is different than the first interaction.

US Pat. No. 10,970,498

CHIPLESS RFID DECODING SYSTEM AND METHOD

Palo Alto Research Center...

1. A method of decoding a chipless radio frequency identification (RFID) tag comprising:transmitting an interrogation signal from one or more test positions relative to the RFID tag;
receiving one or more test response signals from the RFID tag, the one or more test response signals respectively responsive to the interrogation signal transmitted from the one or more test positions;
simulating one or more simulated response signals corresponding to one or more simulated positions of the interrogation signal; and
training a decoding processor to decode an identification (ID) of the RFID tag using the test response signals and the simulated response signals;
wherein simulating the one or more simulated response signals comprises:
providing a data augmentation processor with an RFID tag identification, frequency of a simulated interrogation signal, and position of the simulated interrogation signal; and
simulating data point values of the simulated response signal based on the RFID tag identification, frequency of the simulated interrogation signal, and one or both of position and angle of the simulated interrogation signal.

US Pat. No. 10,970,497

METHOD OF HARVESTING RADIO-FREQUENCY ENERGY, CORRESPONDING CIRCUIT AND DEVICE

STMICROELECTRONICS S.r.l....

1. A method of operating a radiofrequency harvester circuit, comprising:scanning a plurality of tuning bands of a selectively tunable antenna unit by selectively tuning the antenna unit at frequency bands in the plurality of tuning bands;
evaluating a power of radiofrequency signals captured by the antenna unit at said frequency bands in the plurality of tuning bands, the evaluating including sensing respective values indicative of the power of radiofrequency signals captured by the antenna unit at said frequency bands in the plurality of tuning bands;
identifying, as a function of said respective values, one of said frequency bands having a highest power of radiofrequency signals captured by the antenna unit; and
operating the radiofrequency harvester circuit with the antenna unit tuned at said one of said frequency bands,
wherein the sensing respective values indicative of the power of radiofrequency signals captured by the antenna unit includes:
applying by the harvesting circuitry a load to the antenna unit, the antenna unit providing a signal to the load;
increasing the load applied by the harvesting circuitry to the antenna unit to produce a drop in the signal provided by the antenna unit to the harvesting circuitry; and
sensing a value indicative of the power of radiofrequency signal captured by the antenna unit in response to the signal provided by the antenna unit to the harvesting circuitry reaching a lower threshold.

US Pat. No. 10,970,496

NFC TAGS WITH PROXIMITY DETECTION

Avery Dennison Retail Inf...

1. A method of implementing a NFC security system comprising:providing a display, the display having a NFC security system having a security controller, an NFC reader, an inductive coil, and at least one detector;
placing an external NFC reader near the display to read at least one NFC tag;
triggering the system;
detecting a rogue signal from at least one unauthorized NFC tag; and
determining an action for disabling the at least one unauthorized NFC tag.

US Pat. No. 10,970,495

SYSTEMS AND METHODS OF ESTABLISHING RFID NULL ZONES IN DETECTING PRODUCTS IN A RETAIL ENVIRONMENT

Walmart Apollo, LLC, Ben...

1. An RFID (radio frequency identification) tag reading system, comprising:multiple sets of RFID readers at a retail shopping facility; and
a tag evaluation control circuit communicatively coupled with the multiple sets of RFID readers and at least one memory, and configured to:
receive RFID tag information from the multiple sets of RFID readers, wherein each RFID tag information corresponds to a particular one of numerous RFID tags each associated with a different unique item of products;
obtain a first set of rules to identify a transition area within the retail shopping facility;
apply the first set of rules and identify a first transition area within the retail shopping facility based on the received RFID tag information;
identify a first set of at least one RFID readers, of the multiple set of RFID readers, configured to read RFID tags as the RFID tags move through the identified first transition area;
obtain a second set of rules to establish a null area;
apply the second set of rules and establish a first null area adjacent the first transition area configured to enable RFID tags crossing through the first null area and prior to entering the first transition area to be in a predefined state when entering the first transition area; and
define one or more dimensions of the null area as a function of a maximum duration of transition of the RFID tags from a non-predefined state to the predefined state, and an expected average speed of the RFID tags as the RFID tags are moved through the null area.

US Pat. No. 10,970,494

SYSTEMS AND METHODS FOR IMPROVED CONVERSATION TRANSLATION

CAPITAL ONE SERVICES, LLC...

1. A method for improved conversation translation comprising:receiving, by a processor, a first portion of a conversation in a first language from a first user device associated with a first user;
translating, by the processor, the first portion of the conversation from the first language to a second language with a translation algorithm;
generating, by the processor, a predicted second portion of the conversation in the second language with a predictive algorithm;
generating, by the processor, a predictive translation in the second language comprising the first portion and the predicted second portion in the second language;
identifying, by the processor, one or more conversational nuances from the conversation;
generating, by the processor, a color-coded translation highlighting the one or more conversational nuances in a first color; and
sending, by the processor, the predictive translation to a second user device to cause the second user device to display the predictive translation on a screen of the second user device as a first graphical user interface.

US Pat. No. 10,970,493

SYSTEMS AND METHODS FOR SLOT RELATION EXTRACTION FOR MACHINE LEARNING TASK-ORIENTED DIALOGUE SYSTEMS

Clinc, Inc., Ann Arbor, ...

1. A system for implementing slot-relation extraction in a task-oriented dialogue system, the system comprising:a natural language understanding (NLU) module implemented by one or more computers of a machine learning task-oriented dialogue system, the NLU module comprising:
(i) an intent classification sub-module comprising one or more dialogue intent classification machine learning models that predict an intent category of dialogue of a single utterance based on an input of utterance data, wherein the category of dialogue informs a selection of one or more slot-filling machine learning models;
(ii) a slot-filling sub-module comprising the one or more slot-filling machine learning models that predict one or more slot classification labels for each of a plurality of slots within the single utterance; and
(iii) a slot relation extraction sub-module comprising a slot relation extraction machine learning model that predicts one or more semantic relationship classifications between distinct pairings of two or more distinct slots of the single utterance based on an input of the intent category of dialogue prediction and the one or more slot classification label predictions for each of the plurality of slots within the single utterance;
wherein the NLU module identifies one or more semantic relationships between the distinct pairings of the two or more distinct slots of the single utterance based on the one or more semantic relationship classification predictions of the slot relation extraction machine learning model; and
a response generator that constructs a response to the single utterance or performs one or more actions in response to the single utterance based on the one or more semantic relationships between the distinct pairings of the two or more distinct slots of the single utterance.

US Pat. No. 10,970,492

IOT-BASED CALL ASSISTANT DEVICE

AffectLayer, Inc., Tel A...

1. A computer-implemented method comprising:receiving, by a processor, a message from a call assistant device associated with an individual,
wherein the message includes (a) a timestamp, (b) a device identifier associated with the call assistant device, and (c) a type of action performed by the individual on the call assistant device;
determining, by the processor based on the type of action, a task to be performed in association with a call in which the individual participated;
executing, by the processor, the task in association with the call; and
generating, by the processor, a result from executing the task.

US Pat. No. 10,970,491

INCIDENT MATCHING WITH VECTOR-BASED NATURAL LANGUAGE PROCESSING

ServiceNow, Inc., Santa ...

1. A system comprising:a database containing a corpus of text strings;
an artificial neural network (ANN) comprising an encoder; and
a server device configured to:
for each text string of the corpus of text strings:
identify words of the text string and, for each respective word, identify one or more substrings of the text string that are related to the respective word;
adjust weights of the ANN to associate each respective word with the one or more substrings that are related to the respective word;
provide each of the words of the text string to the encoder of the ANN to generate a respective vector representation for each of the words;
aggregate each respective vector representation of each of the words of the text string to generate an aggregate vector representation of the text string; and
store the aggregate vector representation of the text string in the database and associate the aggregate vector representation with the text string within the database.

US Pat. No. 10,970,490

AUTOMATIC EVALUATION OF ARTIFICIAL INTELLIGENCE-BASED PROCESSES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:providing an artificial intelligence-based evaluation system to evaluate an artificial intelligence-based tutor, the artificial intelligence-based evaluation system:
automatically generating a conversation for simulation by the artificial intelligence-based tutor, the conversation regarding content on which the artificial intelligence-based tutor is being trained, and wherein the automatically generating the conversation by the artificial intelligence-based evaluation system uses natural language processing, and comprises automatically generating inputs from a simulated student regarding the content, and automatically generating on behalf of the artificial intelligence-based tutor expected responses to the inputs automatically generated from the simulated student;
providing the conversation as an output to be input to the artificial intelligence-based tutor for simulation by the artificial intelligence-based tutor; and
automatically evaluating the expected responses to determine whether the artificial intelligence-based tutor is performing as expected, wherein the automatically evaluating the expected responses comprises comparing the expected responses with actual responses from simulating the conversation by the artificial intelligence-based tutor to determine whether the artificial intelligence-based tutor is performing as expected.

US Pat. No. 10,970,489

SYSTEM FOR REAL-TIME EXPRESSION OF SEMANTIC MIND MAP, AND OPERATION METHOD THEREFOR

SHANGHAI BANPO NETWORK TE...

1. A system for real-time expression of a semantic mind map, comprising:an association matrix, connected to a focus associated operation module, wherein the association matrix comprises a start node, a direct associated module, an indirect associated module, a weakly associated module, and a superscript module, wherein
the start node, connected to the direct associated module, and configured to mark a first left column of the association matrix on a display interface, the start node is 1 to M featured text words, an initial value is featured user query words, and M is a natural number;
the direct associated module, connected to the indirect associated module, and configured to mark a node in subsequent right columns of the start node in the association matrix which has a text in-sentence co-occurrence relationship with featured text words;
the indirect associated module, connected to the weakly associated module, and configured to mark a node in subsequent right columns of a direct associated node in the association matrix which has a text in-sentence co-occurrence relationship with a featured text word of a previous direct associated node but not previously marked;
the weakly associated module, configured to mark a nodes in subsequent right columns of an indirect associated node in the association matrix which has an in-sentence co-occurrence relationship with a featured text word of the indirect associated node but not previously marked, and in order to reduce hierarchical complexity, the weakly associated module is further configured to mark all remaining nodes in the association matrix;
a superscript module, giving an upper-right superscript of each node in the association matrix, and configured to mark the number of relevant documents of the node in a current search result subset; and
the focus associated operation module comprises a focused node and a focus associated node, wherein
the focused node is configured to select a node in the association matrix and make the selected node to be a current focused node; and
the focus associated node, connected to the focused node, and configured to mark all nodes in columns of the association matrix and having an in-sentence or in-document co-occurrence relationship with the featured text word of the focused node.

US Pat. No. 10,970,488

FINDING OF ASYMMETRIC RELATION BETWEEN WORDS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for finding an asymmetric relation between a plurality of target words, the method comprising:preparing a plurality of image sets each including one or more images relevant to a corresponding one of the plurality of the target words, including retrieving the one or more images of each of the plurality of image sets with the corresponding one of the plurality of target words as a query for an image search system;
obtaining a plurality of object labels for each of the plurality of image sets;
computing a representation for each of the plurality of target words using the plurality of object labels obtained for each of the plurality of image sets; and
determining an asymmetric relation measure between the plurality of target words based a hypernym-hyponym score calculated using the representations computed for the plurality of target words.

US Pat. No. 10,970,487

TEMPLATED RULE-BASED DATA AUGMENTATION FOR INTENT EXTRACTION

ServiceNow, Inc., Santa ...

1. An agent automation system, comprising:a memory configured to store a natural language understanding (NLU) framework, an intent/entity model, and an understanding model, wherein the understanding model comprises a plurality of original meaning representations generated from sample utterances of the intent/entity model; and
a processor configured to execute instructions of the NLU framework to cause the agent automation system to perform actions comprising:
performing rule-based generalization of the understanding model to generate at least one generalized meaning representation of the understanding model from the plurality of original meaning representations;
performing rule-based refinement of the understanding model to prune or modify the at least one generalized meaning representation of the understanding model, or the plurality of original meaning representations of the understanding model, or a combination thereof; and
after performing the rule-based generalization and the rule-based refinement of the understanding model:
generating at least one meaning representation for a received user utterance; and
searching the at least one meaning representation of the received user utterance within the understanding model to extract intents/entities from a received user utterance.

US Pat. No. 10,970,486

USING UNSTRUCTURED INPUT TO UPDATE HETEROGENEOUS DATA STORES

salesforce.com, inc., Sa...

1. A method for natural language processing, the method comprising:receiving, by one or more processors of a server, unstructured text input;
receiving, by the one or more processors, a template for interpreting the unstructured text input;
identifying, using an entity classifier, entities in the unstructured text input including a type of each of the entities, a value of each of the entities, and a confidence level in the identifying, wherein the type of each of the entities is selected from a group consisting of an organization, a person, a date, a time, a percentage, a monetary value, and a pick list type;
identifying, by the one or more processors, one or more potential parent entities from the identified entities based on the template;
receiving, by the one or more processors, a selection of a parent entity from the one or more potential parent entities;
identifying, by the one or more processors, one or more potential child entities from the identified entities based on the template and the selected parent entity;
receiving, by the one or more processors, a selection of a child entity from the one or more potential child entities;
identifying, by the one or more processors, an action item in the unstructured text input based on the identified entities and the template;
determining, using an intent classifier, an intent of the action item; and
updating a data store based on the determined intent, the identified entities, and the selected child entity.

US Pat. No. 10,970,485

SYSTEMS AND METHODS FOR SELECTING EFFECTIVE PHRASES TO BE PRESENTED DURING A CONVERSATION

CRESTA INTELLIGENCE INC.,...

1. One or more non-transitory computer-readable media storing instructions, which when executed by one or more hardware processors, cause performance of operations comprising:monitoring a conversation in real-time to detect one or more attributes of the conversation;
identifying a desired outcome of a conversation based on the one or more attributes;
identifying one or more phrases for accomplishing the desired outcome of the conversation;
determining a confidence score for each particular phrase of the one or more phrases, the confidence score associated with a likelihood that the desired outcome will be accomplished subsequent to using the particular phrase in the conversation, wherein determining the confidence score further comprises;
identifying at least one prior conversation having a prior desired outcome similar to the desired outcome of the conversation;
determining that the one or more phrases were used in the at least one prior conversation;
determining one or more rates at which the prior desired outcome of the at least one prior conversation was accomplished;
determining the confidence score of the one or more phrases in proportion to the rate at which the desired outcome were accomplished in the at least one prior conversation;
based at least on a first confidence score of accomplishing the desired outcome subsequent to using a first phrase of the one or more phrases: selecting the first phrase from the one or more phrases; and
presenting the first phrase for use in the conversation.

US Pat. No. 10,970,484

METHOD AND SYSTEM FOR PROVIDING ENCODED COMMUNICATION BETWEEN USERS OF A NETWORK

MYBLIX SOFTWARE GMBH, Su...

1. A method of providing encoded communication between users (10, 20) of a network (68) subscribed to a messaging system (1), the method comprising the steps of:encoding of a first message (11) of a first user (10) into a first encoded message (111) with a first electronic device (12) using a default code,
transmitting the first message (11) or the first encoded message (111) at least to a second user (20) using a second electronic device (21),
displaying the first encoded message (111) on a display (23) of the second electronic device (20),
decoding the first encoded message (111) to obtain the first message (11) and displaying the first message (11) on the display (23) of the second electronic device (22) in response to an interaction with the second user (20),
providing at least one n-gram (40, 41, 42, 50, 51, 52) to a user (10, 20, 30), wherein the n-gram (40, 41, 42, 50, 51, 52) comprises a sequence of at least two characters,
defining a replacement rule (70) by selecting the at least one n-gram (40, 41, 42, 50, 51, 52) and assigning the selected n-gram (40, 41, 42, 50, 51, 52) with at least one replacement code character (76), and
activating the replacement rule by substituting each appearance of the selected n-gram (40, 41, 42, 50, 51, 52) in the first message (11) with the replacement code character (76).

US Pat. No. 10,970,483

INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM

FUJI XEROX CO., LTD., To...

1. An information processing apparatus comprising:a first extraction part that extracts a value corresponding to a first item, which is an item indicative of a deadline, from a result of character recognition with respect to an image acquired by reading a document which includes an item and a value corresponding to the item;
a generation part that generates a second character string of a date format indicative of a date of the deadline based on the result of the character recognition in a case where the value extracted by the first extraction part is a first character string other than the date format; and
an output part that outputs the generated second character string as the value corresponding to the first item.

US Pat. No. 10,970,482

ASSISTED DATA INPUT

Advanced New Technologies...

1. A computer-implemented method, comprising:saving a piece of text for security verification on a computing device;
generating one or more pieces of related text corresponding to the piece of saved text, wherein each text element of the one or more pieces of related text is generated based on its proximity to a corresponding text element of the piece of saved text on one or more keyboards on the computing device;
receiving a piece of input text for information verification;
comparing the piece of input text with the piece of saved text and the one or more pieces of related text;
determining that the piece of input text matches one of the one or more pieces of related text; and
providing input guidance for re-entering a piece of text for security authentication,
wherein the piece of re-entered text is masked for security after showing as plaintext for a predetermined period of time, wherein the input guidance is an extension of the predetermined period of time for showing the piece of re-entered text in plaintext before masking, and wherein the extension of the predetermined period of time for showing the piece of re-entered text includes showing one or more text elements of the piece of input text that do not match corresponding text elements of the piece of saved text, but match corresponding text elements of the one of the one or more pieces of related text with an extension of time and showing other text elements of the piece of re-entered text with the predetermined period of time.

US Pat. No. 10,970,481

INTELLIGENTLY DELETING BACK TO A TYPOGRAPHICAL ERROR

Apple Inc., Cupertino, C...

1. A method, comprising:presenting, via a display of a computing device, a first character;
receiving, via one or more input devices of the computing device, first user input corresponding to a first key of a keyboard of the computing device, wherein the first key corresponds to a second character;
in response to the first user input, presenting, via the display of the computing device, a first sequence of characters including the first character and the second character, wherein the second character is added after the first character such that the first character and the second character are concurrently presented via the display;
receiving, via the one or more input devices, second user input corresponding to a second key of the keyboard, wherein the second key corresponds to a third character;
in response to the second user input, presenting, via the display of the computing device, a second sequence of characters including the first character, the second character, and the third character, wherein the third character is added after the second character such that the first character, the second character, and the third character are concurrently presented via the display;
determining, by the computing device, that a particular character in the second sequence of characters corresponds to a typographical error;
after concurrently presenting the first character, the second character, and the third character:
receiving, by the computing device, third user input corresponding to a third key of the keyboard, wherein the third key corresponds to a delete operation; and
in response to the third user input:
in accordance with a determination that a first set of one or more criteria are met, only deleting, by the computing device, the third character such that the first character and the second character are still concurrently presented via the display and the third character is not still presented via the display, wherein the first set of one or more criteria include a criterion that is met when the third character is the typographical error; and
in accordance with a determination that a second set of one or more criteria are met, only deleting, by the computing device, the second character and the third character such that the first character is still presented via the display and the second character and the third character are not still presented via the display, wherein the second set of one or more criteria include a criterion that is met when the second character is the typographical error,
wherein no character is added in response to the third user input.

US Pat. No. 10,970,480

METHOD AND SYSTEM FOR CONTENT MANAGEMENT FOR RESUME GENERATION

HIVE DIVERSITY INC., New...

1. A computerized method for electronic management of input content for a computer-generated resume via an electronic user interface, the resume having a plurality of content sections, the method comprising:determining a number of section lines within a content section of the plurality of content sections;
the content section including a plurality of fields, determining a number of field lines for each of the plurality of fields based on dividing up the number of section lines amongst the plurality of fields, wherein the number of section lines and the number of fields lines are limited based on a predetermined sizing restriction for the computer-generated resume;
updating the electronic user interface to update a display on the user interface indicating the plurality of fields and the number of field lines for each of plurality of fields;
via the user interface, receiving user input for each of the plurality of fields;
concurrent with the receiving of the user input for each of the plurality of fields, tracking the user input for each of the plurality of fields relative to the number of field lines for each of the plurality of fields;
further updating the display indicating the plurality of fields and the number of fields lines for each of the plurality of fields;
managing an electronic generation of the computer-generated resume by interacting with the user via the user interface to modify the user input and dynamically adjust the number of field lines for one or more of the fields; and
updating the content section of the computer-generated resume based the modifying the user input and adjusting the number of field lines.

US Pat. No. 10,970,479

OPERATIONS ON SOUND FILES ASSOCIATED WITH CELLS IN SPREADSHEETS

Microsoft Technology Lice...

