US Pat. No. 11,113,522

SEGMENT-BASED PATTERN MATCHING ALGORITHM

Datalogic IP Tech S.R.L.,...


11. An imaging system, comprising:an imaging camera;
a processing unit in communication with said imaging camera, and configured to:
generate a set of model descriptors representative of segment features of a first object captured in a first image and define a set of model descriptors by determining a location of a midpoint, an orientation angle relative to the x-axis, and a link between endpoints for each model segment;
generate a set of query descriptors from a second object captured in a second image;
select a first model segment to align with the query segments to determine if any of the query segments correspond with the first model segment based on respective model descriptors and query descriptors;
generate a hypothesis by computing a transformation to match the selected first model descriptor with a query descriptor;
validate the hypothesis by performing a model fitting algorithm when comparing other transformed model descriptors with other query descriptors; and
based on a consensus value from the model fitting algorithm, determine whether a pattern match exists between the first and second images.

US Pat. No. 11,113,521

INFORMATION PROCESSING APPARATUS

FUJIFILM Business Innovat...


1. An information processing apparatus comprising:a processor configured to:
receive a series of image information items formed of successive image information items of a plurality of recording media on each of which an image has been formed;
set, as a judgement area, image information of at least a portion of a region having a predetermined width and whose center is set to a boundary between the recording media, which are included in the series of image information items;
perform predetermined image processing on the judgement area and determines whether the image information items of the plurality of recording media are independent of each other in terms of content or are continuous with each other in terms of content; and
output the series of image information items by splitting the series of image information items when the processor determines that the image information items of the plurality of recording media are independent of each other and that outputs the series of image information items together when the processor determines that the image information items of the plurality of recording media are continuous with each other,
wherein the processor performs binarizing processing as the predetermined image processing on the judgement area and determines that the image information items of the plurality of recording media are continuous with each other in terms of content when a blank area that continuously extends from one end to another end of the boundary is not present in the judgement area as a result of the binarizing processing.

US Pat. No. 11,113,520

INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJIFILM Business Innovat...


1. An information processing apparatus comprising a processor configured to:read a document; and
specify, based on a result of reading of the document, a first character string representing a date and a second character string representing a period and determine an attribute of the document in accordance with the first character string and the second character string,
wherein the processor specifies a type of the document and specifies a first key and a second key that correspond to the specified type with reference to a memory that stores correspondences between the type and the first key and between the type and the second key,
the processor specifies, as the first character string, a character string that includes a numeral and whose positional relationship in the document with the specified first key satisfies a predetermined condition, and
the processor specifies, as the second character string, a character string whose positional relationship in the document with the specified second key satisfies a predetermined condition.

US Pat. No. 11,113,519

CHARACTER RECOGNITION APPARATUS, CHARACTER RECOGNITION PROGRAM, AND CHARACTER RECOGNITION METHOD

FUJITSU LIMITED, Kawasak...


1. A character recognition apparatus comprising:a memory, and
a processor coupled to the memory and configured to:
extract a region corresponding to a character string included in each of frames of a moving image to be recognized;
read a character string from the extracted region of each of the frames;
correct the character string read from each of the frames, based on appearance rule information that specifies an appearance rule of a character string corresponding to an order of the frames, such that an appearance order of the corrected character string conforms to the appearance rule; and
correct the character string based on a comparison between the character string read from each frame and an estimation result estimated by inputting the character string read from each frame to a learning model obtained by learning the appearance rule information.

US Pat. No. 11,113,518

APPARATUS AND METHODS FOR EXTRACTING DATA FROM LINELESS TABLES USING DELAUNAY TRIANGULATION AND EXCESS EDGE REMOVAL


1. A method, comprising:storing, in a memory, an image including a table;
identifying, via a processor operably coupled to the memory, a plurality of text-based characters in the table;
defining, via the processor, a plurality of bounding boxes based on the plurality of text-based characters, each bounding box from the plurality of bounding boxes uniquely associated with at least one text-based character from the plurality of text-based characters;
generating, via the processor, a graph including a plurality of nodes and a plurality of edges, based on the bounding boxes, using a graph construction algorithm;
identifying, via the processor, at least one edge from the plurality of edges for removal from the graph;
removing the at least one edge from the graph, via the processor, to produce a reduced graph; and
sending the reduced graph to a neural network to predict a plurality of row labels and a plurality of column labels for the table.

US Pat. No. 11,113,517

OBJECT DETECTION AND SEGMENTATION FOR INKING APPLICATIONS

Microsoft Technology Lice...


1. An ink parsing system comprising:a memory associated with a computing device, the memory including a writing detector component and a drawing detector component; and
at least one processor that executes an ink parsing engine that uses the writing detector component and the drawing detector component to:
receive ink strokes at an inking device input;
render the received ink strokes into an image;
detect one or more writing strokes in the image using the writing detector component and label the writing strokes;
remove one or more pixels corresponding to the labeled writing strokes from the image;
detect one or more drawing strokes in the image, after detecting the one or more writing strokes and removing the one or more pixels corresponding to the labeled writing strokes using the drawing detector component, and label the drawing strokes; and
output one or more writing objects and one or more drawing objects corresponding, respectively, to the labeled writing strokes and the labeled drawing strokes.

US Pat. No. 11,113,516

PEOPLE FLOW ESTIMATION SYSTEM AND PEOPLE FLOW ESTIMATION METHOD

CARRIER CORPORATION, Pal...


1. A human flow estimation system comprising:a sensor network comprising a plurality of sensors for collecting data and respectively arranged in each to-be-estimated region and between the to-be-estimated regions;
a model building module configured to build a horizontal human flow model and a vertical human flow model based on the plurality of sensors arranged in each to-be-estimated region and/or arranged between the to-be-estimated regions;
a human flow estimation module configured to estimate human flow data based on the horizontal human flow model and the vertical human flow model; and
an auxiliary information collection module configured to respectively collect first auxiliary information in each to-be-estimated region acquired by a non-sensor and second auxiliary information between the to-be-estimated regions acquired by a non-sensor, wherein the first auxiliary information and the second auxiliary information are used for reflecting changes in the human flow data.

US Pat. No. 11,113,515

INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD

SONY CORPORATION, Tokyo ...


1. An information processing device, comprising:a plurality of distance measuring sensors configured to detect distance measuring sensor data; and
a processor configured to:acquire the detected distance measuring sensor data;
calculate, based on the acquired distance measuring sensor data, a first distance between a first distance measuring sensor of the plurality of distance measuring sensors and a second distance measuring sensor of the plurality of distance measuring sensors;
obtain an action recognition result of a user based on a period of time in which the calculated first distance is constant,wherein the period of time is greater than a specific period of time;

calculate a score as a degree of similarity between the action recognition result and a specific action of the user; and
control output of the calculated score.


US Pat. No. 11,113,514

IDENTITY VERIFICATION METHODS, SYSTEMS, APPARATUSES, AND DEVICES

Advanced New Technologies...