1. A system comprising:at least one processing unit; and
at least one memory storing computer executable instructions that, when executed by the at least one processing unit, cause the system to perform, steps of:
receiving at least one audio file;
extracting a value of a parameter of the at least one audio file;
storing the value of the parameter and the at least one audio file in a compound data type having a structured format, wherein the compound data type is associated with at least one cell of a spreadsheet;
exposing one or more spreadsheet operations; and
based on the value of the parameter, performing a spreadsheet operation of the one or more spreadsheet operations on the at least one cell, wherein the spreadsheet operation relocates the at least one cell and the at least one audio file within the spreadsheet.

US Pat. No. 10,970,478

TABULAR DATA ANALYSIS METHOD, RECORDING MEDIUM STORING TABULAR DATA ANALYSIS PROGRAM, AND INFORMATION PROCESSING APPARATUS

FUJITSU LIMITED, Kawasak...

1. A tabular data analysis method comprising:determining, by a computer, whether a cell having data is present for each row or each column of input tabular data in which an item and data are associated with each other;
extracting, in a case where there is one or more cells having data, a block of rows or columns in which the one or more cells are consecutively included, as a part related to one piece of table data;
counting a number of cells to which data is input, in the block of rows or columns, for each row or each column;
adding a new row further above an uppermost row and a new column further left of a leftmost column and specifying the added row or the added column as an item row or an item column indicating the item, in a case where the uppermost row or the leftmost column among rows or columns having a maximum count value includes a cell having the same input data or in a case where the uppermost row or the leftmost column among rows or columns having a maximum count value includes a blank cell in which no data is input; and
specifying the uppermost row or the leftmost column as the item row or the item column in a case both where the uppermost row or the leftmost column among rows or columns having the maximum count value of the number of the cells to which the data is input includes no cell having the same input data and where the uppermost row or the leftmost column among rows or columns having the maximum count value of the number of the cells to which the data is input includes no blank cell in which no data is input.

US Pat. No. 10,970,477

COMPUTER-IMPLEMENTED METHODS SYSTEMS AND ARTICLES OF MANUFACTURE FOR AUTOMATED CONSTRUCTION OF COMPUTER-GENERATED USER INTERFACE

INTUIT INC., Mountain Vi...

1. A computer-implemented method, comprising:a computer, by a processor executing computer-executable instructions of a first interface controller of an electronic document preparation application,
accessing a template database defining respective pre-defined and static structures of respective electronic forms of the electronic document preparation application,
identifying an electronic form based at least in part upon input or navigation by a first user of a first computing device utilizing the electronic document preparation application to prepare an electronic document, wherein the at least one electronic form is presented to the first user through a first display of a first computing device;
receiving first electronic data from the first computing device based at least in part upon the first user interacting with the first computing device and the electronic form, and
storing the first electronic data to a shared data store to update current electronic document data of the electronic document;
the computer, by the processor executing computer-executable instructions of an interface content engine,
eliminating, via a decision table data structure, at least one question and an associated portion of the electronic form from the current electronic document data, wherein the decision table data structure includes rows that define rules and columns that define the question and associated portion, and the eliminating involves a first step of removing at least one of the rows with a first predefined value and a second step of removing at least one of the columns based on an output of the first step and a second predefined value, wherein each portion comprises a fillable field, a textual description associated with the fillable field, and a tag associated with the fillable field,
selecting one or more portions from the identified at least one portion of the electronic form for inclusion in a separate interview screen to be generated and presented to a second user different from the first user,
after selecting the one or more portions, the interface content engine
accessing the template database, and
extracting the selected portions from one or more electronic forms of the template database, and
the computer, by the processor executing computer-executable instructions of a second interface controller different from the first user interface controller,
receiving the extracted portions from the interface content engine, and
generating an interview screen comprising the extracted portions, wherein the interview screen is presented to a second user through a second display of a second computing device different from the first computing device,
receiving second electronic data from the second computing device generated by the second user responding to questions of the interview screen by interacting with the second computing device and the generated interview screen, and
storing the second electronic data to the shared data store to update the current electronic document data in the shared data store; and the computer, by the first interface controller,
reading the current electronic document data as updated by the second interface controller, and
presenting one or more electronic forms populated with current electronic document data as updated by the second interface controller to the first user through the first display.

US Pat. No. 10,970,476

AUGMENTING DIGITAL INK STROKES

Microsoft Technology Lice...

1. A method for augmenting digital ink strokes for content creation applications, the method comprising:receiving ink strokes input to a canvas interface of a content creation application;
identifying at least one recognized term from the ink strokes, the at least one recognized term being a text-based version of the ink strokes;
communicating the at least one recognized term identified from the ink strokes to an ink augmenting service;
receiving at least one keyword from the ink augmenting service, each keyword being a corresponding recognized term of the text-based version of the ink strokes having available content identified by the ink augmenting service, the available content being identified from one or more sources other than that of the ink strokes;
in response to receiving the at least one keyword, transforming a grouping of the ink strokes corresponding to the recognized term indicated by each keyword to an actionable item in the canvas interface, wherein transforming the grouping of the ink strokes to the actionable item comprises:
grouping the ink strokes corresponding to the recognized term together as one entity; and
transforming the one entity to the actionable item, the actionable item visually appearing in a form of selectable ink strokes;
in response to receiving a selection of the actionable item, automatically providing for display results of the available content identified by the ink augmenting service for the recognized term of the actionable item;
receiving a selection of one or more of the results of the available content; and
inserting the selected one or more of the results of the available content in the canvas interface of the content creation application.

US Pat. No. 10,970,475

METHOD AND SYSTEM FOR SUGGESTING REVISIONS TO AN ELECTRONIC DOCUMENT

BLACKBOILER, INC., Arlin...

1. A computer-implemented method for suggesting revisions to text data, the method comprising:obtaining an electronic document under analysis (DUA);
tokenizing the DUA into one or more statements under analysis (SUAs);
selecting a first SUA of the one or more SUAs;
selecting a candidate original text from a seed database;
determining, using a natural language processing (NLP) alignment of the first SUA and the candidate original text, an edit operation to apply to the DUA; and
recording the determined edit operation in an appendix.

US Pat. No. 10,970,474

METHOD AND SYSTEM FOR EDITING TEXT WITH A FIND AND REPLACE FUNCTION LEVERAGING DERIVATIONS OF THE FIND AND REPLACE INPUT

International Business Ma...

1. A method for performing, by a processor of a computer, a find and replace editing operation of a text, said method comprising:receiving both a find expression and also a replace expression in a find and replace dialog box of a graphical user interface of a text editor hosted by an operating system of the computer;
retrieving from a data store, a multiplicity of transformation rules, each of the rules transforming both words of a specified find expression and also a corresponding replace expression into an inflected form of the specified find expression and the corresponding replace expression;
applying each one of the multiplicity of transformation rules to the received find expression and the received replace expression, the application producing a multiplicity of couples, each of the couples comprising a different inflected form of the received find expression and the received replace expression; and,
storing the multiplicity of couples in the data store.

US Pat. No. 10,970,473

FORMATTING DOCUMENT OBJECTS BY VISUAL SUGGESTIONS

MICROSOFT TECHNOLOGY LICE...

1. A device comprising:a processing unit;
a memory coupled to the processing unit and storing instructions for execution by the processing unit, the instructions, when executed by the processing unit, causing the device to:
receive an edit performed on a first object in a document, wherein the first object is a portion of the document having a first attribute-value pair;
based on the edit performed on the first object in the document, generate a first editing rule, the first editing rule indicating the edit performed on the first object in a document;
generate an editing suggestion based on the first editing rule, the editing suggestion describing a candidate edit to be performed on a second object, having a second attribute-value pair, which is the same as the first attribute-value pair, within a suggestion scope; and
present the editing suggestion in a visual form to a user for selection.

US Pat. No. 10,970,472

CONVERSATIONAL USER INTERFACE LOGIC FOR CROSS-APPLICATION INGESTION AND RESTRUCTURING OF CONTENT

Microsoft Technology Lice...

1. A computing system, comprising:a processor; and
memory storing instructions executable by the processor, wherein the instructions, when executed, cause the computing system to:
generate a first document by a first content generation application;
instruct a display device to display an application user interface (UI) that includes:
the first document generated by the first content generation application, and
a conversational UI element configured to provide a dialog sequence with a user;
based on user input through the application UI, control the dialog sequence in the conversation UI element;
provide, in the dialog sequence, a content selection user input mechanism;
based on user input received through the content selection user input mechanism, select source content in a source document corresponding to a second content generation application;
parse the source content based on an identified document type of the source document;
generate a metric based on analyzing the parsed source content;
restructure the identified source content into restructured content based on the generated metric;
modify the first document based on the restructured content; and
instruct the display device to display the modified first document in the application user interface.

US Pat. No. 10,970,471

PHASED COLLABORATIVE EDITING

INTERNATIONAL BUSINESS MA...

1. A method for phased collaborative editing by a processor, comprising:assigning a region tag of phased input to one or more document regions of a collaborative document along with a list of users enabled to input data collaboratively in real-time to the one or more document regions according to the region tag; and
revealing an intentionally concealed region of the one or more document regions to one or more users in the list of users upon content input by a user matching content of the concealed region, wherein a validation operation is performed to ensure the content input by the user comprises relevant data with respect to the content of the concealed region of the collaborative document prior to revealing the concealed portion, and wherein the validation operation includes using an emotive lock whereby both topic and emotive content of the content input by the user is compared to the content of the concealed region to perform the matching such that, when the content input by the user comprises textual placeholders being non-relevant to the content of the concealed region, the emotive lock is maintained and the concealed region remains concealed.

US Pat. No. 10,970,470

COMPRESSION OF MACHINE LEARNED MODELS

AMAZON TECHNOLOGIES, INC....

1. A method, comprising:receiving a request to process first data using a language processing machine learned model;
determining a first parameter of the language processing machine learned model, the first parameter associated with a first portion of the first data;
determining second data associated with the first parameter, the second data having a first number of bits;
determining a second parameter of the language processing machine learned model, the second parameter associated with a second portion of the first data;
determining third data associated with the second parameter, the third data having a second number of bits different from the first number of bits; and
generating fourth data comprising a natural language representation of the first data based at least in part on the first parameter.

US Pat. No. 10,970,469

SYSTEM AND METHOD FOR USING A SCRIPTING LANGUAGE TO DYNAMICALLY STYLE A CASCADING STYLE SHEET

Citrix Systems, Inc., Bu...

1. A method comprising:generating, by a computing device, a data file including at least one property from a first cascading style sheet (CSS) file, the at least one property defining a scripting language object;
generating, by the computing device, a scripting language file, the scripting language file including a scripting language variable for the scripting language object;
generating, by the computing device, a second CSS file by replacing the at least one property from the data file with the scripting language variable of the scripting language file; and
rendering, by the computing device, an element of a webpage referenced by the scripting language object based upon, at least in part, the scripting language variable of the second CSS file.

US Pat. No. 10,970,468

SYSTEMS AND METHODS FOR CREATING CUSTOM ACTIONS

salesforce.com, inc., Sa...

1. A system comprising:a database system implemented using a server system, the database system configurable to cause:
displaying, on a display of a device of a first user of a social networking system, one or more fields configured to receive input to define or update a custom action;
configuring, based on input via the one or more fields from the first user, the custom action to be capable of causing one or more database records to be created or updated in accordance with user-configurable custom action instructions;
displaying, on a display of a device of a second user of the social networking system, a publisher of the social networking system, the publisher comprising:
a first selection operable to receive the user-configurable custom action instructions from the second user,
an input area capable of receiving text, and
a second selection operable to cause the text to be shared in a feed of the social networking system as a feed item;
obtaining the user-configurable custom action instructions via the first selection;
performing, as controlled by the user-configurable custom action instructions, the custom action to cause the one or more database records to be created or updated to have a plurality of attributes comprising:
a record type specified by the user-configurable custom action instructions,
a reference to a designated database record, the reference specified by the user-configurable custom action instructions and indicating a parent or child relationship in a database hierarchy with the designated database record, and
a plurality of data fields pre-populated with a plurality of system-generated values based on the record type and based on the reference to the designated database record; and
displaying, on the display of the device of the second user, an updated feed with the one or more database records having the attributes.

US Pat. No. 10,970,467

SYSTEMS AND METHODS FOR VIDEO CONTENT ASSOCIATION

Verizon Media Inc., New ...

1. A method for augmenting webpages with video content, the method comprising:identifying, by a server processor, one or more keywords on a webpage of a user computing device;
modifying, by the server processor, the webpage to include a link associated with the one or more keywords, the link providing access to first video content corresponding with the one or more keywords;
based on receiving indication of a first interaction with the link, transmitting the first video content to the user computing device for display on the webpage;
updating the link to provide access to second video content, the second video content being different from the first video content; and
based on receiving indication of a second interaction with the link, transmitting the second video content to the user computing device for display on the webpage, wherein the second video content is dynamically prioritized over the first video content based on a popularity ranking.

US Pat. No. 10,970,466

INSERTING LINKS THAT AID ACTION COMPLETION

International Business Ma...

1. A method comprising:performing, responsive to a user invoking a transition, via a web browser, from one web page to a desired web page, natural language processing on a passage in content of the desired web page;
determining, based on the performed natural language processing, that the passage indicates an action to be undertaken and that the passage includes a plurality of significant textual entities;
comparing, in response to the determination that the passage indicates an action to be undertaken, another passage in content of another web page with the plurality of entities, wherein the another web page is not currently linked to the desired web page within the content of the desired web page;
determining, based on the comparison, that the another web page is relevant to the passage;
parsing, in response to the determination that the another webpage is relevant to the passage, source code of the another webpage to determine that the another webpage incorporates downloadable content;
analyzing, in response to the determination that the another webpage incorporates downloadable content, a file type extension of the downloadable content to determine that the downloadable content is preconfigured to allow completion of the particular action; and
concurrently displaying, via the web browser and in response to the determination that the downloadable content is preconfigured to allow completion of the particular action, (i) the content of the desired webpage, (ii) an additional sidebar including a listing of a hyperlink to the another web page, (iii) a plurality of visual indicators serving to emphasize an association between the listed another web page and the plurality of entities included in the passage, and (iv) a different visual indicator serving to indicate a recommended location to embed the hyperlink in the passage so as to link the desired web page to the another web page within the content of the desired web page.

US Pat. No. 10,970,465

WEB PAGE MANIPULATION

Micro Focus LLC, Santa C...

1. A non-transitory machine-readable storage medium encoded with instructions that upon execution by a computing device cause the computing device to:receive a web page that includes application instructions for modifying objects included in the web page;
execute the application instructions;
record, in an ordered list of changes, change data for each application object that is modified, created, or destroyed during execution of the application instructions, the application object defined by the application instructions;
record, in the ordered list of changes, change data for each web page object that is modified, created, or destroyed during execution of the application instructions, the web page object defined by a document object model (DOM) of the web page;
identify, in the ordered list of changes, a transition point between recorded changes;
receive a request to change a state of the web page to the transition point between recorded changes; and
apply, in reverse order, an inverse of each change specified in the ordered list of changes from a current point in time until the transition point between recorded changes.

US Pat. No. 10,970,464

METHOD, DEVICE FOR PROCESSING WEBPAGE CONTENT AND STORAGE MEDIUM

ZTE CORPORATION, Shenzhe...

1. A method for processing web content, comprising:determining, in a histogram statistical array of a webpage snapshot, a starting position and an ending position of a longest continuous image along a longitudinal axis direction;
determining, based on a resolution of the webpage snapshot, a first starting position and a first ending position of a body in the webpage snapshot along the longitudinal axis direction in a range from the starting position to the ending position in the longitudinal axis direction;
determining, based a rendering tree of the webpage snapshot, a second starting position and a second ending position of the body in the webpage snapshot in the longitudinal axis direction in a range from the first starting position to the first ending position;
extracting content between the second starting position and the second ending position as a body content of the webpage snapshot; and
processing the extracted content.

US Pat. No. 10,970,463

SYSTEM AND METHOD FOR OPTIMIZING ELECTRONIC DOCUMENT LAYOUTS

Overstock.com, Inc., Mid...

10. A method of optimizing the layout of an electronic document comprising the steps of:receiving an optimization request for an electronic document, where the electronic document comprises a plurality of sections;
accessing a database to select one or more models for the optimization request, where the one or more selected models use a progressively narrowed range of content position randomization to generate an optimized order for the plurality of sections for the electronic document,
applying the one or more selected models to generate an optimized order for the plurality of sections for the electronic document.

US Pat. No. 10,970,462

SYSTEMS AND METHODS OF PROVIDING ENHANCED PRODUCT VISUALIZATION ON A GRAPHICAL DISPLAY

Loop Commerce, Inc., Sta...

1. A computer-implemented method for providing a visual representation of a graphical object in a web page, the method comprising:receiving, by one or more processors, input corresponding to a selection of the graphical object to be displayed in a container of the web page;
calculating a set of container dimensions for the container, wherein the container has a constant size and wherein the container is a visual frame container representing a three-dimensional container;
rendering a set of optimized dimensions for a subarea element of the container, wherein the set of optimized dimensions maximize the subarea element's size within the container;
determining a set of object dimensions for the graphical object;
rendering the graphical object within the subarea element;
automatically generating a semi-transparent layer over the graphical object within the subarea element using the set of object dimensions, wherein the semi-transparent layer modifies an appearance of the graphical object to conform with an appearance of the container; and
automatically causing the container, the graphical object, and the semi-transparent layer to be displayed in the web page.

US Pat. No. 10,970,461

METHOD FOR PROCESSING USER-CUSTOMIZED PAGE AND MOBILE DEVICE THEREOF

Samsung Electronics Co., ...

1. An electronic device comprising:a display;
a memory;
a sensor configured to detect insertion or removal of a stylus pen; and
at least one processor configured to:
display, on the display, a screen of a first application while the stylus pen is inserted,
detect, using the sensor, removal of the stylus pen while the screen of the first application is displayed,
when the removal of the stylus pen is detected:
execute a second application in response to the removal of the stylus pen, and
identify information, stored in the memory, including a previously generated handwritten memo associated with a second application acquired before detection of the removal of the stylus pen, and
display, on the display, a screen of the second application including the previously generated handwritten memo, and when the insertion of the stylus pen is detected:
terminate display of the screen of the second application.

US Pat. No. 10,970,460

INFORMATION PROCESSING APPARATUS, METHOD OF DISPLAYING IMAGE, STORAGE MEDIUM, AND SYSTEM

RICOH COMPANY, LTD., Tok...

1. An information processing apparatus, comprising:circuitry configured to
receive a signal indicating that a user operation is performed on a screen having a first region including an image and a second region that does not include the image, the screen being displayed on a display at a time when only a first portion of the image is being displayed in the first region;
determine whether the user operation was performed on the first region that includes the image or on the second region that does not include the image;
when the circuitry determines that the user operation was performed on the first region that includes the image, analyze the contents of the user operation, and perform processing corresponding to the contents of the operation; and
when the user operation is an input of characters into the second region and the circuitry determines that the user operation was performed on the second region that does not include the image, change the display portion of the image from the first portion of the image to a second portion of the image based on a number of characters input into the second region and a type of each character input into the second region, the second portion encompassing a different portion of the image than the first portion, and update a display status of an entirety of the screen, including the first and second regions, based on the received signal corresponding to the user operation performed on the screen.

US Pat. No. 10,970,459

DYNAMIC WEB CONTENT BASED ON CONTEXTUAL PROFILE

PAYPAL, INC., San Jose, ...

1. A non-transitory computer-readable medium having stored thereon instructions executable by a computer system to cause the computer system to perform operations comprising:receiving, via hypertext transfer protocol (HTTP), a request for a first web page from a first user device, the first web page having a plurality of configurable display areas that are configured to be populated with dynamic content in different areas of the first web page based on a contextual user profile for a first user associated with the first user device, and the first web page having an additional display area not configured to be populated with dynamic content based on the contextual user profile;
locating the contextual user profile, the contextual user profile having been generated by operations comprising:
performing an analysis of a transaction history including a plurality of electronic payment transactions;
determining an action taken by the first user with a software product provided by an electronic payment transaction service provider to the first user;
assigning a particular usage category from a plurality of usage categories to the contextual user profile based on the analysis of the transaction history and the action, wherein each of the plurality of usage categories is associated with a type of usage of the first web page, the plurality of usage categories comprising a seller;
based on the contextual user profile, arranging a content layout of the different areas on the first web page, wherein a placement of the different areas on the first web page is specific to the first user and changes the content layout of the first web page from an appearance to a second user, and wherein the placement is associated with at least one of the action or the software product;
determining, for the contextual user profile, a plurality of content pieces from personalized account information associated with the plurality of electronic payment transactions and the particular usage category;
generating a plurality of content modules comprising the plurality of content pieces associated with the personalized account information;
loading one of the plurality of content modules in each of the configurable display areas of the first web page based on the content layout of the different areas on the first web page; and
transmitting the first web page having the one of the plurality of content modules in each of the configurable display areas to the first user device.

US Pat. No. 10,970,458

LOGICAL GROUPING OF EXPORTED TEXT BLOCKS

Adobe Inc., San Jose, CA...

1. A computer program product including one or more non-transitory machine-readable mediums encoded with instructions that when executed by one or more processors cause a process to be carried out for clustering of text exported from a first digital document having a first format into a second digital document having a second format different than the first format, the process comprising:receiving in the second digital document a stream of text blocks exported from the first digital document, the text blocks including first and second text blocks that are part of a text object of the first digital document;
in response to the stream of text blocks being received in sequential reading order, executing a first clustering method to determine if the first and second text blocks belong to a logical block corresponding to the text object; and
in response to the stream of text blocks being received in non-sequential arbitrary order, executing a second clustering method to determine if the first and second text blocks belong to the logical block corresponding to the text object, the second clustering method different from the first clustering method;
wherein one or both of the first and second clustering methods includes measuring a distance between the first and second text blocks, and in response to that distance being less than a distance threshold, determining that the first and second text blocks belong to the logical block corresponding to the text object; and
wherein the first clustering method includes:
generating text lines as a combination of two or more of the text blocks in the stream of text blocks based on evaluation of an alignment cost function and a proximity measurement applied to the two or more text blocks;
calculating an angle of rotation of the generated text lines;
rotating the generated text lines to correct for the angle of rotation;
determining an orientation of the generated text lines, the orientation one of horizontal oriented text lines or vertical oriented text lines;
sorting the horizontal oriented text lines from top to bottom;
sorting the vertical oriented text lines from left to right;
clustering the sorted horizontal oriented text lines into logical blocks of horizontal text;
clustering the sorted vertical oriented text lines into logical blocks of vertical text; and
rotating at least one logical block from amongst the logical blocks of horizontal text and the logical blocks of vertical text to restore the angle of rotation of the text lines included in the rotated at least one logical block.

US Pat. No. 10,970,457

COLLABORATION MECHANISM

Citta LLC, Malba, NY (US...

1. A method performed by a data processing apparatus, the method comprising:receiving a master object comprising metadata associating the master object with an owner entity and a content model identifying at least one content item;
creating a branch object parented to the master object and associating the branch object with a collaborator that is different than the owner entity, the branch object including a snapshot of the master object at the time of the branch object creation;
receiving changes to the branch object from the collaborator and recording the changes in a draft branch object that is parented to the branch object;
receiving a submission of the draft branch object from the collaborator to the owner entity for review;
generating a changeset by inspecting metadata of the submitted draft branch object for an identification of its parent branch object and, based on the identification of its parent branch object, comparing (a) current contents of the master object with (b) the snapshot of the master object at the time of the parent branch object creation and (c) contents of the submitted draft branch object; and
presenting the changeset to the owner entity for approval, wherein
the creation of the branch object includes setting a status tag of the branch object to reflect its new status,
the submission of the draft branch object includes setting the status tag of the branch object to reflect the submitted status of the draft branch object, and
the generation of the changeset is triggered by the detection of the setting of the branch object's status flag to the submitted status.

US Pat. No. 10,970,456

IDENTIFYING ROOT CAUSE OF LAYOUT VERSUS SCHEMATIC ERRORS

Synopsys, Inc., Mountain...

1. A method for identifying a root cause of a layout versus schematic (LVS) error in a layout of a circuit for manufacture, comprising:detecting, by a processor, whether a first mismatch occurs between a value of a first node in a first graph and a value of a corresponding second node in a second graph, the first graph representing a circuit layout and the second graph representing a circuit schematic;
assigning, responsive to detecting the first mismatch, a first value to the first node in the first graph and to the second node in the second graph;
assigning, based on the first value, values to respective nodes of the first and second graphs;
detecting whether a second mismatch between a second value of a third node in the first graph and a third value of a fourth node in the second graph is present; and
generating, responsive to detecting the presence of the second mismatch, an output identifying the second mismatch as the root cause of the first mismatch.

US Pat. No. 10,970,455

APPORTIONMENT AWARE HIERARCHICAL TIMING OPTIMIZATION

International Business Ma...

1. A method for creating an improved VLSI design, comprising:performing in-context timing analysis of a nominal VLSI design;
determining at least one assigned apportionment adjustment for a sub-block of the nominal VLSI design, wherein the at least one apportionment adjustment is determined by dividing a portion of a path delay internal to the sub-block by a sum of the path delay internal to the sub-block and a path delay external to the sub-block;
deriving one or more slack adjustments for at least one port of the sub-block based on the at least one apportionment adjustment;
applying the one or more slack adjustments to the in-context timing analysis to simulate a post optimization version of the sub-block; and
repeating the in-context timing analysis using the one or more applied slack adjustments to generate the improved VLSI design.

US Pat. No. 10,970,454

SCALABLE CONNECTIVITY VERIFICATION USING CONDITIONAL CUT-POINTS

INTERNATIONAL BUSINESS MA...

1. A method for performing connectivity verification of an integrated circuit device, the method comprising:determining target gates within the integrated circuit device;
finding trace signals within the integrated circuit device;
determining nested trace signals of the trace signals;
determining one or more locations on the integrated circuit device for cut points for non-nested trace signals of the trace signals; and
performing connectivity verification using the one or more locations for the cut points.

US Pat. No. 10,970,453

METHOD FOR THE NON-COPYABLE MANUFACTURE OF INTEGRATED CIRCUITS

University of Louisiana a...

1. A method for obfuscating an integrated circuit,wherein the integrated circuit is comprised of at least two layers;
wherein two layers located next to each other are neighboring layers;comprising:identifying one or more interconnects to be protected;identifying one or more portions of the interconnects to be obfuscated;adding a security layer between two neighboring layers;connecting the layers of the integrated circuit;adding one or more crossbar switches to the security layer;bonding the security layer to the neighboring layers;configuring the integrated circuit, comprising:removing one or more electrons; and
programming the obfuscations.

US Pat. No. 10,970,452

SYSTEM FOR DESIGNING SEMICONDUCTOR CIRCUIT AND OPERATING METHOD OF THE SAME

Samsung Electronics Co., ...

1. A system for designing a semiconductor circuit, the system comprising:a working memory configured to load machine-readable instructions for generating a cluster, based on instances respectively corresponding to cells of the semiconductor circuit, and for placing the cells; and
a central processing unit configured to execute the machine-readable instructions for clustering and placing that, when executed by the central processing unit, cause the system to,
in response to an output terminal of a first instance being connected to a second instance and a number of instances connected to the output terminal of the first instance being one, classify the first instance and the second instance into a candidate group pair, and
in response to all instances connected to an input terminal of the second instance being classified into the candidate group pair with the second instance, generate the cluster including the first instance and the second instance and provide a design tool with the cluster.

US Pat. No. 10,970,451

INTEGRATED CIRCUIT LAYOUT METHOD, DEVICE, AND SYSTEM

TAIWAN SEMICONDUCTOR MANU...

1. An integrated circuit (IC) device, comprising:a first active region;
a pair of second active regions adjacent to the first active region, wherein side edges of the first active region and corresponding side edges of each second active region of the pair of second active regions are aligned along a cell height direction; and
at least one first fin feature in the first active region,
wherein
the side edges of the first active region and the corresponding side edges of each second active region extend along the cell height direction, and
a height dimension of the first active region in the cell height direction is less than half of a height dimension of each second active region of the pair of second active regions in the cell height direction.

US Pat. No. 10,970,450

CELL STRUCTURES AND SEMICONDUCTOR DEVICES HAVING SAME

TAIWAN SEMICONDUCTOR MANU...

1. A semiconductor device comprising:fins formed on a substrate and arranged substantially parallel to a first direction;
the fins being organized into instances of a first row and instances of a second row, the first and second rows extending in the first direction;
each instance of the first row including a first predetermined number of fins having a first conductivity type; and
each instance of the second row including a second predetermined number of fins having a second conductivity type;
gate structures formed over corresponding ones of the fins and arranged substantially parallel to a second direction, the second direction being substantially perpendicular to the first direction; and
a first structure having an odd number of contiguous rows including:
an even number of instances of the first row; and
an odd number of instances of the second row.

US Pat. No. 10,970,449

LEARNING FRAMEWORK FOR SOFTWARE-HARDWARE MODEL GENERATION AND VERIFICATION

International Business Ma...

1. A computer-implemented method comprising:receiving input data including: a required occurrence that an abstract model is required to produce, a concrete software model representing a software behavior, the software behavior corresponding to execution of software logic, and a set of all symbols allowed to occur in any string that can be defined in a specified regular language, each symbol representing an individual event occurring during execution of the software logic, each string describing a sequence of events representing the software behavior;
checking whether a first event in a first sequence of events produced by the concrete software model satisfies the required occurrence;
learning the specified regular language representing the software behavior according to the concrete software model that produces the first event, the learned regular language being represented by strings;
learning a function call hierarchy of the software behavior, wherein the function call hierarchy is the sequence of functions executed by the program;
modifying code of the concrete software model by adding at least one additional variable that generates an observable event in response to one or more conditions being met, and the function call hierarchy that generated the observable event, wherein the concrete software model is configured such that at least one hidden event is generated when one or more conditions are met, the hidden event not being observable by any program routine outside of the concrete software model, and further wherein the observable event being observable by a program routine outside of the concrete software model;
generating an abstract software model of the software behavior, the generated abstract software model satisfying the required occurrence, wherein the abstract software model is generated using assume-guarantee reasoning; and
outputting the generated abstract software model.

US Pat. No. 10,970,448

PARTIAL PARAMETERS AND PROJECTION THEREOF INCLUDED WITHIN STATISTICAL TIMING ANALYSIS

INTERNATIONAL BUSINESS MA...

1. A method for improving a semiconductor product, the method comprising:propagate at least one timing analysis run for a design of the semiconductor product;
project a timing quantity computed in the at least one timing analysis run to minimum or maximum values of a range for at least one parameter, wherein the projecting the timing quantity to the maximum value of the range includes identifying a parameter space shape of a projected process space for the design of the semiconductor product;
set a parameter value for the maximum value based on the parameter space shape being identified as a trapezoid; and
instantiate the design of the semiconductor product into a programmable array.

US Pat. No. 10,970,447

LEVERAGE CYCLE STEALING WITHIN OPTIMIZATION FLOWS

International Business Ma...

1. A method of implementing timing adjustments in an integrated circuit, the method comprising:calculating an input timing slack at an input to a latch by subtracting an input arrival time to the latch from an input required arrival time of the latch;
calculating an output timing slack at an output to the latch by subtracting an output arrival time of the latch from an output required arrival time from the latch;
performing cycle stealing to improve the output timing slack by modifying the input required arrival time of the latch and the output arrival time;
reducing the output timing slack by a pessimism amount;
performing optimization by making design modifications in the integrated circuit to improve the input timing slack and the output timing slack until a desired slack goal is achieved; and
generating a final integrated circuit based on the final power recovery and creating a semiconductor chip based on the final integrated circuit.

US Pat. No. 10,970,446

AUTOMATED PIPELINE INSERTION ON A BUS

XLNX, INC., San Jose, CA...

1. A method, comprising:inputting to a programmed processor, a hardware description language (HDL) specification of a circuit design having:
a first compiler directive associated with signal names of payload data signals and that specifies a first group name and a pipeline limit,
a second compiler directive associated with a signal name of a forward handshake signal and that specifies the first group name, the pipeline limit, and a reference to a second group name, and
a third compiler directive associated with a response handshake signal name and that specifies the second group name;
placing elements of the circuit design on a target integrated circuit (IC) and performing timing analysis by the programmed processor;
inserting by the programmed processor, in response to the timing analysis indicating one signal of the payload data signals, forward handshake signal, or response handshake signal is timing-critical and in response to the first group name associating the payload data signals and forward handshake signal and the second group name referencing the response handshake signal, equal numbers of one or more pipeline registers on paths of the payload data signals, forward handshake signal, and response handshake signal, and limiting a total of the equal numbers of pipeline registers to the pipeline limit on paths of the forward handshake signal and response handshake signal;
generating data that implements the circuit design; and
configuring the IC with the data that implements the circuit design.

US Pat. No. 10,970,445

METHODS AND APPARATUS FOR PERFORMING TIMING DRIVEN HARDWARE EMULATION

Intel Corporation, Santa...

1. A method of implementing an integrated circuit using circuit design tools, the method comprising:generating a first circuit design having a target operating frequency;
generating frequency-dependent timing constraints based on the first circuit design; and
generating, based on the frequency-dependent timing constraints, a second circuit design having a maximum achievable operating frequency less than the target operating frequency, wherein the second circuit design emulates the first circuit design on the integrated circuit and wherein the frequency-dependent timing constraints are a function of a ratio of the target operating frequency and the maximum achievable operating frequency.

US Pat. No. 10,970,444

METHODS AND SYSTEMS TO VERIFY CORRECTNESS OF BUG FIXES IN INTEGRATED CIRCUITS

International Business Ma...

1. A method for pre-silicon verification of an integrated circuit design modified to avoid a hit of property P where property P has a known counterexample, the method comprising:providing a first integrated circuit having one or more bugs, wherein the first integrated circuit hits property P in response to the one or more bugs;
providing a second integrated circuit that has been modified in a manner intended to avoid property P;
providing one or more inputs to both first integrated circuit and second integrated circuit;
in response to providing the same one or more inputs to the first integrated circuit and the second integrated circuit, applying a first implication check in an equivalence testbench on the first integrated circuit and on the second integrated circuit to determine whether the second integrated circuit hits property P in the same way as the first integrated circuit hits property P; and
in response to providing the same one or more inputs to the first integrated circuit and the second integrated circuit, applying a second implication check in an equivalence testbench on the first integrated circuit and on the second integrated circuit to determine whether the second integrated circuit hits property P at a different timestep than the first integrated circuit hits property P.

US Pat. No. 10,970,443

GENERATION OF MODULE AND SYSTEM-LEVEL WAVEFORM SIGNATURES TO VERIFY, REGRESSION TEST AND DEBUG SOC FUNCTIONALITY

SYNOPSYS, INC., Mountain...

1. A method of detecting a functional fault in a circuit design undergoing hardware emulation, the method comprising:computing N signatures of a corresponding reference circuit design during each of N clock cycles, N being an integer greater than one;
computing N signatures of the circuit design undergoing emulation during each of the N clock cycles;
comparing, for each of the N clock cycles, the signature of the reference circuit design to the signature of the circuit design undergoing emulation; and
detecting, during each of the N clock cycles, whether a mismatch exists between the reference circuit design signature and the signature of the circuit design undergoing emulation, wherein each signature is computed by performing a logic function on a plurality of output signals of the circuit design.

US Pat. No. 10,970,442

METHOD OF DEBUGGING HARDWARE AND FIRMWARE OF DATA STORAGE

SK hynix Inc., Icheon-si...

1. A method for reproducing an output transaction of a hardware component responsive to an input in a simulation environment, the method comprising:coupling an interface sniffer to an interface of the hardware component on which firmware is running such that the interface sniffer captures in real time an input transaction on the interface that is associated with the hardware component;
coupling, to the interface sniffer, a simulator including a reference model to receive the captured input transaction by the simulator such that the captured input transaction changes internal states of the reference model;
causing the internal state of the hardware component to be reproduced in the simulator based on the internal states of the reference model changed by the captured input transaction to produce a model output transaction of the reference model responsive to the captured input transaction as an expected output transaction of the hardware component capturing, by the interface sniffer, an output transaction of a hardware component responsive to the input transaction; and
comparing the captured output transaction of the hardware component to the model output transaction of the reference model to determine whether there is a mismatch between the captured output transaction of the hardware component and the model output transaction of the reference model.

US Pat. No. 10,970,441

SYSTEM AND METHOD USING NEURAL NETWORKS FOR ANALOG-TO-INFORMATION PROCESSORS

Washington University, S...

1. A neural network based learning system, the system including:at least one memory;
at least one processor in communication with said at least one memory, said at least one processor configured to:
generate a mathematical model of an analog-to-digital interface for an analog mixed-signal circuit;
determine a structural definition of a hardware substrate including a plurality of inputs and a plurality of outputs;
generate a neural network based on the mathematical model of the analog-to-digital interface and the structural definition of the hardware substrate, wherein the neural network includes a plurality of layers and each layer of the plurality of layers includes a plurality of neurons;
program the hardware substrate with a first plurality of neurons of a first layer of the neural network to simulate the mathematical model of the analog-to-digital interface including one or more learning algorithms, wherein the hardware substrate is programmed with a first plurality of weights, a first input vector, and a first output vector from the first layer of the neural network; and
subsequently program the hardware substrate with a second plurality of neurons of a second layer of the neural network to simulate the mathematical model of the analog-to-digital interface, wherein the hardware substrate is programmed with a second plurality of weights, a second input vector, and a second output vector from the second layer of the neural network, wherein the second input vector is based on the first output vector.

US Pat. No. 10,970,440

METHOD AND SYSTEM FOR GENERATING LAYOUT DIAGRAM FOR SEMICONDUCTOR DEVICE HAVING ENGINEERING CHANGE ORDER (ECO) CELLS

TAIWAN SEMICONDUCTOR MANU...

1. A method of manufacturing a semiconductor device, for a layout diagram stored on a non-transitory computer-readable medium, the method comprising generating the layout diagram including:placing standard functional cells to partially fill a logic area of the layout diagram according to at least one corresponding schematic design thereby leaving, as unfilled, a spare region in the logic area;
selecting a first pitch for additional cells to be placed in the spare region, wherein use of the first pitch minimizes wasted space in the spare region;
selecting standard not-yet-programmed (SNYP) spare cells, which are to become at least some of the additional cells, according to the first pitch; and
placing the selected SNYP spare cells into the spare region of the layout diagram.

US Pat. No. 10,970,439

SYSTEM ON CHIP (SOC) CURRENT PROFILE MODEL FOR INTEGRATED VOLTAGE REGULATOR (IVR) CO-DESIGN

Taiwan Semiconductor Manu...

1. A method comprising:extracting a first current profile model corresponding to a System on Chip (SOC) at a first design stage of the SOC;
determining that an Integrated Voltage Regulator (IVR) and the SOC pass a first co-simulation based on the extracted first current profile model;
extracting a second current profile model corresponding to the SOC at a second design stage of the SOC, the second design stage being subsequent to the first design stage;
determining that the IVR and the SOC pass a second co-simulation based on the extracted second current profile model;
extracting a third current profile model corresponding to the SOC at a third design stage of the SOC, the third design stage being subsequent to the second design stage; and
determining that the IVR and the SOC pass a third co-simulation based on the extracted third current profile model.

US Pat. No. 10,970,438

INTEGRATED CIRCUIT DESIGN METHOD AND SYSTEM

TAIWAN SEMICONDUCTOR MANU...

1. A method of generating a layout diagram of an integrated circuit (IC) device, the method comprising:assigning, by an IC device design system, a leakage current constraint to a first schematic net of the IC device;
determining, by the IC device design system, a violation of the leakage current constraint based on a dummy gate region, wherein the IC layout diagram comprises the dummy gate region between a first component of the first schematic net and a second component of a second schematic net of the IC device;
modifying, by the IC device design system, the IC layout diagram in response to the leakage current constraint violation; and
generating, by the IC device design system, a layout file based on the modified IC layout diagram.

US Pat. No. 10,970,437

CALCULATING AND EXTRACTING JOULE-HEATING AND SELF-HEAT INDUCED TEMPERATURE ON WIRE SEGMENTS FOR CHIP RELIABILITY

ANSYS, Inc, Canonsburg, ...

1. A computer-implemented method comprising:receiving data characterizing a chip comprising a plurality of wires;
performing a thermal analysis to obtain a thermal profile for the chip based on the data, the thermal profile including a respective temperature value for each wire;
generating a plurality of chip finite element sub-models, each sub-model corresponding to a different sub-region of the chip, wherein the chip finite element sub-models include meshes of wire geometry of the wires;
solving a thermal field solution for each sub-model;
extracting, for each sub-model, wire temperature responses from a corresponding thermal field solution;
combining wire temperature responses from thermal field solutions with respective temperature values of the wires in the thermal profile; and
generating, based on the extracting and the combining, an output indicating back-annotated temperature covering each wire.