1. An identity verification method, comprising:while a user is located in a waiting area that is adjacent to and not overlapping with a verification area, obtaining, using one or more computing devices and in real time, a video of the waiting area that does not include the verification area;
extracting, using the one or more computing devices, a plurality of images from the video, wherein the plurality of images comprises a first image of the user, wherein the plurality of images further comprises a first and second face image of the user, and wherein extracting the plurality of images comprises:extracting a plurality of frames from the video;
identifying, from the plurality of frames, the first and second face image of the user;
determining that a size of the second face image is greater than a predetermined size and the size of the first face image is smaller than the predetermined size; and
in response to determining that the size of the second face image is greater than the predetermined size and the size of the first face image is smaller than the predetermined size, extracting, from the plurality of frames, the first face image of the user;

storing, using the one or more computing devices, the plurality of images;
while the user is located inside the verification area, obtaining, using the one or more computing devices, identification information from the user;
identifying, using the one or more computing devices and based on the identification information, a second image that is associated with the identification information; and
performing, using the one or more computing devices, identity verification on the user using the plurality of images, including the first image, and the second image.

US Pat. No. 11,113,513

APPARATUS AND METHOD FOR TRAINING CLASSIFICATION MODEL AND APPARATUS FOR CLASSIFYING WITH CLASSIFICATION MODEL

FUJITSU LIMITED, Kawasak...


1. An apparatus for training a classification model, comprising:a local area obtainment unit configured to, with respect to each sample image in a training set, obtain a predetermined number of predetermined local areas of the sample image, wherein each predetermined local area is a part of a global area of the sample image;
a feature extraction unit configured to, with respect to each sample image, set corresponding numbers of feature extraction layers for the global area and each predetermined local area respectively, to extract a global feature of the global area and a local feature of each predetermined local area respectively, wherein the global area and the predetermined number of predetermined local areas share at least one layer of the corresponding numbers of feature extraction layers set with respect to the global area and each predetermined local area respectively, to combine the global feature and each local feature in the at least one shared layer; and
a loss determination unit configured to calculate, with a loss determination layer, a loss function of the sample image based on combined features of each sample image, and to train the classification model based on the loss function.

US Pat. No. 11,113,512

ATTENDANCE MONITORING METHOD, SYSTEM AND APPARATUS FOR TEACHER DURING CLASS

Hangzhou Hikvision System...


1. A method for monitoring attendance of a teacher in class, wherein, an image capture device is installed in a classroom, an image capture area of the image capture device comprises a platform area of the classroom, and any one of class hours corresponding to the classroom is divided into a plurality of time periods, the method comprises:acquiring an image of the platform area captured by the image capture device installed in the classroom during each time period of one class hour;
determining whether a face image is contained in the image; if a face image is contained in the image, acquiring at least one picture by the image capture device; and determining, for each picture, an attendance result of the teacher corresponding to the classroom during this time period based on a similarity between a to-be-recognized face image in this picture and an image in a face comparison database;
determining an attendance result of the teacher corresponding to this classroom during this class hour based on the attendance result of the teacher corresponding to this classroom during each of the time periods,
wherein, determining, for each picture, an attendance result of the teacher corresponding to the classroom during this time period based on a similarity between a to-be-recognized face image in this picture and an image in a face comparison database comprises:
acquiring, from the face comparison database, the image of the teacher who is course-scheduled in this classroom during this class hour;
determining, for each picture, whether the similarity between the to-be-recognized face image in the picture and the acquired image is greater than a predetermined similarity threshold; and if the similarity between the to-be-recognized face image in the picture and the acquired image is greater than the predetermined similarity threshold, increasing the number of recorded pictures by 1;
determining whether the number of the recorded pictures is greater than a set number threshold; if the number of the recorded pictures is greater than the set number threshold, determining that the attendance of the teacher corresponding to this classroom during this time period is normal; otherwise, determining that the attendance of the teacher corresponding to this classroom during this time period is abnormal,
or
determining, for each picture, an attendance result of the teacher corresponding to the classroom during this time period based on a similarity between a to-be-recognized face image in this picture and an image in a face comparison database comprises:
acquiring, from the face comparison database, the image of the teacher who is course-scheduled in this classroom during this class hour;
determining the similarity between the to-be-recognized face image in each picture and the acquired image, and determining a maximum value of the similarity;
determining whether the maximum value of the similarity is greater than a predetermined similarity threshold; and if the maximum value of the similarity is greater than the predetermined similarity threshold, determining that the attendance of the teacher corresponding to this classroom during this time period is normal; otherwise, determining that the attendance of the teacher corresponding to this classroom during this time period is abnormal,
wherein, the method further comprises:
decreasing the similarity threshold when it is determined that the attendance of the teacher corresponding to this classroom during this time period or this class hour is abnormal, and the attendance result of the teacher corresponding to this classroom during this time period or this class hour is corrected;
increasing the similarity threshold when it is determined that the attendance of the teacher corresponding to this classroom during this time period or this class hour is normal, and the attendance result of the teacher corresponding to this classroom during this time period or this class hour is not corrected, or the similarity between the to-be-recognized face image in each picture and the acquired image is greater than the similarity threshold, and
wherein, decreasing the similarity threshold comprises:
decreasing the similarity threshold based on a set first proportionality coefficient;
determining whether the decreased similarity threshold is lower than a preset minimum threshold; and if the decreased similarity threshold is lower than the preset minimum threshold, adjusting the similarity threshold to the minimum threshold; or
determining a minimum value of the similarity between the to-be-recognized face image in each of the pictures and the image of the teacher who is course-scheduled in this classroom during this class hour; determining whether the minimum value is lower than the preset minimum threshold, and if the minimum value is not lower than the preset minimum threshold, adjusting the similarity threshold to the minimum value;
increasing the similarity threshold, comprises:
increasing the similarity threshold based on a set second proportionality coefficient
determining whether the increased similarity threshold is greater than a preset maximum threshold; and if the increased similarity threshold is greater than the preset maximum threshold, adjusting the similarity threshold to the maximum threshold; or
determining the minimum value of the similarity between the to-be-recognized face image in each of the pictures and the image of the teacher who is course-scheduled in this classroom during this class hour; determining whether the minimum value is higher than the preset maximum threshold, and if the minimum value is higher than the preset maximum threshold, adjusting the similarity threshold to the minimum value.

US Pat. No. 11,113,511

MAKEUP EVALUATION SYSTEM AND OPERATING METHOD THEREOF


1. A mobile terminal comprising:a camera configured to photograph a facial image;
an input interface configured to receive an instruction to select a makeup theme corresponding to the facial image;
a wireless communication unit configured to transmit a makeup evaluation request signal corresponding to the facial image to a makeup server;

a control unit configured to receive a makeup score from the makeup server through the wireless communication unit; anda display unit configured to display the makeup score according to the makeup evaluation request signal,
wherein the makeup score is acquired from makeup score data, is calculated for each of at least one face region detected in the facial image, and is calculated differently according to a shape of the detected face region and the makeup theme, and
wherein the makeup server, when calculating a first score which is the makeup score of the facial image and acquiring a second score which is a score of a makeup specialist for the facial image, includes a score data generation unit correcting the first score when a difference between the first score and the second score is equal to or greater than a reference value.

US Pat. No. 11,113,510

VIRTUAL TEMPLATES FOR FACIAL RECOGNITION

Apple Inc., Cupertino, C...