US Pat. No. 10,970,436

METHOD FOR NUMERICALLY SIMULATING ORTHODONTIC EFFECT OF ORTHODONTIC APPLIANCE

WUXI EA MEDICAL INSTRUMEN...

1. A method for numerically simulating orthodontic effect of an orthodontic appliance, comprising the following steps:providing a numerical dental model representing a patient's dental tissues, wherein the numerical dental model comprises mechanical parameters and geometrical parameters of the patient's dental tissues;
providing a numerical orthodontic appliance model representing the orthodontic appliance, and the numerical orthodontic appliance model comprising mechanical parameters and geometrical parameters of the orthodontic appliance;
combining the numerical orthodontic appliance model with the numerical dental model to simulate wearing of the orthodontic appliance on the patient's dental tissues;
calculating orthodontic change after wearing of the orthodontic appliance on the patient's dental tissues, based on the mechanical parameters and geometrical parameters included in the numerical orthodontic appliance model and the numerical dental model respectively; and
assessing the orthodontic effect of the numerical orthodontic appliance model based on the orthodontic change;
wherein the orthodontic appliance is an invisible shell orthodontic appliance representing teeth arrangement at an expected orthodontic state, and the mechanical parameters in the numerical orthodontic appliance model are dependent on a material used to make the orthodontic appliance;
wherein the mechanical parameters of the patient's dental tissues include elastic modulus of periodontal tissue;
wherein the mechanical parameters of the patient's dental tissues include changes of elastic modulus of periodontal tissue with time and strain.

US Pat. No. 10,970,435

SCATTEROMETRY SYSTEM AND METHOD

NOVA MEASURING INSTRUMENT...

1. A method for use in scatterometry analysis for a patterned structure, comprising:(a) providing a scatterometry model of the patterned structure comprising a selected number of virtual segment data pieces indicative of a respective number of virtual segments of the patterned structure along Z-axis through the structure;
(b) processing each of the virtual segment data pieces by
i) determining a matrix [?n] comprising Z-axis derivatives of electromagnetic fields' response of the segment to incident field based on Maxwell's equations' solution, and
ii) transforming said matrix [?n] into an approximated response matrix [?n] corresponding to the electromagnetic field interaction between two different points spaced along the Z-axis, said transforming comprising embedding said matrix [?n] in a series expansion of said matrix exponential term [?n];
(c) determining a general propagation matrix [?] by carrying out multiplication of the approximated response matrices {[?n]};
(d) utilizing the general propagation matrix [?] to determine a scattering matrix for the patterned structure; and
(e) applying data indicative of a measurement scheme to said scattering matrix, thereby obtaining simulated scatterometry response signals from the patterned structure corresponding to said model.

US Pat. No. 10,970,434

VARIABLE EQUIVALENCY ON CONNECTION IN A PROCESS SIMULATION

AVEVA SOFTWARE, LLC, Lak...

1. A system for developing a simulation of a process that improves the rate at which a processor executing the simulation can solve mathematical equations thereof, the system comprising:a processor configured to receive data relating to the process;
a memory device coupled to the processor; and
software instructions stored on the memory device and executable by the processor, said instructions comprising:
instructions for generating a first model in the simulation, representing a first portion of the process, said first model comprising a first port to which other models are connectable, and said first model further comprising a first set of one or more mathematical equations representative of a behavior of the first portion of the process, at least one of said mathematical equations including a first port variable representative of a value transferable through the first port;
instructions for generating a second model in the simulation, representing a second portion of the process, said second model comprising a second port to which other models are connectable, and said second model further comprising a second set of one or more mathematical equations representative of a behavior of the second portion of the process, at least one of said mathematical equations including a second port variable representative of a value transferable through the second port;
instructions for allocating a memory location in the memory device as a connection variable representative of a type of information transfer between the first model and the second model; and
instructions for reducing the number of equations to be solved during execution of the simulation by setting, in response to said allocating the memory location, the first port variable in the at least one mathematical equation of the first set and the second port variable in the at least one mathematical equation of the second set to reference the value of the allocated memory location, thereby substituting the value of the allocated memory location for the first port variable in the at least one mathematical equation of the first set and the second port variable in the at least one mathematical equation of the second set as a result of said setting, and
thereby obviating the need for an equivalence equation to link the first port variable and the second port variable.

US Pat. No. 10,970,433

SYSTEMS AND METHODS FOR PARTICLE PATTERN SIMULATION

Chips Unlimited, Inc., T...

1. A method comprising:creating, by a computer-based system, particle elements for graphical display, wherein the particle elements comprise attributes corresponding to particle parameters, and wherein the particle parameters describe a property of a plurality of particles for use in a seamless surface covering;
building, by the computer-based system, a particle pattern by arranging the particle elements to form the particle pattern, wherein each particle element is assigned to a position in the particle pattern to simulate a distribution of physical particles; and
rendering, by the computer-based system, a second virtual environment by overlaying the particle pattern on a virtual environment, wherein the second virtual environment is configured for graphical display to simulate the distribution of physical particles on a physical substrate.

US Pat. No. 10,970,432

DISCRETE STATE EVENT-DRIVEN SIMULATION METHOD FOR SIMULATION OF POWER ELECTRONIC SYSTEM

TSINGHUA UNIVERSITY, Bei...

1. A discrete state event-driven (DSED) simulation method for simulation of a power electronic system, wherein, using a processor:with respect to continuous states and discrete events in the power electronic system, the method includes:
numerical integration of the continuous states by a flexible adaptive algorithm with both variable step-size and variable order; and
location of the discrete events with an event-driven mechanism, in which active events are picked out and pre-scheduled before their occurrence while passive events are located by iterative search,
wherein:
the active events are discrete events whose occurrence times can be determined in advance, including:
state events, which are triggered when an estimated error of a step reaches a user-specified error tolerance as the step-size extends,
control events, which are triggered by digital controllers in the power electronic system, and
external events, whose occurrence times can be pre-specified by a user before the simulation begins; and
the passive events are discrete events whose occurrence times cannot be determined in advance.

US Pat. No. 10,970,431

AUTOMATED MODEL DEVELOPMENT PROCESS

EQUIFAX INC., Atlanta, G...

1. A system comprising:a processing device; and
a memory device communicatively coupled to the processing device, the processing device being configured to execute instructions stored in the memory device to cause the processing device to:
receive a data set including a plurality of predictor variables;
determine a type of a predictor variable in the plurality of predictor variables for selecting a parameter for developing an analytical model using the data set, wherein the type of the predictor variable includes a numeric type or a character type;
increase a predictive strength of at least some of the predictor variables having the determined type by combining data associated with at least some of the predictor variables based on a similarity between the data, wherein combining data associated with at least some of the predictor variables based on the similarity between the data comprises:
(a) grouping (i) a first set of data values for a predictor variable into a first bin, (ii) a second set of data values for the predictor variable into a second bin, and (ii) a third set of data values for the predictor variable into a third bin,
(b) accessing a first odds index computed from the first set of data values, a second odds index computed from the second set of data values, and a third odds index computed from the third set of data values,
(c) determining that a sign and magnitude of the first odds index is closer to a sign and magnitude of the second odds index than to a sign and magnitude of the third odds index, and
(d) combining the first bin with the second bin rather than the third bin based on the sign and magnitude of the first odds index being closer to the sign and magnitude of the second odds index;
reduce a number of predictor variables in the data set by selecting a subset of the predictor variables based on a respective predictive strength of each predictor variable in the subset; and
develop the analytical model based on the combined data of the selected subset of the predictor variables, wherein the analytical model is usable to determine a relationship between the plurality of predictor variables and an output variable.

US Pat. No. 10,970,430

COMPUTER-READABLE RECORDING MEDIUM, COMPUTING MACHINE RESOURCE ALLOCATION METHOD, AND PARTICLE SIMULATION APPARATUS

FUJITSU LIMITED, Kawasak...

1. A non-transitory, computer-readable recording medium storing therein a number of particles equalization simulation program for simulating, by np processes, behavior of particles included in nd regions of a space subject to analysis, where np is smaller than nd, the particle simulation program causing a computer to execute a process comprising:estimating, for each of the nd regions and based on a number of particles included in the region, a number of particles included in a skirt region surrounding the region;
calculating an evaluation value for each of the nd regions, based on the number of particles included in the region and the estimated number of particles included in the skirt region;
selecting np regions (hereinafter, “first regions”) from among the nd regions in descending order of the evaluation value;
assigning the first regions to the np processes, respectively;
identifying one of the np processes for which the evaluation value of the first region assigned thereto is largest among the np processes;
assigning unassigned nd minus np regions (hereinafter, “second regions”) of the nd regions to the identified process in descending order of the evaluation value; and
reducing a processing time of the identified process by equalizing the number of particles assigned to each of the np processes;
the estimating includes estimating the number of particles included in the skirt region by (2(Lx+Ly+2h)×h/(Lx×Ly))×nx, where Lx represents a length of the region in x direction, Ly represents a length of the region in y direction, h represents influential radius, and nx represents the number of particles included in the region.

US Pat. No. 10,970,429

METHOD AND ALGORITHM FOR SIMULATING THE INFLUENCE OF THERMALLY COUPLED SURFACE RADIATION IN CASTING PROCESSES

MAGMA Giessereitechnologi...

1. A method implemented on a computer comprising at least a non-transitory computer-readable medium and a plurality of CPUs for achieving acceleration and savings in terms of computer time and computer memory when simulating a casting process of a solid body having at least one surface being exposed to radiation, the method comprising executing on at least one of said plurality of CPUs the steps of:calculating a radiative exchange between grey, diffuse surfaces of said solid body, by
subdividing surfaces exposed to radiation adaptively and hierarchically into a plurality of radiation tiles of the same or virtually the same radiation intensity,
creating, on the computer-readable medium, a global grid model comprising grid data, said grid data comprising information on said plurality of radiation tiles,
communicating said grid data of said global grid model to each of the plurality of CPUs, and
calculating surface temperature as a total of all partial amounts of the plurality of radiation tiles by
evaluating a solid angle integral for each radiation tile using a plurality of refinement levels comprising at least
a first refinement level, wherein the solid angle, which is centered at the mid-point of a radiation tile and with the center of the solid angle coinciding with the normal direction of a radiation tile, is subdivided into a plurality N of primary subdivisions in such a manner that each primary subdivision corresponds to the same view factor VF=1/N,
a second refinement level, wherein each primary subdivision is further subdivided hierarchically into a plurality of secondary subdivisions,
a third refinement level, wherein each secondary subdivision is further subdivided hierarchically into a plurality of tertiary subdivisions,
wherein each solid angle subdivision is discretized into its partial areas by spherical projection onto a hemisphere describing the solid angle, placed about the centre of said radiation tile, and
projecting each resulting subdivisions from all refinement levels to the surrounding global grid, and
determining a total of all partial amounts of that solid angle integral by means of ray tracing, wherein the directions of individual rays for each solid angle subdivision are defined by the vector from the middle of the radiation tile to the center of the solid angle subdivision and wherein rays are sent out from all refinement levels in a succession, and
wherein the ray tracing is accelerated by means of parallel computing, wherein the plurality of CPUs are programmed in a manner that
before the ray tracing, a number of locally defined radiation tiles are determined on each CPU and said plurality of radiation tiles are balanced between said plurality of CPUs by calculating an arithmetic mean of said plurality of radiation tiles to be processed by each CPU, thereby creating for each CPU a list of own radiation tiles to be processed comprising said locally defined radiation tiles and a list of imported radiation tiles to be processed based on the difference between said number of locally defined radiation tiles and said arithmetic mean,the ray tracing is performed simultaneously on each CPU adaptively and independently of one another starting with radiation tiles on the list of own radiation tiles and proceeding to radiation tiles on the list of imported radiation tiles by adapting the solid angle resolution based on homogeneity of radiation sources, starting from the finest refinement level and proceeding recursively towards the coarsest refinement level, andafter ray tracing all computed radiation tile data of the imported radiation tiles is communicated to the CPU where a corresponding radiation tile is locally defined.

US Pat. No. 10,970,428

METHOD OF PROVIDING PERFORMANCE INDICATORS OF ROBOT HAND AND METHOD OF OPTIMIZING STRUCTURE OF ROBOT HAND

1. A processor-implemented method of optimizing a structure of a robot hand, comprising:receiving setting values for a model of a robot hand structure;
determining movement of a thumb tip of a thumb and respective finger tips of fingers involved in the model based on the received setting values;
determining performance indicators through interactivity of fingers (IF) that reflects a volume range where the thumb tip and two of the finger tips can meet one another; and
optimizing the structure of the robot hand based on the determined performance indicators,
wherein the setting values comprise an angle value obtained by rotating the thumb at a start point of the thumb,
wherein the determining of the movement comprises determining a distance between the start point of the thumb and a start point of a finger among the fingers, and
wherein the optimizing of the structure of the robot hand comprises manufacturing the robot hand based on the determined performance indicators.

US Pat. No. 10,970,427

PERFORMANCE ALARMING METHOD FOR BRIDGE EXPANSION JOINTS BASED ON TEMPERATURE DISPLACEMENT RELATIONSHIP MODEL

Dalian University of Tech...

1. A performance alarming method for bridge expansion joints based on temperature displacement relationship model, wherein specific steps of which are as follows:step 1: calculate canonically correlated temperatures of a bridge structure acquire T and D of the bridge structure, T=[T1, T2, . . . Tm]T represents a measurement sample of m temperature measurement point in a structural health monitoring system, D=[D1, D2, . . . , Dn]T represents a measurement sample of n expansion joint displacements, calculate a covariance matrix and a cross-covariance matrix of temperature and displacement monitoring data as follows:
where T(t) represents a tth temperature measurement sample; T represents a mean-vector of temperature data; D(t) represents a tth displacement measurement sample; D represents a mean-vector of displacement data; l represents a number of samples; RTT represents a covariance matrix of temperature data; RDD represents a covariance matrix of displacement data;RTD represents a cross-covariance matrix of temperature and displacement data;RDT represents a cross-covariance matrix of displacement and temperature data:determine a pair of base vectors, i.e., u1, and v1, to maximize a correlation between a linear combination of temperatures u1TT and a linear combination of displacements v1TD, their correlation coefficient is as follows:

solving a combination coefficients of the base vectors, which maximize the correlation coefficient, are described by the following optimization problem:

solving combination coefficients of subsequent base vectors, and solving the combination coefficients of all base vectors a following eigenvalue decomposition:
RTT?1RTDRDD?1RDT=U?UT
RDD?1RDTRTT?1RTD=V?VT where ?=diag(?1, ?2, . . . , ?k) is a diagonal eigenvalue matrix; ?i=?2(ui, vi) is an ith eigenvalue; U=[u1u2, . . . , uk] and V=[v1, v2, . . . , vk] are eigenvector matrices; k=min(n,n) is a number of non-zero solutions;step 2: establish a relationship model between canonically correlated temperatures and displacements
define an ith canonically correlated temperature, i.e., Tc,i i=1, 2, . . . , k, as follows:
Tc,i=uiTT
establish a temperature displacement relationship model for bridge expansion joints, using canonically correlated temperatures, as follows:
where Di represents an estimated displacement of the ith expansion joint, i=1, 2, . . . , n; ? represents a regression coefficient;step 3: construct control chart based alarming method
define an error of temperature displacement relationship model as follows:
Ei=Di?Di where Ei represents the error of temperature displacement relationship model of an ith expansion joint displacement, i=1, 2, . . . , n;let E(t) represent an error sequence of an expansion joint, t=1, 2, . . . , l, a mean-value and a standard variation of which are as follows:
where ? represents a mean-value of the error sequence; ?E represents a standard variation of the error sequence;construct a mean-value control chart to the error sequence to realize performance alarming of expansion joints, and three parameters of the mean-value control chart are as follows:
UCL=?+??E
CL=?
LCL=????E where UCL represents an upper control limit; CL represents a center line; LCL represents a lower control limit; ? represents a scaling factor which can be determined according to a given significance level;step 4: determine reasonable control limit
calculate an absolute value of the error sequence, and estimate its probability density function, then obtain a cumulative density function and an inverse cumulative density function: as a result, a control limit of the absolute value of the error sequence, i.e., L, is calculated as:
L=F?1(1??)where F?1(·) represents an inverse cumulative density function of the absolute value of the error sequence; ? represents a significance level;a calculation formula for the scaling factor ? is as:

the upper and lower control limits can then he determined through the scaling factor;
feed a newly acquired temperature and displacement monitoring data into the temperature displacement relationship model of bridge expansion joints, and a model prediction error of an expansion joint E can be obtained; criteria for judging performance degradation of expansion joints is as:
E>UCL
E determining that the performance of expansion joints degrades when E>UCL and/or E

US Pat. No. 10,970,426

METHODS, SYSTEMS, AND DEVICES FOR DESIGNING AND MANUFACTURING A SPINAL ROD

Medicrea International SA...

1. A system for producing a desired curvature of a customized spinal rod to support a vertebral column of a patient, the system comprising:an interface configured to analyze a preoperative x-ray image of a vertebral column of a patient including cervical vertebrae and femoral head of the patient, wherein the preoperative x-ray image is analyzed by identifying on the preoperative x-ray image one or more of an apex point or one or more lordosis parameters, wherein the apex point comprises a forwardmost point of the vertebral column on the preoperative x-ray image, and wherein the one or more lordosis parameters comprises a difference between pelvic incidence and lumbar lordosis;
the interface further configured to determine, among one or more predetermined vertebral column morphotypes, a morphotype to which the vertebral column corresponds;
the interface further configured to perform a wire modeling of the vertebral column of the patient;
the interface further configured to simulate a correction to be applied to a lumbar segment to be treated, wherein simulating the correction comprises one or more of:
repositioning the apex point and obtaining a first curvature above the repositioned apex point and a second curvature below the repositioned apex point; or
redefining the lumbar lordosis;
the interface further configured to deduce a curved segment representing a desired curvature of the customized spinal rod based at least in part on one or more of the redefined lumbar lordosis or the first curvature above the repositioned apex point and the second curvature below the repositioned apex point; and
the interface further configured to transmit data relating to the desired curvature of the customized spinal rod to a production system configured to physically produce, from a spinal rod, the desired curvature of the customized spinal rod,
wherein the interface comprises a computer processor and an electronic storage medium.

US Pat. No. 10,970,425

OBJECT DETECTION AND TRACKING

SEIKO EPSON CORPORATION, ...

1. A non-transitory computer readable medium that embodies instructions that cause one or more processors to perform a method comprising:(A) acquiring, from a camera, an image frame;
(B) acquiring, from an inertial sensor, a sensor data sequence;
(C) tracking a first pose of an object in a real scene based at least on the image frame;
(D) deriving a sensor pose of the object, using the inertial sensor, based on the sensor data sequence, where the sensor pose is a separate pose from the first pose;
(E) determining whether the first pose is lost such that the first pose is no longer located;
(F) retrieving from one or more memories, or generating from a 3D model stored in one or more memories, a training template corresponding to a view that is based on the sensor pose obtained on or after the first pose is lost such that the view is a view of the object just before the object pose is no longer tracked; and
(G) deriving a second pose of the object using the training template.

US Pat. No. 10,970,424

PROGRAM EXECUTION DEVICE

PANASONIC INTELLECTUAL PR...

1. An information processing device comprising: a hardware memory configured to load at least a program to be protected; and a controller configured to judge whether or not the program to be protected is tampered with, by executing a tamper detection program in a secure processing mode, wherein, in the secure processing mode, the controller is configured to prohibit an external device from accessing data in the hardware memory.

US Pat. No. 10,970,423

METHOD AND APPARATUS FOR SECURING KVM MATRIX

High Sec Labs Ltd., Caes...

1. A method for securing a KVM Matrix system having at least one KVM Matrix fabric comprising:a plurality of inputs for communicating via at least one high-speed serial data stream with a corresponding host computer;
a plurality of outputs for communicating via at least one high-speed serial data stream with corresponding peripheral devices, said peripheral devices comprising:
a) Human Interface Devices (HID) selected from a group of keyboard and mouse, and
b) a display, wherein said KVM matrix fabric is configured to route at least one of said inputs to one or more of said outputs;
a plurality of matrix host adapters, wherein each one of the matrix host adapters is connected to a corresponding one of the inputs of said KVM Matrix fabric, and wherein each one of the matrix host adapters is configured to convert peripheral devices interfaces data flowing to and from said corresponding host computer into one or more high-speed serial data streams compatible with said KVM Matrix fabric;
a plurality of matrix console adapters, wherein each one of the matrix console adapters is connected to a corresponding one of the output of said KVM Matrix fabric, and wherein each one of the matrix console adapters is configured to convert peripheral device interfaces data flowing to and from said corresponding peripheral devices into one or more high-speed serial data streams compatible with the said KVM Matrix fabric;
the method comprising any one of or a combination of:
inserting a plurality of input security isolators, wherein each of said input security isolators is connected between said corresponding host computer and said corresponding Matrix host adapter, wherein each of said input security isolators is configured to enforce security data flow policy that is applicable for said corresponding host computer; and
inserting a plurality of output security isolators, wherein each of said output security isolators is connected between said corresponding peripheral devices and said corresponding matrix console adapter, wherein each of said output security isolators is configured to enforce security data flow policy that is applicable for said corresponding peripheral devices.

US Pat. No. 10,970,422

SYSTEMS AND METHODS FOR MASKING USER INPUT AND SENSOR DATA AT A USER DEVICE

Verizon Patent and Licens...

1. A device, comprising:one or more processors configured to:
receive user input according to a first input pattern, the first input pattern comprising:
a plurality of user inputs comprising a plurality of keystrokes, and
a first set of durations associated with the plurality of user inputs, wherein the first set of durations includes a first duration in between receiving two particular keystrokes of the plurality of keystrokes;
mask the user input by changing the first input pattern to a second input pattern, wherein changing the first input pattern to the second input pattern comprises:
generating a second set of durations, wherein the second set of durations includes a different second duration in between the two particular keystrokes, the second set of durations having been generated by:
replacing a plurality of durations, of the first set of durations, associated with a plurality of user inputs, with a particular pre-determined duration, and
performing a randomization function on each duration of the replaced plurality of durations; and
output the masked user input to one or more applications being executed by the device, by providing the user input according to the second input pattern to the one or more applications without outputting the user input, according to the first input pattern, to the one or more applications.

US Pat. No. 10,970,421

VIRUS IMMUNE COMPUTER SYSTEM AND METHOD

1. A storage device configured to decrypt software code stored in a random access memory of a computer, the storage device further configured to prevent a hacker code injection into a running process in a computer, the storage device comprising:a non-transitory computer storage medium, a central processing unit, a data bus, and an address bus;
the non-transitory computer storage medium comprising a key usable for decrypting encrypted program code stored in the random access memory, the key comprising a plurality of bytes wherein each byte in the plurality of bytes has a byte value;
the central processing unit connected to random access memory through the data bus and the address bus;
the central processing unit is programmed to:
identify a designated location in the random access memory;
fetch an encrypted byte from the designated location stored in the random access memory of the computer;
perform a modulus operand between the byte value of the encrypted byte and a length of the key to derive a remainder value;
when the remainder value is zero, fetch the byte value of a last byte in the plurality of bytes of the key;
when the remainder value is non-zero value, fetch the byte value of the byte in the plurality of bytes of the key, said byte located at the non-zero value;
use the byte value that is fetched to decrypt the encrypted byte fetched from the designated location at the random access memory producing a decrypted byte; and,
use the decrypted byte.

US Pat. No. 10,970,420

SYSTEM FOR MANAGING TRANSACTIONAL DATA

Intuit Inc., Mountain Vi...

8. A method, comprising:receiving, from an entity, a first request to push, using a universal resource identifier (URI) of a data store registered with a secure identifier, a detailed transaction corresponding to the secure identifier,
wherein the secure identifier is generated, using an encoding function, from a user identifier of a user, and
wherein the detailed transaction identifies at least one selected from a group consisting of products and services received by the user from the entity;
storing the detailed transaction based on a first determination to trust the entity, wherein the first determination comprises applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction;
performing the first determination using a first access control procedure specified by a first security rule corresponding to a type of the secure identifier and a first target of the first request being a data store of one of the plurality of transaction storage devices;
performing a second determination to trust the entity using a second access control procedure specified by a second security rule corresponding to the type of the secure identifier and a second target of a second request being a registry;
storing, by the registry, at least the first security rule;
receiving, from the entity and by the registry, the second request to lookup the URI of the data store registered with the secure identifier; and
transmitting, to the entity, by the registry, and based on the second determination, the URI of the data store registered with the secure identifier,
wherein the entity generates the first request to push the detailed transaction corresponding to the secure identifier in response to receiving, from the registry and in response to the second request, the URI of the data store registered with the secure identifier.

US Pat. No. 10,970,419

DATA CLEAN ROOM

Snowflake Inc., San Mate...

1. A method comprising:providing a first party data in a first account in a network-based data system;
providing a second party data in a second account in the network-based data system;
executing, by a processor, a secure function using the first party data to generate a first result, including creating links to the first party data and anonymizing identification information in the first party data;
sharing the secure function with the second account;
executing the secure function using the second party data to generate a second result and restricting the second account from accessing the first party data;
generating dummy matching information in the second result for an instance of no match; and
generating a cross reference table with the first and second results, the cross reference table providing anonymized matches of the first and second results, the cross reference table being accessible via the network-based data system for performing analysis of overlapping first party and second pay data.

US Pat. No. 10,970,418

SYSTEM AND METHOD FOR ANONYMIZED DATA REPOSITORIES

ServiceNow, Inc., Santa ...

1. A computing system, comprising:an anonymizer server computer communicatively coupled to a data repository configured to store a personal identification information (PII) data, wherein the anonymizer server computer is configured to perform operations comprising:
receiving a repository configuration request comprising an anonymized data schema and an l-diversity value for an anonymized data repository clone;
creating the anonymized data repository clone based on the anonymized data schema and the l-diversity value;
anonymizing the PII data to create an anonymized data by applying a one-way data masking, a one-way data morphing, or a combination thereof; and
storing the anonymized data in the anonymized data repository clone.

US Pat. No. 10,970,417

DIFFERENTIAL PRIVACY SECURITY FOR BENCHMARKING

Workday, Inc., Pleasanto...

1. A system for determining a calculation utilizing differential privacy, comprising:an interface configured to:
receive a request to determine result data of a calculation using multitenanted data, wherein the multitenanted data comprises tenant data associated with a plurality of tenants;
a hardware processor configured to:
remove identifying information associated with the plurality of tenants from the multitenanted data to obtain deidentified multitenanted data;
determine the result data by performing the calculation on the deidentified multitenanted data;
determine whether a deterministic modification is needed to ensure privacy based at least in part on a number of participants in the result data, an always on status associated with the need for the deterministic modification, or an always off status associated with the need for the deterministic modification; and
in response to determining that the deterministic modification is needed to ensure privacy:
determine the deterministic modification, wherein the deterministic modification comprises a number or a numeric function, wherein the deterministic modification is based at least in part on a number of tenants represented in the result data;
numerically modify the result data using the deterministic modification to determine modified result data; and
provide the modified result data.

US Pat. No. 10,970,416

SYSTEMS AND METHODS TO SECURE PERSONALLY IDENTIFIABLE INFORMATION

WOOKEY Search Technologie...

1. A method implemented in a computer system hosting a three-dimensional virtual reality world, the method comprising:collecting personally identifiable information of users of accounts to access the three-dimensional virtual reality world hosted on the computer system, wherein:
each respective account in the accounts is identified by an account identifier; and
each respective data field of personally identifiable information of the respective account is identified by a data field identifier;
storing a global key;
generating an encryption key from the global key, the account identifier, and the data field identifier for a content of the respective data field of the personally identifiable information of the respective account, wherein:
the content is encrypted using the encryption key to generate an encrypted content of the respective data field of the personally identifiable information of the respective account, and
the encrypted content is decryptable using the encryption key;
determining a storage location for the respective data field of the personally identifiable information of the respective account; and
storing the storage location separate from encrypted contents of personally identifiable information of the accounts.

US Pat. No. 10,970,415

SENSITIVE DATA REDACTION IN MEMORY DUMP

INTERNATIONAL BUSINESS MA...

1. A system, comprising a processor configured to:based on a dump of a virtual address space being triggered:
receive a primary dump corresponding to the virtual address space, the primary dump including one or more tagged memory pages, wherein the one or more tagged memory pages are each tagged as one of sensitive or not sensitive;
identify, by a sensitive data identification module, sensitive data that is located outside of the of the one or more tagged memory pages in the primary dump, wherein data corresponding to the one or more tagged memory pages is not processed by the sensitive data identification module; and
redact data corresponding to the sensitive data and the one or more tagged memory pages to determine a redacted dump.

US Pat. No. 10,970,414

AUTOMATIC DETECTION AND PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION

Intuit Inc., Mountain Vi...

1. A method for detecting personally identifiable information, comprising:retrieving a user-specific dataset from a multi-user dataset;
filtering the user-specific dataset to create a user-specific data subset;
determining a user frequency for each user-specific token of a plurality of user-specific tokens in the user-specific data subset;
determining a multi-user frequency for each user-specific token of the plurality of user-specific tokens in the multi-user dataset, wherein each multi-user frequency is determined based on a frequency of a respective user-specific token across the multi-user dataset;
computing a frequency ratio, based on the user frequency for each user-specific token and the multi-user frequency for each user-specific token, for each user-specific token of the plurality of user-specific tokens; and
protecting each user-specific token whose frequency ratio is above a frequency ratio threshold.

US Pat. No. 10,970,413

FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES

ALTR Solutions, Inc., Sa...

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:receiving, with one or more processors, a request to write a new version of a document to a tamper-evident, immutable data repository, wherein:
the tamper-evident, immutable data repository stores a previous version of the document;
the tamper-evident, immutable data repository stores a plurality of versions of a plurality of other documents; and
the tamper-evident, immutable data repository stores versions of the document and the other documents in a data structure that renders previously stored versions of documents computationally infeasible to modify without making the data structure verifiably internally inconsistent;
after receiving the request, determining, with one or more processors, that the new version of the document is different from the previous version of the document; and
in response to determining that the new version of the document is different from the previous version of the document, storing, with one or more processors, a difference between the previous version of the document and the new version of the document by:
obtaining the previous version of the document from the tamper-evident, immutable data repository;
determining a set of changes that, when made to the previous version of the document, transform the previous version of the document into the new version of the document by comparing the new version of the document to the previous version of the document;
storing the set of changes in the tamper-evident, immutable data repository without storing a full copy of the new version of the document in the tamper-evident, immutable data repository; and
storing a pointer to the previous version of the document in association with the set of changes, the pointer directly or indirectly indicating wherein in the tamper-evident, immutable data repository to obtain the previous version of the document, the previous version being an initial version or a set of differences.

US Pat. No. 10,970,412

FILE SHARING SYSTEM AND METHOD

Duvon Corporation, Las V...

1. A file sharing system for one or more files, the file sharing system comprising:a server comprising one or more storage devices, wherein in operation the server receives and stores one or more file usage permissions for the one or more files on the one or more storage devices and generates one or more backups of historical information recording sharing activity of the one or more files; and
one or more personal storage devices remote from the server and comprising one or more communication devices and at least one storage device that stores the one or more files, wherein in operation the one or more personal storage devices:
retrieve the one or more file usage permissions associated with a requested file from the server, wherein the requested file is one of the one or more files;
provide access to the requested file based on the one or more file usage permissions associated with the requested file; and
establish a direct connection between the one or more communication devices and a recipient device, wherein access to the requested file is provided to the recipient device via the direct connection;
wherein the requested file is never stored on the server;
wherein the one or more backups are stored on the one or more storage devices or the at least one storage device.

US Pat. No. 10,970,411

DATABASE PREFERENCE SHARING AND MANAGEMENT

International Business Ma...

1. A system, comprising:a blockchain network, comprising:
a first blockchain server, comprising:
a first memory configured to store historical sensor data and a shared ledger; and
a first hardware processor configured to receive first sensor updates from one or more sensors associated with the first blockchain server, and create a blockchain transaction to store updated action defaults and validated sensor updates that correspond to the first sensor updates to the shared ledger; and
a second blockchain server, comprising:
a second memory configured to store the shared ledger, and
a second hardware processor configured to receive second sensor updates from one or more sensors associated with the second blockchain server, read the shared ledger to determine updated action defaults and validated sensor updates that correspond to the second sensor updates, and interact with a device based on the updated action defaults and validated sensor updates that correspond to the second sensor updates.

US Pat. No. 10,970,410

ACCESSING PROTECTED DATA BY A HIGH-PERFORMANCE COMPUTING CLUSTER

Lawrence Livermore Nation...

1. A method performed by a computing device for providing an application with access to a decrypted version of an encrypted file, the method comprising:launching a data encryption process for execution on the computing device;
under control of the data encryption process,
initiating by the data encryption process launching of an executable of the application for execution on the computing device as an application process in a secure execution environment, the secure execution environment restricting the application process to resources within the secure execution environment;
upon receiving from the application process a request to read from the encrypted file,
sending to a policy server a key request for an object encryption key for the encrypted file, the request identifying a policy for the application, a user, the executable, and the encrypted file;
receiving from the policy server an encrypted object encryption key for the encrypted file, the encrypted object encryption key being sent by the policy server in response to receiving the key request;
decrypting the object encryption key;
retrieving at least a portion of the encrypted file;
decrypting the retrieved portion using the object encryption key; and
storing the decrypted portion in the secure execution environment so that the decrypted portion is accessible by the application process, and the application process cannot output the decrypted portion to any resources outside the secure execution environment,
wherein the application process is not provided with the object encryption key and cannot output data except in accordance with the secure execution environment.

US Pat. No. 10,970,409

SECURITY RAM BLOCK WITH MULTIPLE PARTITIONS

Altera Corporation, San ...

1. An apparatus, comprising:programmable logic;
secure Random Access Memory (RAM), to be powered by the battery;
wherein the apparatus is configured, when the secure RAM is powered by the battery, to, store an Advanced Encryption Standard (AES) key in the secure RAM;
receive an encrypted configuration bitstream received with a header that includes a message authentication value that is used to authenticate the configuration bitstream;
authenticating the configuration bitstream comprising comparing the message authentication value to the encrypted configuration bitstream after a function is performed on the encrypted configuration bitstream;
decrypt the encrypted configuration bitstream using the AES key to obtain a decrypted configuration bitstream;
store the decrypted configuration bitstream in a first partition of a plurality of partitions of the secure RAM;
process the decrypted configuration bitstream to configure the programmable logic;
receive application data from a first programmable region of a plurality of programmable regions of the programmable logic;
allocate, via a configuration controller, the first partition to the first programmable region;
based at least in part on the first partition being allocated to the first programmable region, store the application data in the first partition of the secure RAM alongside the decrypted configuration bitstream;
prevent storage of data from the first programmable region to a second partition of the plurality of partitions based at least in part on the second partition being allocated via the configuration controller to a second programmable region of the plurality of programmable regions;
detect an attempt to tamper with the apparatus based at least in part on a mismatch between the message authentication value and a message authentication code (MAC); and
in response to the detected attempt to tamper, remove power to the secure RAM to erase data stored in the secure RAM, wherein removing power comprises disconnecting the battery.

US Pat. No. 10,970,408

METHOD FOR SECURING A DIGITAL DOCUMENT

THALES DIS CPL USA, INC.,...

1. A computer-implemented method for securing a digital document comprising first and second types of data, a set of data of the second type being previously identified in an initial version of said digital document, wherein the method comprises the steps:for each data of the second type, allocating an identifier to said data and storing an entry comprising said data in a secure storage unit, said identifier comprising a display value and a link value, said data being reachable in the secure storage unit through said link value, the secure storage unit being configured to use access rules for authorizing or denying a request initiated by a user and aiming at accessing a data of the second type comprised in an entry of the secure storage unit,
generating an updated version of the digital document by replacing each data of the second type by its allocated identifier in the initial version of the digital document, and
providing the user with the updated version of the digital document by displaying data of the first type to the user in a first software application while displaying data of the second type to the user in a second software application separate from the first software application, said user being an individual.

US Pat. No. 10,970,407

PROCESSES AND RELATED APPARATUS FOR SECURE ACCESS CONTROL

1. A process for linking a key to a component, comprising: identifying said component using environmental variables associated with the component, said component comprising a computer in networked communication;generating a set of intervals that are random and unique to the component;
mapping a key to a subset of the intervals;
selecting a random value for each interval in the subset that falls within the interval thereby forming a representation of said key unique to said component, the representation comprising the random values;
submitting the representation of said key;
authenticating said component as source of the representation by testing that the random values fall within corresponding intervals; reconstructing said key from the representation; and
wherein said key comprises r key characters, each key character mapped to one or more sections of a digital asset and each key character mapped to a public key/private key pair for encryption and/or decryption of the one or more sections of the digital asset.

US Pat. No. 10,970,406

SYSTEM FOR MITIGATING EXPOSURE ASSOCIATED WITH IDENTIFIED UNMANAGED DEVICES IN A NETWORK USING SOLUTION DATA MODELLING

BANK OF AMERICA CORPORATI...

1. A system for mitigating exposures associated with identified unmanaged devices in a network, the system comprising:one or more memory devices having computer readable code stored thereon; wherein the one or more memory devices comprises a plurality of databases comprising a model database and an incident database;
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to:
generate one or more solution data models comprising a plurality of asset systems and a plurality of users, wherein each of the plurality of asset systems is associated with at least one user of the plurality of users and wherein at least a first of the plurality of asset systems is associated with at least a second of the plurality of asset systems, wherein generating the one or more solution data models comprises:
accessing one or more authentication systems, wherein the one or more authentication systems comprise authentication information associated with the plurality of asset systems and the plurality of users;
extracting the authentication information associated with the plurality of asset systems and the plurality of users;
accessing one or more human resources systems, wherein the one or more human resources systems comprise human resources information associated with the plurality of users;
extracting the human resources information associated with the plurality of users;
accessing one or more asset management systems, wherein the one or more asset management systems comprise asset information associated with at least type and location of the plurality of asset systems;
extracting the asset information associated with plurality of asset systems;
identifying a first set of relationships between each of the plurality of asset systems based on the extracted authentication information;
identifying a second set of relationships between each of the plurality of users and each of the plurality of asset systems based on the extracted authentication information; and
formulating the one or more solution data models based on the first set of relationships, the second set of relationships, the asset information, and the human resources information;
store the one or more solution data models in the model database;
receive an input from a user to identify unmanaged devices in a network;
access a first solution data model associated with the network from the model database;
identify the unmanaged devices in the network based on the first solution data model; and
display information associated with the unmanaged devices to the user.

US Pat. No. 10,970,405

METHOD AND ELECTRONIC DEVICE FOR MANAGING FUNCTIONALITY OF APPLICATIONS

SAMSUNG ELECTRONICS CO., ...

1. An electronic device for managing functionality of applications, the electronic device comprising:a memory; and
a processor, coupled to the memory, configured to:
detect a first input on a graphical element displayed on a display of the electronic device, wherein the graphical element represents a first application;
generate at least two sub-graphical elements based on the detected first input and based on functional data items of the first application, the detected first input comprising a splitting action performed by diverging a first touch point away from a second touch point while both the first touch point and the second touch point are simultaneous touch points of a user's fingers on the graphical element and each of the at least two sub-graphical elements representing a different functional data item among functional data items of the first application, wherein the functional data items are services, provided by the electronic device, having policies associated therewith;
control the display to display the at least two sub-graphical elements along with the respective functional data item of the first application;
detect an association event input with respect to a graphical element representing a second application and one of the sub-graphical elements associated with the first application;
dynamically create at least one policy based on the association event; and
apply the at least one policy to the second application, wherein one of the sub-graphical elements are overlaid onto at least a portion of a graphical element representing the second application by the association event input.

US Pat. No. 10,970,404

METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR AUTOMATED CONSTRUCTION OF DATA MASKS

Informatica LLC, Redwood...

1. A method executed by one or more computing devices for generating a data masking syntactic definition for a data element of an unknown type comprising:generating, by at least one of the one or more computing devices, one or more alphabets corresponding to one or more element member positions of the data element based at least in part on scanning element members occurring at each element member position in a plurality of data elements of the unknown type until all symbols appearing at that element member position are determined, wherein the one or more alphabets are generated from a plurality of potential alphabets, wherein any redundancy in the plurality of potential alphabets is removed when generating the one or more alphabets, and wherein each alphabet comprises a set of one or more sequential element members that have occurred in the plurality of data elements at an element member position; and
generating, by at least one of the one or more computing devices, a positional map describing a syntactic structure of the data element by mapping at least one of the one or more alphabets to each element member position of the data element, the positional map linking each element member position of the data element to at least one of the one or more alphabets in a memory of at least one of the one or more computing devices.