1. A method, comprising:obtaining a plurality of images of a face of a user using a camera located on a device, the device comprising a computer processor and a memory, wherein the plurality of images is obtained for user authentication attempts on the device using a facial recognition authentication process;
for each obtained image:encoding the image to generate at least one feature vector for the image, wherein the at least one feature vector represents one or more facial features of the user in the image;
comparing the at least one feature vector to one or more reference templates stored in the memory of the device to obtain a matching score for the at least one feature vector;
storing the at least one feature vector as a temporary template in the memory of the device when the matching score for the at least one feature vector is above a threshold;

after a selected number of temporary templates are stored in the memory of the device, selecting one of the temporary templates based on an assessment of the temporary templates;
obtaining a plurality of additional images for additional user authentication attempts of the device using the facial recognition authentication process,
assessing, using the plurality of additional images, a performance of the reference templates in the facial recognition authentication process during the additional user authentication attempts of the device;
assessing, using the plurality of additional images, a performance of the selected temporary template in an additional facial recognition authentication process during the additional user authentication attempts of the device,
comparing the performance of the reference templates and the performance of the selected temporary template during the additional user authentication attempts of the device; and
adding the selected temporary template to the reference templates in response to the performance of the selected temporary template being higher than at least one of the reference templates during the additional user authentication attempts of the device.

US Pat. No. 11,113,509

IDENTITY DETERMINATION SYSTEM AND METHOD

Opple Lighting Co., Ltd.,...


1. An identity determination system, comprising:a computing node comprising an image acquisition device, and a server in communication connection with the computing node, wherein the computing node is configured to:
collect, by using the image acquisition device, an image according to a preset image collecting frequency;
perform face recognition on the collected image to recognize a facial feature in the image;
determine node identity information corresponding to the recognized facial feature according to the recognized facial feature, wherein a new node identity information is assigned in a case where there is no matched facial feature in the correspondence; and
upload the facial feature and the node identity information corresponding to the facial feature to the server; and
the server is configured to:
determine an identity of the facial feature based on the facial feature and the node identity information corresponding to the facial feature uploaded by the computing node.

US Pat. No. 11,113,508

PERSONAL PROTECTIVE EQUIPMENT FITTING DEVICE AND METHOD

THE GMN GROUP LLC, Rosev...


1. A method for performing automated respirator mask fit testing, the method comprising:obtaining, with one or more processors, at least one three-dimensional (3D) facial image of an individual;
converting, with the one or more processors, the at least one three-dimensional (3D) facial image to numerical data for analysis, the numerical data representative of facial features, facial dimensions, and/or facial locations on a face of the individual;
determining, with the one or more processors, based on the numerical data, a head form category for the individual;
determining, with the one or more processors, based on the head form category and the numerical data, a face volume for the individual; andgenerating, with the one or more processors, a mask fit pass indication responsive to the face volume satisfying face volume fit criteria for the head form category; or
generating, with the one or more processors, a mask fit fail indication responsive to the face volume not satisfying the face volume fit criteria for the head form category;

wherein the one or more processors are configured to determine the face volume by:generating a mesh that represents the face of the individual based on the at least one three-dimensional (3D) facial image and/or the numerical data;
identifying a reference location in the mesh corresponding to a specific location on the face of the individual;
cutting the mesh at one or more target distances from the reference location; and
determining the face volume for an area of the face defined by the cut mesh.


US Pat. No. 11,113,507

SYSTEM AND METHOD FOR FAST OBJECT DETECTION

Samsung Electronics Co., ...


1. A method comprising:identifying one or more salient parts of an object in an input image by classifying, at an electronic device, a set of input patches of the input image utilizing a multi-label classification network, wherein the multi-label classification network is trained to capture one or more global characteristics of the object and one or more local characteristics of the one or more salient parts of the object based on input patches cropped from a set of training images, the multi-label classification network classifies at least one input patch of the set of input patches as a first object classification representing a background, and the multi-label classification network classifies one or more other input patches of the set of input patches as one or more additional object classifications representing the one or more salient parts of the object;
determining an estimated full appearance of the object in the input image based on the one or more salient parts and a relationship between the one or more salient parts and the object as defined by one or more bounding box templates for the one or more salient parts; and
invoking an action on the electronic device based on the estimated full appearance of the object.

US Pat. No. 11,113,506

METHOD FOR PROVIDING AN EVALUATION MEANS FOR AT LEAST ONE OPTICAL APPLICATION SYSTEM OF A MICROSCOPE-BASED APPLICATION TECHNOLOGY


1. A method for providing an evaluation means for at least one optical application system of a microscope-based application technology,wherein the following steps are performed:performing an input detection of at least one sample according to the application technology in order to obtain at least one input record of the sample from the input detection,
performing a target detection of the sample according to a training technology to obtain at least one target record of the sample from the target detection, the training technology being different from the application technology at least in that additional information about the sample is provided, and
training of the evaluation means at least on the basis of the input recording and the target recording in order to obtain training information of the evaluation means,

wherein various sample positions are automatically detected during input detection or target detection,
wherein the training information for a continuous relative movement of the sample for determining the additional information is trained by the detection of the various sample positions,
wherein the input detection and the target detection are each performed as training system-side detection by an optical training system,
and wherein the application technology and training technology are configured as microscopy or flow cytometry.

US Pat. No. 11,113,505

PALM PRINT IMAGE MATCHING TECHNIQUES

MorphoTrak, LLC, Anaheim...


1. A method performed by one or more computers, the method comprising:obtaining, by the one or more computers, data identifying a first set of one or more regions of a search palm print image that include one or more distinctive search orientation blocks within a search orientation field generated for the search palm print image, each distinctive search orientation block having an orientation difference, relative to an adjacent search orientation block within the search orientation field, that satisfies a predetermined threshold;
obtaining, by the one or more computers, data identifying a second set of one or more regions of a reference palm print image that include one or more distinctive reference orientation blocks within a reference orientation field generated for a reference palm print image, each distinctive reference orientation block having an orientation difference, relative to an adjacent reference orientation block within the reference orientation field, that satisfies the predetermined threshold;
computing, by the one or more computers, a similarity score between the search palm print image and the reference palm print image based on a subset of top-ranked distinctive search orientation blocks, wherein computing the similarity score comprises:generating a down-sampled search orientation field that has a particular resolution lower than the original resolution of the search orientation field,
computing a respective similarity score for each of the one or more regions of the down-sampled search orientation field and a corresponding mated region of the reference orientation field, and
selecting the subset of top-ranked distinctive search orientation blocks based on the similarity scores of the one or more regions of the down-sampled search orientation field; and

providing, by the one or more computers, the similarity score for output.

US Pat. No. 11,113,504

WEARABLE ELECTRONIC DEVICE INCLUDING FINGERPRINT SENSOR

Samsung Electronics Co., ...


1. A wearable electronic device comprising:a front plate having a specific transparency;
a display under the front plate, wherein the display is substantially flat with respect to the front plate;
a housing, at least a portion of which surrounds an edge of the front plate;
a support member on which the front plate and the display are positioned;
a rear plate on which the support member is positioned and coupled to the housing;
a fingerprint sensor, wherein at least part of the fingerprint sensor is disposed on a side of the front plate and under an edge of the housing and configured to receive light related to a fingerprint of a finger in contact with a specific area of the front plate and to receive fingerprint information from the fingerprint; and
a reflector positioned on another side of the front plate at a location that is substantially symmetrical to the fingerprint sensor and such that the light reflected by the fingerprint in contact with the specific area of the front plate is directed toward the fingerprint sensor, wherein the reflector is inclined such that a bottom portion of the reflector is closer to the fingerprint sensor than a top part of the reflector, and
wherein the fingerprint sensor receives light reflected by the reflector directly from the light reflector.

US Pat. No. 11,113,503

FINGERPRINT SENSOR AND DISPLAY DEVICE

CONNECTEC JAPAN CORPORATI...