US Pat. No. 10,970,403

FORENSIC INVESTIGATION TOOL

United Services Automobil...

1. A method comprising:determining, by at least one processing device, that a content item is encrypted;
identifying, by the at least one processing device, an encryption tool used in encrypting the content item based on a file format of the content item;
retrieving, by the at least one processing device, a decryption key for decrypting the content item based on the identified encryption tool, wherein the retrieving comprises:
obtaining, from data input into a plurality of fields on a website, (i) a first username of a first authenticator and a first authentication code corresponding to the first authenticator, and (ii) a second username of a second authenticator and a second authentication code corresponding to the second authenticator,
authenticating each of the first username of the first authenticator, the first authentication code corresponding to the first authenticator, the second username of the second authenticator and the second authentication code corresponding to the second authenticator,
responsive to the authenticating based on the data input into the plurality of fields of the website, accessing a repository of decryption information, the repository storing a plurality of decryption keys,
retrieving the decryption key from the accessed repository of decryption information based on the identified encryption tool, and
decrypting the encrypted content item using the retrieved decryption key.

US Pat. No. 10,970,402

DISTRIBUTED LEARNING PRESERVING MODEL SECURITY

International Business Ma...

1. A method of secure distributed machine learning, comprising:selecting a leader agent from a set of agents, each agent having associated therewith a cryptographic key;
providing management information derived by the leader agent to each other agent in the set, the management information comprising a set of learning parameters, together with data associated with an encryption scheme, wherein each such other agent receives the management information encrypted by its corresponding cryptographic key;
receiving from each agent in the set encrypted parameters of a learning model, the encrypted parameters of the learning model having been computed by the agent against a dataset local to the agent and based on the management information; and
computing a function over the encrypted parameters of the learning models received from the set of agents to generate a fused learning model, wherein the function is computed without first exposing the parameters of the learning models.

US Pat. No. 10,970,401

SECURE ASSET MANAGEMENT SYSTEM

Rambus, Inc., San Jose, ...

1. A data processing system with a trusted execution environment, the data processing system comprising:a host processor configured to operate in a secure mode associated with the trusted execution environment and a non-secure mode;
a system bus operationally coupled with the host processor;
a resource connected to the system bus, wherein the resource is partitioned into a secure area and a non-secure area, wherein the secure area is accessible using a first set of addresses within a secure address space of the secure area, and wherein the non-secure area is accessible by the host processor operating in the secure mode and the non-secure mode using a second set of addresses within a public address space of the non-secure area; and
a secure module connected to the system bus, the secure module being configured to respond to tokens posted by the host processor in the secure mode, wherein a given token of the tokens identifies:
a respective secure asset of a plurality of secure assets;
respective source addresses within the secure address space of the secure area of the resource; and
respective destination addresses within the public address space of the non-secure area of the resource, the secure module including:
an internal memory storing the plurality of secure assets identifiable by the tokens;
a memory access circuit configured to, for the given token, read data from the resource connected to the system bus using the respective source addresses and write processed data to the resource connected to the system bus using the respective destination addresses; and
a cryptography engine configured to, for a given token, process the read data using the respective secure asset,
the secure module being further configured to respond to tokens posted by the host processor in the non-secure mode,
the internal memory of the secure module storing a respective rule with each secure asset of the plurality of secure assets, the respective rule defining permissions as to the public address space and the secure address space where the memory access circuit is authorized to read data and write data, and
the secure module ignores tokens that do not satisfy the permissions defined in the respective rule.

US Pat. No. 10,970,400

MULTI-STAGE TRAINING OF MACHINE LEARNING MODELS

KENNA SECURITY, INC., Ch...

1. A system comprising:storage media;
one or more processors; and
one or more programs stored in the storage media and configured for execution by the one or more processors, the one or more programs comprising instructions for:
using one or more first machine learning techniques to generate a first prediction model based on first training data, wherein the first prediction model enables determining a likelihood of whether exploits will be developed for software vulnerabilities;
wherein the first training data comprises a first plurality of training instances, and wherein each training instance of the first plurality of training instances comprises one or more features corresponding to a respective software vulnerability;
for each training instance of the first plurality of training instances:
using the first prediction model to generate a corresponding score, and
adding said each training instance to second training data only if the corresponding score is greater than a first threshold value;
wherein the second training data is a strict subset of the first training data; and
using one or more second machine learning techniques to generate a second prediction model based on the second training data, wherein the second prediction model enables determining a likelihood of whether exploits will be developed for software vulnerabilities.

US Pat. No. 10,970,399

METHOD AND APPARATUS FOR PROCESSING DATA

Infineon Technologies AG,...

1. A method for processing data in a plurality of processing acts, the method comprising:configuring a plurality of processing circuits in a first configuration, in such a way that both a first processing circuit and a second processing circuit of the plurality of processing circuits execute a first processing act of the plurality of processing acts; and
configuring the plurality of processing circuits in a second configuration, in such a way that the first processing circuit executes a second processing act and the second processing circuit executes a third processing act, which is different than the second processing act,
configuring a multiplexer circuit to combine output data from the first processing circuit and the second processing circuit after the first processing act, and again combine output data from the first processing circuit and the second processing circuit after the second processing act and after the third processing act, respectively.

US Pat. No. 10,970,398

DATA PROVISION SYSTEM, DATA SECURITY DEVICE, DATA PROVISION METHOD, AND COMPUTER PROGRAM

KDDI CORPORATION, Tokyo ...

1. A data provision system, comprising:a data provision device;
a data security device; and
an in-vehicle computer installed in a vehicle,
wherein the data provision device includes:
at least one first memory configured to store instructions; and
at least one first processor configured to execute the instructions to,
transmit a first data, which is a computer program or setting data, to be applied to the in-vehicle computer to the vehicle, and
transmit a first message authentication code of the first data and a third message authentication code of the first message authentication code to the data security device,
the data security device includes:
at least one second memory configured to store instructions; and
at least one second processor configured to execute the instructions to,
calculate a fourth message authentication code of the first message authentication code received from the data provision device and verify the fourth message authentication code on the basis of the third message authentication code received from the data provision device, and
transmit the first message authentication code for which the verification of the fourth message authentication code has succeeded to the in-vehicle computer,
the in-vehicle computer includes:
at least one third memory configured to store instructions; and
at least one third processor configured to execute the instructions to,
apply the first data provided by the data provision device to the in-vehicle computer, set a first message authentication code, which is provided by the data provision device in advance and is transmitted when the verification in the data security device has succeeded, as an expected value for use in a secure boot, and execute the secure boot after applying the first data to the in-vehicle computer,
calculate, in the secure boot, a second message authentication code of the first data applied to the in-vehicle computer, and verify the second message authentication code on the basis of the expected value, and
transmit a data application result indicating success or failure of application of the first data to the in-vehicle computer based on a result of the verification,
wherein the one first processor of the data provision device is configured to receive the data application result from the vehicle.

US Pat. No. 10,970,397

DYNAMIC ANALYSIS TECHNIQUES FOR APPLICATIONS

Palo Alto Networks, Inc.,...

1. A system, comprising:a processor configured to:
configure a virtualized storage for use in performing dynamic analysis on a mobile application, at least in part by copying the mobile application to the virtualized storage;
launch a virtual machine emulator using a snapshot of a virtualized platform previously configured to use the virtualized storage;
determine a location of the copied mobile application in an image corresponding to the virtualized storage, at least in part by identifying an offset of the mobile application, and install the copied mobile application; and
perform dynamic analysis on the mobile application; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,970,396

INTELLIGENT EVENT COLLECTION FOR ROLLING BACK AN ENDPOINT STATE IN RESPONSE TO MALWARE

Malwarebytes Inc., Santa...

1. A method for detecting malware comprising:detecting an event associated with a process performing an operation on a file;
determining if the event associated with the process matches an event in an exclusions list;
responsive to determining that the event associated with the process is absent from the exclusions list, monitoring the operation of the process comprising saving a plurality of event data describing a plurality of events associated with the process on a client device and sending the plurality of event data to a server;
responsive to detecting an opening of an original file by the process for editing, saving a copy of the original file prior to the original file being edited by the process;
receiving, by the client device, an indication from the server of whether the process corresponds to malware based on whether the plurality of event data includes a pattern of events indicative of malware; and
responsive to receiving an indication that the process corresponds to malware, restoring a file edited by the process to the saved copy of the original file prior to the file being edited by the process.

US Pat. No. 10,970,395

SECURITY THREAT MONITORING FOR A STORAGE SYSTEM

Pure Storage, Inc, Mount...

1. A method comprising:receiving, by a security threat monitoring system, performance metric data representative of a performance metric for a storage system;
applying, by the security threat monitoring system, the performance metric data as an input to an unsupervised machine learning model;
identifying, by the security threat monitoring system based on an output of the unsupervised machine learning model, an anomaly in the performance metric data;
determining, by the security threat monitoring system, that the anomaly is representative of a security threat to the storage system; and
performing, by the security threat monitoring system based on the determining that the anomaly is representative of the security threat to the storage system, a remedial action associated with the anomaly by performing one or more of
slowing down a performance of at least one operation on the storage system,
preventing at least one operation from being performed on the storage system, or
disabling at least one element of the storage system.

US Pat. No. 10,970,394

SYSTEM, DEVICE, AND METHOD OF DETECTING VISHING ATTACKS

BIOCATCH LTD., Tel Aviv ...

1. A method comprising:(a) monitoring user interactions, that are performed via a touch-screen by a user that utilizes a smartphone to interact with a computerized service;
(b) analyzing said user interactions, that are performed via said smartphone, and determining from said user interactions that a set of operations were performed by said user as part of a vishing attack against said user in which an attacker dictated to said user which operations to perform on said smartphone towards said computerized service, and triggering a fraud mitigation module to perform one or more pre-defined fraud mitigation operations;
wherein step (b) comprises:
(A) sensing device orientation data of said smartphone, via at least one of: an accelerometer of said smartphone, a gyroscope of said smartphone, a compass unit of said smartphone, a device-orientation sensor of said smartphone;
(B) detecting an alternating usage of said smartphone, in which the smartphone is alternating between: (B1) the smartphone being utilized for hearing telephonic audio while not being engaged via the touch-screen of the smartphone, and (B2) the smartphone being engaged via the touch-screen of the smartphone;
(C) based on the alternating usage detected in step (B), determining that said smartphone was utilized to access said computerized service within a vishing attack against said user in which said attacker dictated telephonically to said user which operations to perform via the touch-screen of said smartphone which caused the user to alternate said smartphone between being utilized for listening to audio telephonic instructions and performing interactions on the touch-screen of the smartphone.

US Pat. No. 10,970,393

PROBABILISTIC SET MEMBERSHIP USING BLOOM FILTERS

Altiris, Inc., Tempe, AZ...

1. A method for determining whether data is included in a database, at least a portion of the method being performed by one or more computing devices, each comprising at least one processor, the method comprising:receiving, from a remote computing device, a search request that includes a portion of a signature;
comparing the portion of the signature with a plurality of signatures stored at the database;
determining whether at least one match exists between the portion of the signature and the plurality of signatures;
upon determining at least one match exists, identifying each match and identifying a bloom filter that includes each match, wherein the bloom filter is generated before receiving the search request based at least in part on (a) identifying a segment from the plurality of signatures stored at the database, (b) generating the bloom filter using the identified segment, and (c) determining at least a part of the segment matches the portion received in the request or determining at least a part of the portion received in the request matches the segment; and
taking a security action based at least in part on determining the data matches one or more malware signatures in the bloom filter; and
transmitting the bloom filter to the remote computing device.

US Pat. No. 10,970,392

GROUPING APPLICATION COMPONENTS FOR CLASSIFICATION AND MALWARE DETECTION

Palo Alto Networks, Inc.,...

1. A system, comprising:a memory; and
a processor, coupled to the memory, wherein the memory is configured to provide the processor with instructions, and wherein the processor is configured to:
receive a first mobile application;
perform a reversing operation on the first mobile application, including by using a static analysis engine to determine a plurality of libraries included in the first mobile application;
categorize each library included in the plurality of libraries;
determine that the first mobile application is similar to a second mobile application based at least in part on a comparison of the respective categorizations of the respective libraries included in the respective first and second mobile applications; and
take an action based on the determination that the first mobile application is similar to the second mobile application, wherein taking the action includes at least one of: (1) determining whether the first mobile application attempts to inject a malicious payload into a library included in the plurality of libraries, or (2) determining whether the first mobile application repackages the second mobile application.

US Pat. No. 10,970,391

CLASSIFICATION METHOD, CLASSIFICATION DEVICE, AND CLASSIFICATION PROGRAM

NIPPON TELEGRAPH AND TELE...

1. A classification method executed by a classification device, the classification method comprising:a step of constructing tree structure data in which attribute information relating to a single communication or multiple communications serves as a terminal node, from a series of communications along a timeline with a single communication destination or multiple communication destinations that each take place at a time instance when software is executed, wherein there are a plurality of terminal nodes, and the step of constructing is performed by repeating a process of initially creating at least one higher node connecting at least two terminal nodes of the plurality of terminal nodes based on a high similarity of attribute information or a predetermined characteristic of communication occurrence times among the plurality of terminal nodes, and creating a new higher node connecting remaining nodes, including terminal nodes or higher nodes, among the current nodes in the tree structure based on a high similarity of attribute information or the predetermined characteristic of communication occurrence times among nodes that are not already connected to each other by a higher node, wherein each higher node shares the timeline with the terminal nodes;
a step of calculating attribute information on each of the created higher nodes based on attribute information on the terminal nodes to which the respective higher node connects; and
a step of classifying the software by specifying a type of the software based on attribute information on a highest node created in the tree structure.

US Pat. No. 10,970,390

MECHANISM TO PREVENT SOFTWARE SIDE CHANNELS

Intel Corporation, Santa...

1. A processor comprising:a cache memory; and
a processing core to:
execute a create instruction to create an architecturally-protected environment comprising an architecturally-protected memory;
identify a code comprising a plurality of instructions to be executed in the architecturally-protected environment;
execute a preamble instruction after execution of the create instruction and prior to execution of the plurality of instructions, wherein execution of the preamble instruction triggers pre-translation of virtual memory pages to physical memory pages that are to be used by the code;
lock an area of the cache memory, wherein the locked area is not an eviction victim when the cache memory is full;
determine that a first physical memory page stored in the architecturally-protected memory matches a first virtual memory page referenced by a first instruction of the plurality of instructions;
generate a first address mapping between a first address of the first virtual memory page and a second address of the first physical memory page;
store, in the locked area of the cache memory, an address translation data structure comprising the first address mapping; and
execute the code by retrieving the first address mapping stored in the address translation data structure of the locked area of the cache memory.

US Pat. No. 10,970,389

RESOURCE REALLOCATION BASED ON EXPECTED REWARDS

International Business Ma...

1. A method for determining a reallocation of resources among a plurality of physical areas, the method comprising:determining, by a computer device associated with a defender entity, initial allocation data that indicates a first amount of resources allocated to a plurality of physical areas;
determining, by the computer device, a set of attacker expected rewards based on the initial allocation data, wherein each attacker expected reward indicates an expectation of attack scores resulting from an attack on a corresponding physical area, and each attacker expected reward decreases as an amount of resources allocated to the corresponding physical area increases;
determining, by the computer device, a set of defender expected rewards based on the attacker expected rewards, wherein each defender expected reward indicates an expectation of defensive scores resulting from the attack on the corresponding physical area, and each defender expected reward increases as an amount of resources allocated to the corresponding physical area increases;
determining, by the computer device, a set of moving rewards indicating defensive scores in response to movement of the resources among the plurality of physical areas;
determining, by the computer device, a set of defender response rewards that indicates defensive scores resulting from an optimal attack on the plurality of physical areas, wherein the optimal attack is based on a simulation, by the computer device associated with the defender entity, of an optimal response by an attack entity in response to the first amount of resources allocated to a plurality of physical areas; and
generating, by the computer device, reallocation data based on the set of moving rewards and the set of defender response rewards, wherein the reallocation data indicates an allocation of a second amount of resources to the plurality of physical areas, and the second amount of resources maximizes at least some of the defensive scores indicated by the set of moving rewards and the set of defender response rewards.

US Pat. No. 10,970,388

DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTION

WEBROOT INC., Broomfield...

1. A system comprising:one or more processors; and
memory coupled to at least one of the one or more processors, the memory comprising computer executable instructions that, when executed by the at least one processor, performs a method for discrete processor feature behavior collection and analysis, the method comprising:
monitoring, by a monitoring engine, software content;
detecting interaction between the software content and the system in a first execution environment, wherein the interaction causes a set of instructions to be loaded in memory coupled to the at least one of the one or more processors, the memory associated with the first execution environment and the set of instructions for execution on the one or more processors of the system, and wherein the interaction generates a first set of performance data;
in response to loading the set of instructions in memory of the first execution environment for execution on the one or more processors of the system, loading the set of instructions into a second execution environment of the monitoring engine;
generating a first set of performance data for the software content using the first execution environment, wherein the first set of performance data comprises first process trace data for the interaction;
generating a second set of performance data for the software content using the second execution environment, wherein the second set of performance data comprises second process trace data for the interaction;
evaluating the first set of performance data to identify a first set of calls;
evaluating the second set of performance data to identify a second set of calls, wherein evaluating the first set of performance data or the second set of performance data comprises using the performance data to reconstruct, in real-time, one or more execution paths for the set of instructions, and evaluating the one or more execution paths to identify at least one of: function names, memory addresses, and corresponding offsets;
comparing the first set of calls to the second set of calls to identify a third set of calls, wherein the third set of calls represent calls of interest; and
evaluating the third set of calls to categorize the software content.

US Pat. No. 10,970,387

SYSTEMS, METHODS, AND APPARATUSES FOR INTRUSION DETECTION AND ANALYTICS USING POWER CHARACTERISTICS SUCH AS SIDE-CHANNEL INFORMATION COLLECTION

Power Fingerprinting Inc....

1. An apparatus, comprising:a power management circuit configured to be operatively coupled to a processor, the power management circuit configured to send to the processor a first power signal and a second power signal that is generated by varying the first power signal based on a regulatory function of the power management circuit, the regulatory function of the power management circuit including a set of policies to regulate the first power signal within operating parameters of the power management circuit;
a sensor in communication with or included within at least one of the power management circuit or the processor, the sensor configured to detect a first side-channel information of the processor based on the first power signal and a second side-channel information of the processor that is based on the second power signal; and
a notification circuit in communication with the sensor, the notification circuit configured to send a notification signal indicative of an anomaly of the processor when the anomaly of the processor is detected based on at least one of the first side-channel information or the second side-channel information.

US Pat. No. 10,970,386

SCALABLE COMPUTING ENVIRONMENT GENERATION AND COMPUTE RESOURCE ASSIGNMENT

Microsoft Technology Lice...

1. A method for generating a set of multiple virtual computing environments and allocating compute resources among the set of multiple virtual computing environments, the method comprising:receiving a first input comprising: a team definition comprising a team roster, and a first project definition comprising a first template;
automatically generating, based on the first input, a first set of multiple virtual computing environments, the first set of multiple virtual computing environments comprising a unique virtual computing environment for each member enumerated by the team roster, wherein each virtual computing environment comprises emulation of computing hardware specified by the first template;
automatically providing, to each member enumerated by the team roster, user access to the unique virtual computing environment of the first set of multiple virtual computing environments such that there is a one-to-one correspondence between virtual computing environments of the first set of multiple virtual computing environments and members of the team as enumerated by the team roster;
automatically creating, based on the first input, administrator access for a first administrator to each virtual computing environment of the first set of multiple virtual computing environments;
automatically linking each virtual computing environment, of the first set of multiple virtual computing environments, to a first project associated with the first project definition;
automatically linking the first project to a team defined by the team definition;
allocating, to the team, a predefined quantity of compute resources;
automatically allocating, to the first project, a portion of the predefined quantity of compute resources that were allocated to the team; and
automatically allocating, to each virtual computing environment, of the first set of multiple virtual computing environments, a first initial allocation of compute resources, the first initial allocation of compute resources being based on the portion of the compute resources allocated to the first project and on a quantity of virtual computing environments in the first set of virtual computing environments;
wherein emulated computing, by a virtual computing environment, consumes compute resources allocated to the virtual computing environment.

US Pat. No. 10,970,385

MULTIPLE DEVICE CREDENTIAL SHARING

Apple Inc., Cupertino, C...