1. A fingerprint sensor in a display device, the fingerprint sensor comprising:a plurality of photosensors arranged in a matrix,wherein each of the photosensors comprises:
a semiconductor film configured to convert incident light into an electrical signal; and
a light shielding filmthat is disposed on a lower layer side than the semiconductor film, and
configured to block incidence of light to the semiconductor film from the lower layer side, and

wherein an outer contour shape in a top view of the light shielding film is rounded to shorten a circumferential length, which suppresses diffraction of light from the lower layer side.


US Pat. No. 11,113,502

IMAGE MODULE AND BIOMETRIC DEVICE USING THE SAME

INDUSTRIAL TECHNOLOGY RES...


1. An image module, comprising:a photosensitive element; and
a light-screening structure disposed on the photosensitive element, wherein the light-screening structure comprises:a light-transmitting layer;
a first light-shielding layer disposed in the light-transmitting layer and having a first light passage portion;
a second light-shielding layer disposed in the light-transmitting layer and between the first light-shielding layer and the photosensitive element and having a second light passage portion; and
a condensing structure disposed on the light-transmitting layer;

wherein the first light passage portion and the second light passage portion correspond to the photosensitive element, light passing through the condensing structure produces a concentrated beam, and an aperture of the first light passage portion and an aperture of the second light passage portion are respectively adjusted according to a width of the concentrated beam at the first light-shielding layer and a width of the concentrated beam at the second light-shielding layer;
wherein a focal point of the concentrated beam has a distance away from a top surface of the photosensitive element, a minimum width of the photosensitive element is WS, a focal length of the condensing structure is f, an outside diameter of the condensing structure is D, a maximum thickness of the condensing structure is LH, and the distance HS between the focal point of the concentrated beam and the top surface of the photosensitive element satisfies the following formula:





US Pat. No. 11,113,501

INFANT IDENTIFICATION SYSTEM

King Abdulaziz University...


1. An infant identification recordation system, comprising:a first portion having a transparent tube configured for an infant child hand, wherein the transparent tube is made of a transparent thermoplastic;
a second portion having a rectangular shape with a width, length and height greater than the diameter of the transparent tube, wherein the second portion is connected to a terminus of the transparent tube,
an array of camera sensors spaced apart on the transparent tube so that each camera sensor captures an overlapping part of an image captured by its neighboring camera sensor,
a plurality of light sources located between each of the camera sensors of the array of camera sensors;
wherein the array of camera sensors is arranged below a surface, along a periphery of a circumference and substantially along a length of the transparent tube up to a processor compartment and wherein the array of camera sensors is configured so that images of the fingertips and palm of the infant child can be captured both horizontally and vertically when holding the transparent tube; and
a processing circuitry configured to:
simultaneously receive multiple images from the array of camera sensors, and
process the multiple images including merging the multiple images to remove overlapping portions and recover a single image of the infant child's fingertips and palm.

US Pat. No. 11,113,500

FINGERPRINT IDENTIFICATION DEVICE, FINGERPRINT IDENTIFICATION MODULE AND CONTROL METHOD OF FINGERPRINT IDENTIFICATION DEVICE

ACER INCORPORATED, New T...


1. A fingerprint identification device, comprising:a substrate;
a fingerprint identification sensor, disposed on the substrate and configured to receive fingerprint information about a finger of a user;
a first driving assembly, disposed on the substrate; and
a control circuit, configured to transmit a control signal to the first driving assembly;
wherein when the finger is placed on the fingerprint identification device, the first driving assembly is configured to deform according to the control signal to drive the fingerprint identification sensor so that the fingerprint identification sensor is sequentially moved relative to the substrate in different directions.

US Pat. No. 11,113,499

FINGERPRINT RECOGNITION DEVICE AND A DRIVING METHOD THEREOF

SAMSUNG DISPLAY CO., LTD....


1. A fingerprint recognition device, comprising:a sensing panel including a plurality of sensing blocks, wherein each of the sensing blocks includes a plurality of sensors;
a scan driving unit configured to provide a scan signal to the sensors; and
a timing controller configured to provide an initiation signal to the scan driving unit, wherein
each of the sensors includes a photoelectric conversion element,
the scan driving unit includes scan drivers that correspond to rows of the sensing blocks, each of the scan drivers being driven only when the initiation sign is received thereby,
in a first mode, the timing controller provides the initiation signal to the scan drivers at the same time, and
in a second mode, the timing controller provides the initiation signal to a scan driver corresponding to a sensing block where a touch input is generated.

US Pat. No. 11,113,498

DETECTION DEVICE

Japan Display Inc., Toky...


1. A detection device comprising:a substrate;
a drive electrode provided on the substrate;
a detection electrode provided on the substrate and capacitively coupling with the drive electrode;
a first thin film transistor and a second thin film transistor, electrically connected to the drive electrode,
a first insulating film and a second insulating film both stacked on the substrate,
wherein
the first thin film transistor having a withstand voltage higher than a withstand voltage of the second thin film transistor,
the first thin film transistor comprises a first gate electrode and a first semiconductor layer,
the second thin film transistor comprises a second gate electrode and a second semiconductor layer, and
the first semiconductor layer and the second semiconductor layer are in a same layer and are located between the first insulating film and the second insulating film,
the first gate electrode opposes the first semiconductor layer via the first insulating film, and
the second gate electrode opposes the second semiconductor layer via the second insulating film, and
a distance from the first gate electrode to the first semiconductor layer is greater than a distance from the second gate electrode to the second semiconductor layer.

US Pat. No. 11,113,497

MULTIPHASE FINGERPRINT SENSOR LAYOUT AND CONSTRUCTION

Cypress Semiconductor Cor...


1. A fingerprint sensing device comprising:a first plurality of unit cells formed within a sensing area, the first plurality of unit cells disposed such that a capacitance of each unit cell is alterable by a conductive object;
a second plurality of unit cells formed outside the sensing area, the second plurality of unit cells disposed such that a capacitance of each of the second plurality of unit cells is isolated from the conductive object;
a capacitance sensor circuit coupled to at least one electrode of each of the first and second pluralities of unit cells, the capacitance sensor for converting a first signal received on the at least one electrode of the first plurality of unit cells to a digital value representative of a capacitance of a first unit cell of the first plurality of unit cells, wherein a second signal received on the at least one electrode of the second plurality of unit cells modifies the first signal.

US Pat. No. 11,113,496

FINGERPRINT RECOGNITION DRIVING CIRCUIT

Wuhan China Star Optoelec...


1. A fingerprint recognition driving circuit, comprising:a cascade signal line configured to provide a cascade signal;
a plurality of driving regions, wherein each of the driving regions is provided with a cascade unit and a plurality of first gate driver on array (GOA) driving units, the cascade units of the plurality of driving regions are cascaded in sequence, and the plurality of first GOA driving units in a same driving region are cascaded in sequence;
wherein each of the cascade units is connected to the cascade signal line to turn on the first GOA driving unit of a first stage in a corresponding driving region according to the cascade signal, and each of the first GOA driving units is configured to drive a plurality of fingerprint identification units of a corresponding row;
each of the cascade units is also configured to output an ON signal to the cascade unit of a next stage to turn on the cascade unit of the next stage;
the cascade unit comprises a second GOA driving unit and a switch unit;
the second GOA driving unit of each of the cascade units is connected to the second GOA driving unit of the cascade unit of the next stage to output an ON signal to the second GOA driving unit of the cascade unit of the next stage, so that the second GOA driving unit of the cascade unit of the next stage is turned on;
an input end of the switch unit is connected to the cascade signal line, and the second GOA driving unit of each of the cascade units is connected to a control end of the switch unit to output an ON signal to the switch unit to turn on the switch unit, so that the switch unit outputs a cascade signal to the first GOA driving unit of the first stage in the corresponding driving region; and
the first GOA driving unit and the second GOA driving unit have a same circuit structure, and the first GOA driving unit comprises a pull-up control module, a pull-up module, a pull-down module, and a pull-down maintenance module;
an input end of the pull-up control module is connected to a first level signal, an output end of the pull-up control module and a control end of the pull-up module are connected to a point Q, one end of the pull-up module is connected to a clock signal, and an output end of the pull-up module serves as an output port of the first GOA driving unit;
an input end of the pull-down module is connected to the output end of the pull-up module, an output end of the pull-down module is connected to a preset low-level line, a control end of the pull-down module is connected to an output end of the pull-down maintenance module, and a control end of the pull-down maintenance module receives the first level signal and a second level signal and outputs a pull-down maintenance signal to the control end of the pull-down module under control of the first level signal and the second level signal.

US Pat. No. 11,113,495

METHOD AND APPARATUS FOR FINGERPRINT IDENTIFICATION AND ELECTRONIC DEVICE

SHENZHEN GOODIX TECHNOLOG...


1. A method for fingerprint identification, wherein the method is applied to an electronic device comprising M fingerprint sensors, each fingerprint sensor corresponds to one sensing region, sensing regions of the M fingerprint sensors constitute a fingerprint detecting region of the electronic device, and the method comprises:acquiring pressing information of a finger in the fingerprint detecting region;
determining a target sub-region among N sub-regions according to the pressing information, wherein the N sub-regions cover the fingerprint detecting region, M and N are positive integers greater than 1, and N>M, the N sub-regions comprise a sub-region that at least partially overlaps with a sensing region of only one fingerprint sensor and a sub-region that at least partially overlaps with sensing regions of a plurality of fingerprint sensors; and
determining a data acquiring region according to the target sub-region, where fingerprint data in the data acquiring region is used for fingerprint identification.

US Pat. No. 11,113,494

BIOMETRIC KEY INCLUDING A TEXTURED CERAMIC COVER

APPLE INC., Cupertino, C...


15. A computing device comprising:a keyboard comprising:a biometric button comprising:a cap including:a sapphire cover defining:
?a front surface having a first texture configured to provide a first matte appearance;
?a side surface; and
?a curved edge between the front surface and the side surface, the curved edge having a second texture;
an anti-reflection coating disposed over the front surface of the sapphire cover and comprising a first plurality of inorganic dielectric layers; and
an optically dense coating disposed over a rear surface of the sapphire cover and comprising a second plurality of inorganic dielectric layers and a plurality of metal layers;

an electrically conductive support positioned below and coupled to the cap;
a biometric sensor positioned below the cap; and
a switch positioned below the biometric sensor; and

a set of keys, each key of the set of keys including a polymeric keycap having a second matte appearance.


US Pat. No. 11,113,493

BIOMETRIC AUTHENTICATION SYSTEM

Hitachi, Ltd., Tokyo (JP...


1. A biometric authentication system, which is configured to execute authentication by using registered biometric information, the biometric authentication system comprising:a light source unit configured to irradiate a living body with light;
an image pickup unit configured to photograph a vessel image with light radiated from the light source unit and transmitted through the living body;
a control unit configured to generate authentication biometric information from the vessel image photographed by the image pickup unit;
a category selection unit configured to select a category that corresponds to the authentication biometric information, based on supplementary information including information that has been obtained about a position and posture of the living body at timing of photographing the vessel image, wherein the supplementary information further includes contrast value information indicating the sharpness of the vessel image of the authentication biometric information; and
an authentication unit configured to execute authentication processing by comparing registered biometric information of the selected category and the authentication biometric information.

US Pat. No. 11,113,492

METHOD FOR DETERMINING IMAGING RATIO OF CURVED DISPLAY, STORAGE MEDIUM AND ELECTRONIC DEVICE

Shanghai Harvest Intellig...


1. A method for determining an imaging ratio of a curved panel, wherein a first surface of the curved panel is placed with a to-be-imaged object thereon, an image capturing device is disposed on a second surface opposite to the first surface in a thickness direction of the curved panel, the image capturing device is configured to capture an image of the to-be-imaged object being imaged by the curved panel, and the method comprises:obtaining a thickness of the curved panel and a curvature radius of the first surface of the curved panel; and
calculating the imaging ratio of the curved panel for the to-be-imaged object according to the obtained thickness and curvature radius.

US Pat. No. 11,113,491

METHODS FOR VIRTUAL MULTI-DIMENSIONAL QUICK RESPONSE CODES

The Boeing Company, Chic...


1. A method of using a Virtual Multi-Dimensional Quick Response (VMDQR) code, the method comprising:obtaining a process image of a process object at a code retrieval device;
identifying process image reference points on the process object in the process image using the code retrieval device;
transmitting the process image reference points from the code retrieval device to a code management device, for verification by the code management device;
based on the verification of the process image reference points by the code management device, receiving the VMDQR code from the code management device at the code retrieval device;
incorporating the VMDQR code into the process image based on the process image reference points to generate a process code-integrated image; and
displaying the process code-integrated image, comprising the VMDQR code, on the code retrieval device.

US Pat. No. 11,113,490

SYSTEM AND METHOD FOR EVALUATING SYMBOLS

Cognex Corporation, Nati...


1. A system for evaluating a symbol on an object, the system comprising:an imaging system that includes:an imaging device; and
a processor device in communication with the imaging device;

the imaging device being configured to acquire a first image of the object, including the symbol; andthe processor device being configured to evaluate the symbol, using the first image, based upon:selecting a saturation threshold, with a first set of pixels of the first image being within the selected saturation threshold and a second set of pixels of the first image being outside of the selected saturation threshold; and
analyzing pixels of the first image based on the selected saturation threshold, including mapping the second set of pixels of the first image to a maximum value, such that a brightness measurement of the first image that includes the first set of pixels and the mapped second set of pixels exhibits a predetermined target relationship with the selected saturation threshold.



US Pat. No. 11,113,489

CODING AND IDENTIFYING PLATE-TYPE WORKPIECES


1. A method of coding and identifying a plate-type workpiece, the method comprising:coding the workpiece by producing a code with a local modification in a material structure of a base material of the workpiece within a coding region;
reading out the code by performing an eddy-current measurement of a local distribution of at least one of an electrical conductivity or a permeability of the base material of the workpiece by an eddy-current sensor along a reading-out section in a reading region, wherein the reading region at least partially comprises the coding region, wherein an eddy current signal calibrated to a distance between the eddy-current sensor and a surface of the base material of the workpiece is determined for the reading out of the code, and wherein the determined calibrated eddy current signal in the reading region is independent from the distance and is associated with the read-out code;
storing the read-out code in a storage device;
repeating the reading out of the code by repeating the eddy-current measurement; and
identifying the workpiece by comparing the stored read-out code in the storage device and the repeated read-out code.

US Pat. No. 11,113,488

GLASS PANEL MANUFACTURING SYSTEMS AND METHODS

Luoyang Landglass Technol...