1. A non-transitory computer readable medium having program instructions stored therein that are executable by a first computing device to cause the first computing device to perform operations comprising:storing a set of user credentials usable to authenticate a user of the first computing device;
in response to determining that the first computing device and a second computing device are registered to a same user account, exchanging a shared secret between the first and second computing devices to establish an encrypted channel;
receiving, from the second computing device via the encrypted channel, a request for a user credential to be provided responsive to an authentication prompt associated with the second computing device, wherein the receiving includes receiving an indication of a service for which the authentication prompt is being presented;
based on the indication, determining whether the stored set of user credentials includes a user credential relevant to the authentication prompt;
presenting a selection prompt asking a user of the first computing device to select one of the stored set of user credentials to provide to the second computing device for authentication to the service, wherein the selection prompt identifies the relevant user credential; and
communicating the selected user credential via the encrypted channel.

US Pat. No. 10,970,384

AUTHENTICATION OF AN ELECTRONIC CIRCUIT

Proton World Internationa...

1. An authentication system, comprising:a verifier circuit having a one-way function stored therein that matches a private value to a public value, but not having a set of private values stored therein; and
a candidate circuit having stored therein a set of public values, a set of seeds smaller in number than the set of public values, and a function for deriving a secret value from a public value using a seed of the set of seeds, but not having the set of private values stored therein, the candidate circuit including a destructive readout non-volatile memory for storage of the set of seeds, said destructive readout non-volatile memory permitting readout of each seed of the set of seeds only one time by erasing each seed from storage in response to read out of that seed from the destructive readout non-volatile memory;
wherein the verifier circuit is configured to select one of the set of public values and to send a request to the candidate circuit for a secret value corresponding to the selected one of the set of public values;
wherein the candidate circuit is configured to receive the request for the secret value corresponding to the selected one of the set of public values, to derive the secret value from the selected one of the set of public values using a seed from the set of seeds, and to send the secret value to the verifier circuit; and
wherein the verifier circuit is configured to receive the secret value, to determine whether the received secret value matches the selected one of the set of public values using the one-way function, and to authenticate the candidate circuit based upon the determination.

US Pat. No. 10,970,383

DEVICE MANAGER PROVIDING RESOURCE CONTROL AND SYNCHRONIZATION

Apple Inc., Cupertino, C...

1. A non-transitory computer accessible storage medium storing a plurality of instructions that are computer-executable to:receive a request from a device driver for a resource allocated to a device in a computer system, the request received by a device manager that has access to a device database;
access the device database by the device manager to locate the resource; and
respond to the request by the device manager with a value useable by the device driver to access the resource, restricting the device driver to the provided resource and preventing the device driver from allocating the resource to the device, wherein the resource comprises at least one of a first address space within a memory address space or an interrupt assigned to the device, wherein the first address space is memory-mapped to the device, and wherein a read having an address in the first address space is routed to the device instead of to a memory to which a remainder of the memory address space is mapped, and wherein the device is configured to assert the interrupt to an interrupt controller.

US Pat. No. 10,970,382

SYSTEM FOR DEVICE AUTHENTICATION

Sital Technology And Hard...

1. A system for identifying unauthorized signals on a data bus comprising:two or more transmitting devices;
a data base containing a list of authorized messages from each transmitting device and corresponding message physical traits, the two or more transmitting devices being connected to the data bus and being constructed and arranged to transmit data at a signal rate;
a receiver connected to the data bus;
a fast counter; and
a logic unit;
wherein the fast counter is constructed and arranged to generate, from the signal rate, a higher sampling rate for a sampling unit configured to sample the data bus voltage and generate a received signal; and
wherein the logic unit is constructed and arranged to compute a probability that two or more physical traits of the received signal correspond with those of the authorized messages contained in the data base to thereby verify that the received signal is an authorized signal from one of the two or more transmitting devices,
wherein the physical traits include any two of: a received signal rise time, a received signal fall time, voltage level of the received signal, pulse width of the received signal, and received signal tail length.

US Pat. No. 10,970,381

SYSTEM FOR IDENTIFYING UNAUTHORIZED SIGNALS ON A DATA BUS

Sital Technology And Hard...

1. A system for identifying unauthorized signals on a data bus comprising:the data bus;
two or more transmitting devices connected to the data bus and transmitting data at a signal rate;
a receiver connected to the data bus;
a fast counter;
a logic unit;
a sampling unit configured to sample the data bus voltage and generate a received signal; and
a data base containing a list of authorized messages from each transmitting device and corresponding message physical traits;
wherein the fast counter increases the signal rate prior to being sampled by the sampling unit, and
wherein the logic unit is constructed and arranged to compute a probability that measured physical traits of the received signal correspond with those contained in the data base to thereby identify whether the received signal is from one of an authorized said transmitting device,
wherein the logic unit is constructed and arranged to identify that the received signal is not from an authorized transmitting device when:
a probability that a voltage value, as a first physical trait, is within bounds greater than 90%; and
a probability of a pulse width, as a second physical trait, is within bounds greater than 90%.

US Pat. No. 10,970,380

INTERNET-OF-THINGS PARTNER INTEGRATION

Verizon Patent and Licens...

1. A method, comprising:registering devices for a data service to create registered devices, wherein the data service is configured to route application programming interface (API) calls between the registered devices through a data service platform for secure Internet of Things (IoT) API calls;
maintaining, by a network device in the data service platform, a real-time log of transmission control protocol (TCP) flow data for connections between the registered devices, wherein the real-time log includes logged TCP flow data for current TCP session flows, wherein the logged TCP flow data includes, for each of the connections, a first five-tuple of:
a source Internet protocol (IP) address,
a source port identifier,
a destination IP address,
a destination port identifier, and
a connection time;
receiving, by the network device and from a first registered device of the registered devices, a call validation request for an IoT API call directed to the first registered device from a second registered device of the registered devices, wherein the call validation request includes packet information of the IoT API call including a second five-tuple of:
an IP address of the second registered device used to send the IoT API call,
a port identifier of the second registered device used to send the IoT API call,
an IP address of the first registered device used to receive the IoT API call,
a destination port identifier of the first registered device used to receive the IoT API call, and
a calling time for the IoT API call;
comparing, by the network device, the packet information of the IoT API call, including the second five-tuple, with the logged TCP flow data for the current TCP session flows, including the first five-tuple;
sending, by the network device, a response to the first registered device to accept the IoT API call, when the comparing indicates a match of the second five-tuple from the packet information and one of the first five-tuples in the logged TCP flow data; and
sending, by the network device, a response to the first registered device to reject the IoT API call, when the comparing indicates no match of the second five-tuple from the packet information and any of the first five-tuples in the logged TCP flow data.

US Pat. No. 10,970,379

SYSTEM AND METHOD FOR ACCESSING SECURED DATA

1. A system for securing and accessing a mobile application, comprising:a client device;
one or more mobile applications stored within the client device; and
a graphical user interface (GUI) stored within the client device and configured to:
receive a request to launch a secured application;
launch a first window within a mobile device touchscreen, the first window including a plurality of images comprising a plurality of authenticating images;
within the first window, periodically shuffle a position of one or more of the plurality of images moving for a period of time until a user input is received, wherein each of the plurality of images is displayed with a frame having a variable design that periodically changes along with the periodically shuffling of the position of one or more of the plurality of images;
receive via the mobile device touchscreen the user input comprising an ordered selection of the plurality of authenticating images;
authenticate access to a secured application by matching the ordered selection to a programmable ordered selection of the plurality of authenticating images; and
launch a second window in response to the user input via the mobile device touchscreen, wherein the second window includes a launch screen of the secured application.

US Pat. No. 10,970,378

SECURE GENERATION AND VERIFICATION OF MACHINE-READABLE VISUAL CODES

CyberArk Software Ltd., ...

1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for securely generating verifiable machine-readable visual codes, the operations comprising:identifying a data element to be made available to a computing device capable of receiving and decoding machine-readable visual codes, wherein the data element is otherwise unavailable to the computing device;
generating a machine-readable visual code including the data element;
applying a security enhancement to the machine-readable visual code, wherein applying the security enhancement comprises selecting, from a plurality of security enhancement options, a security enhancement comprising at least one of:
signing the data element with a certificate,
encrypting the data element with a cryptographic key, or
inserting a token along with the data element into the generated machine-readable visual code;
making available the generated machine-readable visual code to a display medium, such that the generated machine-readable visual code can be decoded from the display medium to yield the data element and validated by at least one of:
confirming the validity of the certificate,
decrypting the data element with a decryption key corresponding to the cryptographic key, or
confirming the validity of the token;
receiving, from the computing device, a report indicating whether the validation of the data element was successful, wherein the computing device's ability to process the data element is conditioned on the validation of the data element being successful; and
performing, based on the report indicating an unsuccessful validation, a security action associated with the data element.

US Pat. No. 10,970,377

SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE

PayPal, Inc., San Jose, ...

1. A computing device, comprising:one or more processors, one or more computer-readable memories, with program instructions stored on the one or more computer-readable memories, the one or more processors configured to execute the program instructions to cause the computing device to perform operations comprising:
receiving, via a first application on the computing device, user credentials associated with a user of the computing device;
detecting, via the first application on the computing device, during a first time period, first device information associated with the computing device, wherein the first device information corresponds to one or more device characteristics associated with the computing device;
associating the first device information with the user credentials;
detecting, during a second time period, second device information associated with the computing device; and
authenticating the user with a second application on the computing device based on determining that the second device information corresponds to the first device information, wherein the authenticating the user with the second application does not require receiving the user credentials.

US Pat. No. 10,970,376

METHOD AND SYSTEM TO VALIDATE IDENTITY WITHOUT PUTTING PRIVACY AT RISK

NXT-ID, Inc., Shelton, C...

1. A method for authenticating a user, the method comprising:the user transferring a first user identifier disposed on a first media to a device;
the user transferring a second user identifier disposed on a second media to the device, the first media different from the second media and the first user identifier different from the second user identifier;
the first and second user identifiers not stored in the device prior to steps of transferring;
analyzing the first and second user identifiers at the device without sending the first and second user identifiers external to the device;
at the device, determining a correlation score responsive to the analyzing step, the correlation score indicative that the first and the second user identifiers identify a same user;
at the device determining a relationship between the correlation score and a predetermined correlation threshold and responsive thereto determining whether the first and second user identifiers represent the same user;
authenticating the user if the first and second user identifiers identify the same user; and
the step of authenticating further comprising authenticating the user if the first and second user identifiers identify the same user and if a step of transferring the second user identifier is executed within a predetermined time interval from a step of transferring the first user identifier.

US Pat. No. 10,970,375

PRIVACY PRESERVING BIOMETRIC SIGNATURE GENERATION

Unknot.id Inc., Winter G...

1. A computer-implemented method, the method comprising:detecting, at an electronic device, one or more biometric image signals of a user from an image sensing device;
detecting, at the electronic device, one or more raw acoustic signals associated with the user from an acoustic sensing devices, wherein the acoustic sensing device comprises:
a first audio transducer, including one or more speakers;
a second audio transducer, including one or more microphones; and
one or more motion sensors for sensing motion including a gyroscope,
accelerometer, IMU, or a combination thereof;
wherein the raw acoustic signals are detected by an output audio signal via the one or more speakers and receiving an input audio signal based on a reflection of output audio signal on the user via the one or more microphones;
identifying one or more biometric acoustic signals derived from the one or more raw acoustic signals;
generating a biometric signal input of the one or more biometric acoustic signals and one or more biometric image signals;
applying a machine learning model to conduct feature extraction of the biometric signal input having one or more biometric acoustic signals and one or more biometric image signals;
generating a biometric user signature of the user from the machine learning model;
performing a privacy preserving hashing function to the biometric user signature to generate a hashed biometric user signature;
determining whether the hashed biometric user signature satisfies a predetermined probabilistic threshold with an enrollment hashed signature of the user; and
authenticating an identity of the user upon detecting that the hashed biometric user signature satisfies the predetermined probabilistic threshold.

US Pat. No. 10,970,374

USER IDENTIFICATION AND AUTHENTICATION WITH NEUROMUSCULAR SIGNATURES

Facebook Technologies, LL...

1. A computerized system comprising:one or more neuromuscular sensors configured to obtain one or more neuromuscular signals from a user;
a memory storing an inference model and a neuromuscular signature associated with the user, wherein:
the inference model is trained to:
take, as input, the one or more neuromuscular signals and/or information based on the one or more neuromuscular signals; and
output information indicative of motor unit activation(s) of the user; and
the stored neuromuscular signature is associated with a first computer-estimated pattern of motor-unit activations derived, using the inference model, from first neuromuscular signals obtained from the user while the user performs a first set of gestures; and
at least one computer processor programmed to:
receive second neuromuscular signals obtained from the user while the user performs a second set of gestures;
use the inference model to identify a second computer-estimated pattern of motor-unit activations from the second neuromuscular signals;
determine whether the second computer-estimated pattern of motor-unit activations substantially matches the stored neuromuscular signature; and
authenticate the user in accordance with a determination that the second computer-estimated pattern of motor-unit activations substantially matches the stored neuromuscular signature.

US Pat. No. 10,970,373

MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME

LG ELECTRONICS INC., Seo...

1. A mobile terminal, comprising:a main body;
a touch screen disposed on a front side of the main body;
a first sensor disposed on the front side to sense an approach and a shape of an object to the main body in a locked state of the mobile terminal;
a second sensor to be driven in either one of a sleep mode and an active mode, so as to acquire a vein image of the object that has approached the first sensor in the active mode; and
a controller configured to perform a vein authentication using the vein image acquired through the second sensor, and control the touch screen to display security information allowed to access for a pre-registered user when the vein image corresponds to a vein image of the pre-registered user as a result of the vein authentication,
wherein the first sensor senses the approach of the object to the main body while the second sensor is driven in the sleep mode,
wherein the controller is further configured to:
control the first sensor to determine whether the shape of the object corresponds to a shape of a palm in response to the approach of the object to the main body;
control the first sensor to generate an active event signal for changing an operation mode of the second sensor from the sleep mode to the active mode, when the object approaching the main body corresponds to the palm; and
control the second sensor to maintain the sleep mode, when the shape of the object approaching the main body does not correspond to the shape of the palm.

US Pat. No. 10,970,372

REVOCABLE BIOMETRIC PRINT BASED IDENTIFICATION

MICROSOFT TECHNOLOGY LICE...

1. A computing system comprising:one or more processors; and
one or more computer-readable storage media having thereon computer-execution instructions that are structured such that, when executed by the one or more processors, the computing system is configured to enroll a user so as to enable revocable biometric authentication of the user by:
obtaining a biometric print of a user, the biometric print being a computer-readable representation of a biometric of the user;
obtaining user-specific data that is, or that corresponds to, user-specific data that is recognized by an authentication system as being associated with the user, and that is in addition to the biometric print;
generating a processed print by performing one-way processing of the biometric print using the obtained user-specific data, the one-way processing including chain hashing; and
causing the processed print, but not the biometric print, to be provided to the authentication system for later authentication of the user using the processed print and the user-specific data that is recognized by the authentication system as being associated with the user, invalidating the user-specific data at the authentication system resulting in the authentication system no longer being able to authenticate the user based on the processed print, authentication of the user using the processed print resulting in the authentication system rolling back the chain of the chain hashing.

US Pat. No. 10,970,371

CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A computer-implemented data processing method for monitoring a user as the user provides one or more system parameters entered by the user related to data processing consent, the method comprising:actively monitoring, by one or more processors, (i) a user behavior of the user as the user provides the one or more system parameters entered by the user related to the data processing consent; and (ii) the one or more system parameters entered by the user from the user, the one or more system parameters entered by the user comprising one or more submitted inputs and one or more unsubmitted inputs, wherein actively monitoring the user behavior and the one or more system parameters entered by the user comprises recording a first user input provided within a graphical user interface that occurs prior to submission of the one or more system parameters entered by the user by the user, and recording a second user input provided within the graphical user interface that occurs after the user inputs the first user input and before the user submits the one or more system parameters entered by the user, wherein the second user input comprises modifying the first user input to the second user input;
storing, in computer memory, by the one or more processors, an electronic record of the user behavior of the user and the one or more system parameters entered by the user from the user;
analyzing, by the one or more processors, at least one item of information selected from a group consisting of (i) the user behavior and (ii) the one or more system parameters entered by the user from the user to determine whether abnormal user behavior occurred in providing the one or more system parameters entered by the user, wherein determining whether the abnormal user behavior occurred in providing the one or more system parameters entered by the user comprises comparing the first user input with the second user input to determine one or more differences between the one or more submitted inputs and the one or more unsubmitted inputs, wherein the first user input is an unsubmitted input and the second user input is a submitted input; and
at least partially in response to determining that abnormal user behavior occurred in providing the one or more system parameters entered by the user:
determining a consent validity score for the provided data processing consent; and
automatically flagging, in memory, a record associated with the provided data processing consent.

US Pat. No. 10,970,370

METHOD AND SYSTEM FOR CREATING A STRONG AUTHENTICATION FOR A USER USING A PORTABLE ELECTRONIC DEVICE

ZealiD AB, Stockholm (SE...

1. A method for creating a strong authentication factor for a user using a portable electronic device held by the user, wherein the method comprises the steps of:a) by a central server system, requesting an external authentication service provider system that is not part of the central server system to authenticate the user using an authentication methodology hosted by the external authentication service provider system and reliant on the portable electronic device;
b) receiving, by the central server system and from the external authentication service provider system, a first set of information specific to the user, the first set of information specific to the user obtained and stored by the external authentication service provider system before step a) and comprising at least one of name, address, social security number, gender, place of birth, age, length, eye color, hair color, or weight;
c) by the central server system, receiving from the portable electronic device, a still or moving image of a valid physical piece of user identification that is captured by an integrated camera of the portable electronic device and transmitted to the central server system under the control of a software function installed on the portable electronic device, the software function forcing the user to use the integrated camera to perform the capture of the image and does not allow the user to transmit an already existing image to the central server system;
d) by the central server system, performing optical character recognition on the received image to obtain a second set of information specific to the user and derived from the valid physical piece of user identification;
e) by the central server system, comparing the first and second sets of information specific to the user; and
f) by the central server system, determining that the first and second sets of information specific to the user match, and, in response, creating the strong authentication factor, the strong authentication factor comprising an association of the portable electronic device and a piece of user-specific authentication information, and storing the strong authentication factor for a future transaction authentication requested by a user service provider.

US Pat. No. 10,970,369

RAPID FILE AUTHENTICATION ON AUTOMATION DEVICES

Rockwell Automation Techn...

1. An industrial device, comprising:memory that stores executable components; and
one or more processors, operatively coupled to the memory, that execute the executable components, the executable components comprising:
a program execution component configured to execute mobile code, wherein execution of the mobile code facilitates at least one of monitor or control of an industrial process by the industrial device;
a file authentication code (FAC) generation component configured to generate an FAC that is specific to the industrial device;
a client interface component configured to,
in response to determining that a request for a copy of the FAC is received from a client device via at least one of a local data port or a local memory port of the industrial device, send the copy of the FAC to the client device, and
in response to determining that the request is received via a networking port of the industrial device, deny the request for the copy of the FAC;
an HMAC generation component configured to, in response to receipt of first received mobile code via the networking port, generate a first hash-based message authentication code (HMAC) based on the FAC and content of the first received mobile code, and in response to receipt of second received mobile code via at least one of the local data port or the local memory port, bypass generation of the first HMAC; and
a file authentication component configured to prevent execution of the first received mobile code by the program execution component in response to at least one of a determination that a second HMAC bundled with the first received mobile code does not match the first HMAC or a determination that the first received mobile code does not include the second HMAC, and to permit execution of the second received mobile code by the program execution component in response to a determination that the second received mobile code is received via at least one of the local data port or the local memory port.

US Pat. No. 10,970,368

DISTRIBUTING DIGITAL-WORKS AND USAGE-RIGHTS TO USER-DEVICES

1. An apparatus-implemented method for distributing a digital-work, comprising:storing, in digital memory(s), a definition of usage-rights for said digital-work; wherein said definition of usage-rights authorizes said digital-work for use by an authorized-user, at a plurality of different user-devices; wherein said usage-rights for said digital-work are usable with a plurality of experience-providers;
determining, by electronic-circuitry and/or processor(s), that said authorized-user who is authorized to utilize said usage-rights is present at one of said user-devices;
sending, by electronic-circuitry and/or processor(s), a format of said digital-work onto a network to said user-device where said authorized-user is determined to be present;
utilizing, by electronic-circuitry and/or processor(s), said format at said user-device, with a software application of a first experience-provider; and
utilizing, by electronic-circuitry and/or processor(s), said format at said user-device with a software application of a second experience-provider.