1. A mobile scanning device for retrieving stress information of one of a plurality of reinforced glass panels, comprising:an image capturing device to capture an image of an identification code installed on a surface of the one of the plurality of reinforced glass panels, wherein the identification code is unique to each of the plurality of reinforced glass panels;
an image processor, coupled to the image capturing device, to process the captured image and recognize the identification code;
a central processor, coupled to the image processor, to instruct the mobile scanning device to retrieve stress information corresponding to the identification code from a glass panel production information database; and
a display device, coupled to the central processor, to display the retrieved stress information;
wherein the stress information was obtained via at least one stress sensor testing a stress at different testing locations on a surface of each of a plurality of glass panels being processed on a production line for manufacturing the plurality of reinforced glass panels;
wherein the central processor is further configured to:retrieve, from a product standard database, a product standard including a required stress for a reinforced glass panel in a particular geographical area based on geographical location information of the mobile scanning device;
compare the retrieved product standard with the retrieved stress information corresponding to the identification code to determine whether the one of the plurality of reinforced glass panels complies with the product standard; and
instruct the display device to display a result of the comparison.


US Pat. No. 11,113,487

SPECTACLE LENS PROVIDED WITH A PERMANENT MARKING

Essilor International, C...


1. A spectacle lens provided with a permanent marking, said lens comprising:a substrate; and
an anti-reflective interferential or mirror interferential coating covering said substrate on the side of a front face of the spectacle lens, said anti-reflective interferential or mirror interferential coating forming a two-dimensional barcode pattern, said marking being formed by a plurality of punctual gaps on a part of a thickness of said anti-reflective interferential or mirror interferential coating, said front face exhibiting outside of said punctual gaps a coefficient of reflection of light having a predetermined nominal value and in each said punctual gap a coefficient of reflection of light having a predetermined particular value different from said nominal value,
wherein the two-dimensional barcode pattern is one of a Quick Response (QR) code, a DataMatrix code, an Aztek code, a MaxiCode, and a High Capacity Color Barcode, and
wherein said two-dimensional barcode pattern comprises a plurality of modules juxtaposed in matrix fashion, said plurality of modules comprising, in order to encode an item of information as claimed in a binary language, modules of a first type and modules of a second type, each of the modules of the first type being formed by a plurality of the punctual gaps, each of the modules of the second type being situated outside of said punctual gap.

US Pat. No. 11,113,486

LIGHT EMITTING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJIFILM Business Innovat...


1. A light emitting apparatus comprising:a light source;
a processor configured toperform control to cause the light source to blink in a blink pattern corresponding to output information including identification information unique to the light emitting apparatus and stored in a memory of the light emitting apparatus, and
when causing the light source to blink by repeating the blink pattern, change a time interval between a first occurrence of the blink pattern and a second occurrence of the blink pattern subsequent to the first occurrence of the blink pattern; and

an acceleration sensor, wherein
the processor is further configured to, when causing the light source to blink by repeating the blink pattern, increase and change the time interval between the first occurrence of the blink pattern and the second occurrence of the blink pattern when the acceleration sensor detects that the light emitting apparatus is stationary, and reduce and make the time interval between the blink patterns constant when the acceleration sensor detects that the light emitting apparatus is moving.

US Pat. No. 11,113,485

METHOD TO CORRELATE AN OBJECT WITH A LOCALIZED TAG

Motorola Mobility LLC, C...


1. A method comprising:receiving, by a user device, at least one response signal from a tag antenna corresponding to a respective tag of one or more tags that exist in a space located within a detectable distance of the user device, each tag antenna producing a corresponding response signal in response to a trigger signal, the corresponding response signal having a unique tag identification (ID) of a respective tag modulated thereon;
in response to receiving the corresponding response signal from the respective tag within the space, identifying, by a processor, a directional location of the respective tag relative to the user device, wherein the identifying comprises: determining, for the respective RFID tag and object, (i) a general horizontal position within the space along a horizontal axis relative to the user device; and (ii) a general vertical position within the space along a vertical axis relative to the user device;
activating a camera device to focus on one or more focal points in an area in the directional location of the respective tag;
estimating, based on a signal strength and the directional location of the corresponding response signal, a distance of the respective tag relative to the user device;
capturing, by the camera device, an image of an object located within the area in the directional location of the respective tag;
in response to capturing the image, correlating the (i) directional location, (ii) distance of the respective tag, and (iii) image of the object to generate corresponding position information that provides a more precise point location of the object that corresponds to the respective tag within the space; and
outputting the corresponding position information of the object that corresponds to the respective tag.

US Pat. No. 11,113,484

CONSUMABLE PRODUCT AND METHOD OF PROVIDING THE SAME

NXP B.V., Eindhoven (NL)...


1. A consumable product comprising:one or more consumable components; and
a radio frequency communication tag;
wherein said radio frequency communication tag comprises data indicative of a type of consumable component to which said consumable components belong, wherein the radio frequency communication tag further comprises data indicative of a suitability of the consumable product, wherein the radio frequency communication tag further comprises operating instructions for a machine configured to operate using the consumable product, and wherein in response to a consumable component of the one or more consumable components being determined to be unsuitable for a machine configured to operate using the one or more consumable components, the consumable product is refused and the machine does not operate with the consumable product.

US Pat. No. 11,113,483

RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEM

CYMMETRIK ENTERPRISE CO.,...


1. A radio frequency identification (RFID) system comprising:a measuring assembly configured to measure a physical quantity of an object to output a first data associated with the object;
a loop antenna configured to be attached to the object, wherein the loop antenna has an IC chip storing a second data associated with the object;
a radiation pattern disposed at the measuring assembly; and
a transreceiver in signal-transmittable connection to the measuring assembly, with the transreceiver configured to perform at least one of sending the first data and receiving the second data when the loop antenna and the radiation pattern are electromagnetically coupled to each other,
wherein the IC chip stores the first data when the transreceiver sends the first data, and the measuring assembly receives the second data and outputs a message having the first data and the second data when the transreceiver receives the second data.

US Pat. No. 11,113,482

IMPLEMENTATION OF A PROXIMITY-BASED SYSTEM FOR OBJECT TRACKING AND AUTOMATIC APPLICATION INITIALIZATION

Proxense, LLC, Bend, OR ...


1. An apparatus comprising:a port enabling physical connection with a device;
a shell, wherein the shell comprises a first piece, a second piece and a component within the shell;
a first horseshoe gasket located between the first piece of the shell and the component on a first side of the component; and
a second horseshoe gasket located between the second piece of the shell and the component on a second side of the component,
wherein the first piece and the second piece include a respective ridge structure aligning with the first horseshoe gasket and the second horseshoe gasket to compress the first horseshoe gasket and the second horseshoe gasket into the component when the first piece and the second piece are sealed, thereby surrounding the port and sealing the component within the shell from the port and external environment.

US Pat. No. 11,113,481

ADAPTING AUTOMATED ASSISTANTS FOR USE WITH MULTIPLE LANGUAGES

GOOGLE LLC, Mountain Vie...


1. A method implemented using one or more processers, comprising:capturing a spoken utterance at a microphone to generate audio data, wherein the spoken utterance is spoken in a first language;
performing speech recognition processing on the audio data to generate speech-recognition output;
applying the speech-recognition output as input across a trained encoder-decoder machine translation model to generate output, wherein the output comprises a canonical second language translation of the speech-recognition output from the first language;
determining an intent conveyed by the spoken utterance based on the canonical second language translation; and
performing one or more responsive actions based on the intent;
wherein the encoder-decoder machine translation model was trained previously to map a plurality of syntactically-distinct but semantically-similar phrases in the first language to the same canonical second language translation, wherein the encoder-decoder machine translation model was trained previously by:processing the plurality of phrases in the first language based on the encoder-decoder machine translation model to generate a plurality of syntactically-distinct but semantically-similar second language translations; and
comparing the plurality of syntactically-distinct but semantically-similar second language translations to the canonical second language translation to generate corresponding errors, whereby the encoder-decoder machine translation model was trained previously based on the corresponding errors.


US Pat. No. 11,113,480

NEURAL MACHINE TRANSLATION SYSTEMS

Google LLC, Mountain Vie...


1. A neural machine translation system implemented by one or more computers, the neural machine translation system configured to receive an input sequence of input tokens representing a first sequence of words in a first natural language and to generate an output sequence of output tokens representing a second sequence of words that is a translation of the first sequence into a second natural language, the neural machine translation system comprising:an encoder neural network comprising:an input forward long short-term memory (LSTM) layer configured to process each input token in the input sequence in a forward order to generate a respective forward representation of each input token,
an input backward LSTM layer configured to process each input token in the input sequence in a backward order to generate a respective backward representation of each input token,
a combining layer configured to, for each input token in the input sequence, combine the forward representation of the input token and the backward representation of the input token to generate a combined representation of the input token, and
a plurality of hidden LSTM layers configured to process each combined representation generated by the combining layer in the forward order to generate a respective encoded representation of each of the input tokens in the input sequence, wherein the plurality of hidden LSTM layers are unidirectional and arranged in a stack one after the other; and

a decoder subsystem configured to receive the respective encoded representation of each of the input tokens in the input sequence and to process the encoded representations to generate the output sequence.

US Pat. No. 11,113,479

UTILIZING A GATED SELF-ATTENTION MEMORY NETWORK MODEL FOR PREDICTING A CANDIDATE ANSWER MATCH TO A QUERY

Adobe Inc., San Jose, CA...


10. A system comprising:one or more memory devices comprising:a gated-self attention mechanism (GSAM);
a memory network;
a query; and
a plurality of candidate answers to the query; and

at least one server configured to cause the system to:generate a context vector for a plurality of context vector states based on contextual information associated with one or more utterances;
generate input vectors based on combinations of respective candidate answers of the plurality of candidate answers and the query;
for each combination of a respective candidate answer and the query:generate a next cell state of the memory network based on the GSAM, a current context vector state, and a current cell state of the memory network;
generate a next context vector state based on a current gated self-attention output vector state of the GSAM, the current context vector state, and the next cell state of the memory network; and
determine, based on the next context vector state, a matching probability between the query and the respective candidate answer; and


determine, based on the matching probabilities for the combinations of the respective candidate answers and the query, an answer to the query from the plurality of candidate answers.

US Pat. No. 11,113,478

RESPONSIVE DOCUMENT GENERATION

Patomatic LLC, Excelsior...


1. A method comprising:parsing a correspondence document to identify document sections, the parsing including:identifying a plurality of headers in the correspondence document using a first set of regular expressions;
identifying a document section based on a first header of the plurality of headers;
associating the document section with a portion of the correspondence document between the first header and a second header of the plurality of headers;
determining a document section type based on the first header;
selecting a regular expression based on the determined document section type; and
extracting fields from the portion of the correspondence document associated with the document section using the selected regular expression;

generating response options based on an identified document section of the correspondence document;
generating a user interface with a user-actuatable selection input associated with at least some of the response options;
receiving, via the user-actuatable selection input of the user interface, a user input to select a response option; and
generating a response document based on the received user input.

US Pat. No. 11,113,477

VISUALIZING COMMENT SENTIMENT

INTUIT, INC., Mountain V...


1. A method for displaying sentiment of a user text comment, comprising:receiving a text comment;
providing a vector sequence representing the text comment to a sentiment model configured to output a sequence of sentiment scores for the vector sequence;
receiving, from the sentiment model, the sequence of sentiment scores for the vector sequence;
determining cleaned text front the text comment;
providing the cleaned text to a topic module configured to determine relevance scores between the cleaned text and each topic of a plurality of topics and output the relevance scores;
receiving, from the topic module, the relevance scores for the cleaned text;
determining, based on the sequence of sentiment scores for the vector sequence and the relevance scores for the cleaned text, final sentiment scores related to the text comment; and
generating, based on the final sentiment scores, a sentiment visualization for the text comment.

US Pat. No. 11,113,476

MACHINE LEARNING BASED INTENT RESOLUTION FOR A DIGITAL ASSISTANT

SAP SE, Walldorf (DE)


1. A computer implemented method comprising:receiving, by an intent resolution system, an utterance that comprises two words;
determining, by the intent resolution system, a first vector, based on the received utterance, for a first word of the two words using a term frequency-inverse document frequency (TF-IDF);
determining, by the intent resolution system, a second vector, based on the received utterance, for the first word of the two words using a Global Vectors (GloVe) model;
generating, by the intent resolution system, a third vector for the first word of the two words by concatenating the first vector and the second vector;
determining, by the intent resolution system, a fourth vector for a second word of the two words using the TF-IDF;
determining, by the intent resolution system, a fifth vector for the second word of the two words using the GloVe model;
generating, by the intent resolution system, a sixth vector for the second word of the two words by combining the fourth vector and the fifth vector;
generating, by the intent resolution system, an average vector by averaging the third vector and the sixth vector; and
using the average vector to classify, using a machine learning model, the utterance to determine an intent associated with the utterance.

US Pat. No. 11,113,475

CHATBOT GENERATOR PLATFORM

Accenture Global Solution...


1. A method, comprising:receiving, by a device, a request to generate a chatbot,wherein the request identifies a type of the chatbot;

determining, by the device, a chatbot template for the chatbot based on the type of the chatbot;
obtaining, by the device, chatbot information according to the chatbot template;
generating, by the device and based on the chatbot template and the chatbot information, a chatbot corpus for the chatbot;
generating, by the device, a set of question and answer (QnA) pairs;
configuring, by the device and based on the chatbot corpus, a language analysis model for the chatbot,wherein the language analysis model is configured to select one or more QnA pairs of the set of QnA pairs during an interaction between the chatbot and a user;

building, by the device, the chatbot according to the set of QnA pairs and the language analysis model; and
deploying, by the device, the chatbot to a chatbot host platform to enable operation of the chatbot,wherein, during the operation of the chatbot, the language analysis model is trained based on the interaction with the user.


US Pat. No. 11,113,474

ADDRESS ANALYSIS USING MORPHEMES

Advanced New Technologies...


1. A computer-implemented method comprising:receiving a first address and a second address representing one or more physical locations involved in an online transaction, the first address including n morphemes and the second address including m morphemes, wherein a morpheme is a smallest semantic unit in an address, and wherein n and m are both natural numbers;
determining first correlation values between the n morphemes and the m morphemes;
for each of the n morphemes as a first morpheme:selecting a second morpheme of the m morphemes that best matches the first morpheme based on the first correlation values and a preset algorithm; and
recording a target correlation value between the first morpheme and the second morpheme as part of a set of n target correlation values;

obtaining a second correlation value between the first address and the second address based on the n target correlation values, wherein the second correlation value is a summation of a plurality of values of the n target correlation values; and
analyzing a correlation between the first address and the second address based on the second correlation value.

US Pat. No. 11,113,473

INTERPRETING EXPRESSIONS HAVING POTENTIALLY AMBIGUOUS MEANINGS IN DIFFERENT DOMAINS

SoundHound Inc., Santa C...