US Pat. No. 10,970,367

STRONG AUTHENTICATION OF CLIENT SET-TOP BOXES

DISH Technologies L.L.C.,...

1. A system comprising:a client television receiver comprising:
a display interface to communicatively couple with a display device;
a host interface to communicatively couple with a host television receiver having a smart card paired therewith, the smart card configured to generate a re-encrypted content stream by decrypting an encrypted content stream from a television service provider using a secure local instance of a global network key and re-encrypting the decrypted content stream using a dynamically generated item key generated specifically for the client television receiver by the smart card, and the smart card configured to generate an encrypted dynamically generated item key by encrypting the dynamically generated item key using a first secure local instance of a local key received in accordance with receiving authorization from the television service provider to pair the smart card with the client television receiver;
a security processor having a second secure local instance of the local key, the security processor to recover the dynamically generated item key by decrypting the encrypted dynamically generated item key with the second secure local instance of the local key; and
a client processor to recover the decrypted content stream by obtaining the dynamically generated item key from the security processor and decrypting the re-encrypted content stream by applying the recovered dynamically generated item key, and to transmit the decrypted content stream to the display device via the display interface.

US Pat. No. 10,970,366

METHOD FOR SECURING A MULTIMEDIA CONTENT RECORD IN A STORAGE MEDIUM

SAGEMCOM BROADBAND SAS, ...

1. A method for securing a record of a multimedia content in a storage medium of a first electronic device, the method comprising an encryption operation consisting in:for each multimedia content requiring encryption, generating a random key within the first electronic device;
encrypting the multimedia content using the random key, to obtain encrypted multimedia content;
encrypting the random key, using a user key, to obtain a first encrypted random key, said user key being received by the first electronic device from a user of the first electronic device;
encrypting the first encrypted random key using a root key specific to the first electronic device, to obtain a second encrypted random key, said root key being different from the user key;
recording the second encrypted random key and the encrypted multimedia content in the storage medium,wherein the method comprises an operation to access the multimedia content by a second electronic device, consisting in:decrypting, within the first electronic device, the second encrypted random key using the root key specific to the first electronic device to obtain the first encrypted random key;
establishing a secure connection between the first electronic device and the second electronic device;
transmitting, from the first electronic device to the second electronic device, the first encrypted random key over the secure connection;
transmitting, from the first electronic device to the second electronic device, the encrypted multimedia content;
decrypting, within the second electronic device, the first random key using the user key to obtain the random key, and
decrypting, within the second electronic device, the encrypted multimedia content using the random key to obtain the unencrypted multimedia content.

US Pat. No. 10,970,365

SYSTEM AND METHOD FOR MEDICAL IMAGE INTERPRETATION

TeraRecon, Inc., Foster ...

1. A method for producing a diagnostic report from medical image data, the method comprising:generating medical findings based on the medical image data, the medical findings being produced by a findings engine within an artificial intelligence findings system, the findings engine interpreting the image data to generate the medical findings based on image interpretation algorithms that take into account stored preferences for a user, the stored user preferences indicating how the findings engine processes the image data to generate the medical findings;
presenting the medical findings to the user on a client viewer, the client viewer displaying images based on the medical image data, the images generated based on the image interpretation algorithms;
providing an adjustment engine that allows findings to be adjusted by user interactions, wherein user interaction results in adjusted findings appearing in one or both of the client viewer and the diagnostic report;
tracking the medical findings and adjustments made to the medical findings by the user to produce tracking information when the user adjusts the medical findings in at least one of the client viewer and the diagnostic report, when the user adjusts viewing preferences of the client viewer and when the user adjusts viewing preferences of the diagnostic report; and,
receiving the tracking information by a machine learning engine, the machine learning engine adjusting the stored preferences that indicate how the findings engine processes the image data to generate the medical findings;
including adjustments made to the medical findings by the user with derived information about practices of users of the findings engine.

US Pat. No. 10,970,364

DETERMINING A LOAD STATUS OF A PLATFORM USING A LIKELIHOOD RATIO TEST

BlackBerry Limited, Wate...

1. A method performed by at least one processor, comprising:receiving measurement data from at least one sensor that detects a signal reflected from a surface inside a platform;
applying a likelihood ratio test using the measurement data, wherein applying the likelihood ratio test comprises:
computing a plurality of values using a likelihood ratio test function applied on corresponding samples of the measurement data received from the at least one sensor, and
aggregating the plurality of values to produce an aggregate value; and
determining a load status of the platform based on the aggregate value produced by the likelihood ratio test.

US Pat. No. 10,970,363

MACHINE-LEARNING OPTIMIZATION OF DATA READING AND WRITING

Microsoft Technology Lice...

1. On a computing device, a method for reading previously stored data, the method comprising:irradiating a plurality of storage locations of an optical storage medium and concurrently imaging the optical storage medium to acquire a representation image of the previously stored data, the representation image comprising a layout of data locations corresponding to the plurality of storage locations of the optical storage medium;
decoding the representation image via a data decoder comprising a trained machine-learning function; and
obtaining from the data decoder, for each data location of the layout, a plurality of probability values, each probability value having a corresponding data value and representing a probability that the corresponding data value matches an actual data value of the previously stored data at a corresponding storage location of the optical storage medium, wherein each corresponding data value differs with respect to a birefringence value of the corresponding storage location of the optical storage medium.

US Pat. No. 10,970,362

LOW LATENCY MATRIX MULTIPLY UNIT

Google LLC, Mountain Vie...

1. A cell of a plurality of cells arranged in an array of a matrix multiply unit, the cell comprising:a weight matrix register configured to receive a weight input of a neural network from one or more weight storing registers, wherein the one or more weight storing registers are configured to receive a plurality of weight inputs of the neural network from a first direction of the array and a second direction of the array, the second direction being different from the first direction; and
a multiply unit that is coupled to the weight matrix register, wherein the multiply unit is configured to receive the weight input from the weight matrix register, wherein the multiply unit is configured to multiply the received weight input with a vector data input of the neural network to generate a multiplication result.

US Pat. No. 10,970,361

INFORMATION PROCESSING APPARATUS, ISING DEVICE, AND INFORMATION PROCESSING APPARATUS CONTROL METHOD

FUJITSU LIMITED, Kawasak...

1. An information processing apparatus comprising:an ising device; and
a control device,
wherein the ising device includes:
a random signal generation circuit that outputs, a plurality of times, a selection signal for randomly selecting a first neuron whose output value is allowed to be updated from n neurons, wherein n is a natural number of 3 or more,
d-1 arithmetic circuits that calculate, based on a plurality of weight values indicating strength of each coupling from 2-body coupling to d-body coupling of two to d neurons including the first neuron selected from the n neurons based on the selection signal and n-bit output values of the n neurons, d-1 energy values for the first neuron indicating energies generated by the respective 2-body to d-body coupling of the two to d neurons including the first neuron or change amounts of the d-1 energy values for the first neuron, wherein d is a natural number not less than 3 and not more than n,
an adder circuit that calculates a first sum by adding up the d-1 energy values or calculates a second sum by adding up the change amounts of the d-1 energy values and outputs the first sum or the second sum,
a comparator circuit that determines and outputs a first output value of the first neuron, based on a first comparison result obtained by comparing a first value based on a sum of the first sum and a noise value with a threshold or based on a second comparison result obtained by comparing a third value with the threshold, the third value being based on a sum of a second value that indicates a sum of the energies generated by the respective 2-body to d-body coupling and that is updated based on the second sum and the noise value,
an update circuit that outputs n-bit updated output values in which one bit has been updated based on the selection signal and the first output value, and
a holding circuit that holds the n-bit updated output values and outputs the n-bit updated output values as the n-bit output values used by the arithmetic circuits, and
wherein the control device controls a noise width of the noise value.

US Pat. No. 10,970,360

TECHNIQUE FOR GENERATING DIGITAL CERTIFICATES

Edinvent Inc., Mountain ...

1. A system comprising:a database configured to store identifying information of an institution administering a program, group information representing identifying information of the program, and a digital certificate template representing a layout of content to be displayed on digital certificates published on electronic documents for recipient participants who have completed the program;
a digital certificate generation module including hardware configured to publish a first digital certificate on a first electronic document based on the digital certificate template, the first digital certificate representing that a first recipient participant has completed the program, the first digital certificate including the identifying information of the program and the identifying information of the institution;
a digital certificate provisioning module including hardware configured to provide a first electronic message to the first recipient participant providing access to the first electronic document with the first digital certificate; and
a management module including hardware configured to provide a recommendation to the first recipient participant to contact a second participant based on the first digital certificate of the first recipient participant and additional information provided by the first recipient participant.

US Pat. No. 10,970,359

WEB PAGE DISTRIBUTING SERVER, WEB PAGE DISTRIBUTING METHOD, AND STORAGE MEDIUM

Rakuten, Inc., Tokyo (JP...

1. A web page distributing server that receives a transmission request for a web page from a terminal device, and transmits, to the terminal device, web page data to display the entire web page in response to the transmission request, the web page distributing server comprising:at least one non-transitory memory device operable to store program code; and
at least one processor operable to read said program code and operate as instructed by said program code, said program code comprising:
transmission code configured to cause the at least one processor to control the web page distributing server to transmit, to the terminal device, a program that causes the terminal device to achieve:
a completion determination function to determine whether or not a browser of the terminal device has completed reading of data necessary to display a specific part in the web page prior to reading data necessary to display all of the web page; and
an intermediate movement function to move, prior to reading the data necessary to display all of the web page, a position of a browser screen to a specific scroll position which is a position where the specific part is contained in the browser screen in response to a determination by the completion determination function that the reading has been completed.

US Pat. No. 10,970,358

CONTENT GENERATION

INTERNATIONAL BUSINESS MA...

1. A method of generating content, the method comprising:communicating first content to a consumer, the first content comprising at least one identifier;
determining a location of the communicated first content in a network;
retrieving second content from the location; and
establishing third content using the second content using a processor;
wherein the determining the location of the communicated first content comprises instructing a search engine to perform a search in a network for the at least one identifier and receiving, from the search engine, a search result indicative of a location of the communicated first content in the network, and wherein the establishing third content comprises performing an analysis of the second content, the analysis comprising at least one of a semantic analysis, a syntax analysis, a keyword analysis, a markup analysis, or a link analysis.

US Pat. No. 10,970,357

SYSTEM AND METHOD FOR VISUALIZATION OF TAG METADATA ASSOCIATED WITH A MEDIA EVENT

Avaya Inc., Basking Ridg...

1. A method comprising:receiving, by a processor via a communication interface, a tag request;
obtaining, from the tag request, tag metadata for a plurality of tags generated during a live media event, the plurality of tags being associated with the live media event and wherein the tag metadata is responsive to the tag request;
organizing, by the processor, the plurality of tags into a hierarchy of tags based on a sorting criteria of the tag metadata, the hierarchy of tags comprising a first level of tags, a second level of tags below the first level of tags, and a third level of tags below the second level of tags, wherein the first level of tags represents temporal segments of the live media event, wherein the second level of tags represents speakers associated with the live media event, wherein the third level of tags represents discussion topics associated with the live media event, and wherein at least one tag occurs in two or more locations in the hierarchy of tags;
computing, by the processor, tag significance data for the hierarchy of tags based, at least in part, on the tag metadata and wherein the tag significance data for a tag comprises at least one of a frequency of use of the tag, a duration of a media segment associated with the tag, and a similarity measure of the tag; and
generating, by the processor, a visual representation, for presentation by a user terminal coupled to the processor, of the hierarchy of tags, wherein a plurality of indicia for the hierarchy of tags are spatially arranged to form one of a treemap and a set diagram of the plurality of indicia, wherein sibling tags of the hierarchy of tags are represented by sibling nodes in the one of the treemap and set diagram and to visually depict a relative significance of each tag of the plurality of tags based on the tag significance data; and
wherein a first characteristic of indicia for sibling tag subsets in the hierarchy of tags is different from a second characteristic of indicia for a corresponding parent subset.

US Pat. No. 10,970,356

AUTONOMOUS AND DYNAMIC GENERATION OF A LIVING WEBSITE FOR CONTINUOUS USER ENGAGEMENT

Popmenu, LLC, Woodstock,...

1. A method for autonomously and dynamically generating a dynamic restaurant menu, the method comprising:providing a first instance of the dynamic restaurant menu as a living website rendered by computer code to a plurality of user devices in response to a first set of requests from the plurality of user devices, the dynamic restaurant menu comprising a plurality of menu items that correspond to a plurality of dishes served at a particular restaurant, and the first instance of the dynamic restaurant menu arranging the plurality of menu items according to a first presentation having a first placement for each of the plurality of menu items;
tracking a first plurality of engagements the plurality of user devices have with different individual menu items of the plurality of menu items in the first presentation in response to providing the first instance of the dynamic restaurant menu, wherein the first plurality of engagements comprise (i) user contributions submitted by the plurality of user devices to the different individual menu items, and (ii) one or more of tracked viewing times, numbers of selections, and recorded sales for the different individual menu items;
tracking a second plurality of engagements between users of the plurality of user devices and different dishes of the plurality of dishes served at the particular restaurant, wherein the second plurality of engagements comprise (i) reviews that mention the different dishes without engagement with corresponding menu items for the different dishes, and (ii) purchases of the different dishes recorded at point-of-sale devices at the particular restaurant;
determining first engagement values based on the tracking of the first plurality of engagements;
determining second engagement values based on the tracking of the second plurality of engagements;
automatically executing machine rewriting of the computer code to generate second computer code in response to a particular menu item having a greater first engagement value than other menu items of the plurality of menu items and a particular dish represented by the particular menu item having a greater second engagement value than other dishes represented by corresponding menu items, wherein said automatically executing comprises defining a different second presentation providing a dynamic second placement of the plurality of menu items in which at least the particular menu item of the plurality of menu items at a bottom of the first presentation is repositioned to a top of the second presentation;
reordering a set of engagements with the particular menu item or the particular dish represented by the particular menu item in the second presentation based on individual engagement values associated with each engagement of the set of engagements with the particular menu item or the particular dish, wherein the individual engagement values are based on varying relevance that each engagement has to the particular menu item or the particular dish; and
providing to one or more of the plurality of user devices, a second instance of the dynamic restaurant menu as the living website rendered by the second computer code, wherein the second instance of the dynamic restaurant menu comprises the particular menu item at the top of the second presentation as a result of said rewriting, and with the set of engagements presented with the particular menu item according to said reordering.

US Pat. No. 10,970,355

COOPERATIVE WEB BROWSING USING MULTIPLE DEVICES

Microsoft Technology Lice...

1. A system, comprising:one or more processors; and
a memory communicatively coupled to the one or more processors and storing computer-executable instructions that, when executed by the one or more processors, perform operations, comprising:
receiving, from a first device, a request to access a proxy server, the first device displaying content;
when it is determined the first device is authorized to access the proxy server, identifying a second device that is authorized to concurrently display at least a portion of the content provided on the first device;
comparing a capability of the first device with a capability of the second device;
based on the comparing, providing the at least the portion of the content to the second device to cause the first device and the second device to concurrently display the at least the portion of the content;
receiving, from the first device, a manipulation instruction that causes the content on the first device to be manipulated, the manipulation instruction being associated with a manipulation gesture received by the first device; and
in response to receiving the manipulation instruction, sending information associated with the manipulation instruction to the second device to cause the at least the portion of the content to be manipulated in a similar manner.

US Pat. No. 10,970,354

METHOD FOR PROCESSING CODE AND INCREASING WEBSITE AND CLIENT INTERACTION SPEED

SONGTRADR, INC., Santa M...

1. A method for increasing interaction speed between a website and a client, the method comprising the steps of:receiving and processing an HTML5 code from a web server, the HTML5 code requiring the action of requesting three script files from the web server;
storing on an HTML5 local storage database on the client an ECMAScript file and a parameter from the web server of the website, the parameter specifying a local version number of the ECMAScript file; and
subsequently comparing a web server version number of the ECMAScript file from the web server with the local version number of the parameter stored in the HTML5 local storage database;
wherein the parameter is loaded and stored on the HTML5 local storage database on the client via an asynchronous JavaScript and XML request and the parameter is stored as an inline script.

US Pat. No. 10,970,353

RANKING CONTENT USING CONTENT AND CONTENT AUTHORS

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:accessing, by one or more processors, a corpus of documents;
determining, by the one or more processors, content of a particular document in the corpus of documents;
determining, by the one or more processors, that a first group of documents in the corpus of documents are from a particular source;
determining, by the one or more processors, that a second group of documents in the corpus of documents includes content from the particular source, wherein the second group of documents does not include any documents from the first group;
comparing, by the one or more processors, the content of the particular document to the content from the particular source;
based on comparing the content of the particular document to the content from the particular source, determining, by the one or more processors, an amount of shared content between the content of the particular document and the content from the particular source;
based on the amount of shared content between the content of the particular document and the content, adjusting, by the one or more processors, a rank of the particular document in relation to other document in the corpus of documents; and
configuring, by the one or more processors, a web crawling process or search result ranking process for the particular document based on the adjusted rank.

US Pat. No. 10,970,352

SELECTING CONTENT FOR CO-LOCATED DEVICES

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:receiving, by one or more computing devices and from multiple user devices, one or more of global positioning system (GPS) information, an indication of near-field communication (NFC) between the multiple user devices, or WiFi data identifying a same service set identifier (SSID) of a WiFi network being used by the multiple user devices;
identifying, by the one or more computing devices, a set of co-located devices including a networked television and two or more wireless devices, including determining that the networked television and the two or more wireless devices are located at a same geographic location based on the received GPS information, indication of NFC between devices, or the WiFi data;
gathering, by the one or more computing devices, usage data for the networked television and both of the two or more wireless devices, including gathering first data related to usage of the networked television at the same geographic location and second data related to usage of the two or more wireless devices at the same geographic location;
aggregating, by the one or more computing devices, the first and second data to create aggregate data specifying device usage at the same geographic location;
identifying, by the one or more computing devices, first content to present on the networked television based on an evaluation of the aggregate data;
transmitting, by the one or more computing devices, the first content to the networked television;
selecting, by the one or more computing devices, second different content for display on both of the two or more wireless devices based on the two or more wireless devices being co-located devices with the networked television at the same geographic location, wherein the second different content is selected using information about the first content that was identified for presentation on the networked television and the aggregate data that was used to identify the first content presented on the networked television; and
transmitting, by the one or more computing devices, the second different content to both of the two or more wireless devices separately while the two or more wireless devices are located at the same geographic location as the networked television and while the first content is being presented on the networked television, wherein the one or more computing devices are located at a different geographic location than the co-located devices and the networked television.

US Pat. No. 10,970,351

METHOD AND PLUGGABLE SYSTEM FOR TREND-BASED ALLOCATION OF MEDIA ASSETS BETWEEN GLOBAL AND LOCAL STORAGE

FOX BROADCASTING COMPANY,...

1. A system for managing a retrieval and provision of globally stored media programs from a plurality of storage assets including cold storage elements and hot storage elements, wherein the media programs are retrievable by users requesting the media programs more rapidly from the hot storage elements than the cold storage elements, the system comprising:a demand trend analytics system, comprising:
a social media module for collecting social networking data;
a machine learning module for processing the collected social networking data to identify trending topics related to a topic category related to the globally stored media programs, and providing the processed collected social networking data;
a media metadata system, comprising:
a scraper for scraping the globally stored media programs to generate metadata of the globally stored media programs, and for providing the metadata of the globally stored media programs;
an indexing service, communicatively coupled to the demand trend analytics system and the media metadata system, the indexing service for accessing the processed collected social networking data and the metadata of the globally stored media programs, for generating an indexed database integrating the accessed processed collected social networking data and the metadata of the globally stored media programs, and for providing the indexed database;
a media portal, communicatively coupled to the indexing service, the media metadata system and the demand trend analytics system, for accessing the indexed database and searching the indexed database to identify globally stored media programs correlating to the identified trending topics and for controlling processing of the identified globally stored media programs for storage by at least one of the hot storage elements according to the identified trending topics;
wherein:
the demand trend analytics system relates at least one of the trending topics to a geographical area;
the media portal controls the processing of the identified globally stored media programs for storage by the at least one of the hot storage elements proximate the geographical area; and
the demand trend analytics system, the media metadata system, the indexing service, and the media portal are implemented by:
at least one processor; and
at least one memory storing processor instructions comprising processor instructions for performing the function associated with the respective demand trend analytics system, the media metadata system, the indexing service, and the media portal.