1. A method comprising: providing a configurable platform for natural language understanding for various types of clients:receiving, at the configurable platform and from developer input into a user interface, instructions to apply, for a client type identifier, a first numerical weight value to a first domain and a second numerical weight value to a second domain;
receiving an expression package containing a natural language expression and the client type identifier;
interpreting the natural language expression according to the first domain to produce a first interpretation and a first score for the first domain;
interpreting the natural language expression according to the second domain to produce a second interpretation and a first score for the second domain;
using the client type identifier to identify the first weight and to identify the second weight;
applying the first numerical weight value to the first score for the first domain to compute a second score for the first domain;
applying the second numerical weight value to the first score for the second domain to compute a second score for the second domain;
selecting the first interpretation as the appropriate interpretation of the natural language expression in view of the second score for the first domain and the second score for the second domain; and
computing a response to the natural language expression based on selection of the first interpretation.

US Pat. No. 11,113,472

CONTENT CURATION FOR COURSE GENERATION


1. A method comprising:identifying, by a processing system including at least one processor, a plurality of content segments of a plurality of content sources of a subject having greater than a threshold similarity, wherein the plurality of content segments comprises a plurality of video segments, wherein the plurality of content segments is determined to have greater than the threshold similarity based upon a plurality of matching features, wherein the plurality of matching features includes at least one matching topic of the plurality of content segments, wherein for the plurality of video segments, the at least one matching topic is determined in each of the plurality of video segments via at least one support vector machine comprising at least one topic identification classifier that is trained to recognize at least one topic in accordance with audiovisual features of the each of the plurality of video segments;
determining, by the processing system, a first topic is part of a core topic of the subject based upon a number of instances of the first topic within the plurality of the content segments;
receiving, by the processing system, a request from a user device for a course for the subject;
assembling, by the processing system, the course for the subject, the course including at least one of the plurality of the content segments having the first topic that is determined to be part of the core topic; and
presenting, by the processing system, the course to the user device.

US Pat. No. 11,113,471

AUTOMATIC DETECTION OF CLAIMS WITH RESPECT TO A TOPIC

International Business Ma...


1. A method comprising using at least one hardware processor for:receiving a topic under consideration (TUC) and content relevant to the TUC;
detecting one or more claims relevant to the TUC in the content, based on detection of boundaries of the claims in the content, wherein the detection of boundaries comprises using a machine learning classifier trained on label claims in their surrounding sentences, wherein each of the labeled claims is a concise statement that directly supports or contests a training TUC; and
outputting a list of said detected one or more claims.

US Pat. No. 11,113,470

PRESERVING AND PROCESSING AMBIGUITY IN NATURAL LANGUAGE

ACCENTURE GLOBAL SOLUTION...


1. A system comprising:a processor;
a data reader coupled to the processor to:receive an input indicative of a data stream; and
convert the data stream into one or more data blocks, each data block representing a logical division of content from the data stream;

a tokenizer coupled to the processor to split the one or more data blocks into a plurality of tokens using tokenization techniques;
an interpretation graph creator coupled to the processor to:create an interpretation graph providing alternative interpretations of at least one of each token and a sequence of tokens of the one or more data blocks, an alternative interpretation being represented as a path through the interpretation graph, wherein the interpretation graph includes lexical items connected by vertices to define the path, a vertex representing a junction point between two lexical items; and
augment the interpretation graph by performing at least one of:
determining a confidence score for each of the lexical items based on at least one of a tag associated with a lexical item, external data, and a predetermined rule; and
modifying the confidence score associated with each of the lexical items; and

a selector coupled to the processor to select the alternative interpretation from the interpretation graph, based on an overall confidence score for the path corresponding to each of the alternative interpretations in the interpretation graph.

US Pat. No. 11,113,469

NATURAL LANGUAGE PROCESSING MATRICES

International Business Ma...


1. A computer-implemented method for organizing tokens of a phrase of a corpus of phrases, the method comprising:receiving a phrase that includes a plurality of tokens in a natural language format, wherein the plurality of tokens includes words of the phrase;
determining a plurality of levels relating to dependencies between tokens of the plurality of tokens within the phrase; and
generating, for the phrase, a matrix structure that utilizes a plurality of rows and a plurality of columns to store data of the phrase, wherein the plurality of rows and the plurality of columns each indicate one of an order of tokens of the plurality of tokens or levels of the plurality of levels.

US Pat. No. 11,113,468

SYSTEMS AND METHODS FOR WORD SEGMENTATION BASED ON A COMPETING NEURAL CHARACTER LANGUAGE MODEL

Coupang Corp., Seoul (KR...


1. A computer-implemented system for word segmentation, the system comprising:a memory storing instructions; and
at least one processor configured to execute the instructions to:receive a plurality of characters for segmentation;
convert, using an embedding model, a character of the plurality of characters into an embedding vector;
feed the embedding vector into a forward language model to retrieve a first output vector;
feed the embedding vector into a reverse language model to retrieve a second output vector;
compare the embedding vector to the first output vector and the second output vector; and
segment the plurality of characters based on the comparison,
wherein comparing the embedding vector to the first output vector and the second output vector comprises determining a reverse exponent of a Euclidean distance between the embedding vector and each of the first output vector and the second output vector.


US Pat. No. 11,113,467

PROCESSING OF 3D PRINTING FILES

Hewlett-Packard Developme...


1. A method for processing a 3D printing file, comprising:receiving a 3D printing file comprising a header and a plurality of compressed files;
reading a content of the header of the 3D printing file;
based on the header content, identifying among the plurality of compressed files, a relation file that points to a main 3D model file representing a plurality of objects to be created via a 3D manufacturing process;
based on the relation file, identifying the main 3D model file among the plurality of compressed files;
creating, by uncompressing the main 3D model file, a data stream; and
analyzing, with a parser, the data stream, thereby directly processing the main 3D model file when being uncompressed.

US Pat. No. 11,113,466

GENERATING SENTIMENT ANALYSIS OF CONTENT

INTUIT, INC., Mountain V...


1. A method for providing a graphical user interface to manage a sentiment analysis of content, comprising:receiving a request for a sentiment analysis of content, wherein the request includes a content ID corresponding to the content;
retrieving a set of comments corresponding to the content ID;
providing the set of comments to a natural language processing service;
receiving, from the natural language processing service, a set of sentiment indications, wherein each respective sentiment indication of the set of sentiment indications is associated with a respective comment of the set of comments;
generating the sentiment analysis based on the set of sentiment indications;
displaying the sentiment analysis in a window in the graphical user interface;
receiving, in response to displaying the sentiment analysis, a request to provide contact information regarding a viewer associated with a comment in the set of comments;
determining whether the viewer associated with the comment agreed to provide contact information;
displaying the contact information in response to a determination that the viewer agreed to provide the contact information; and
displaying a message that the contact information is unavailable in response to a determination that the viewer did not agree to provide the contact information.

US Pat. No. 11,113,465

PERSONALIZED AUTO-TRIAGE OF COMMUNICATIONS

International Business Ma...


1. A method comprising:extracting natural language content from a piece of communication for a user;
generating a representation of the piece of communication based on the natural language content extracted;
generating, utilizing a global deep learning model, a first predicted degree of priority of the piece of communication from a perspective of multiple users based on the representation;
generating, utilizing a personalized learning model for the user, a second predicted degree of priority of the piece of communication from both the perspective of the multiple users and an individual perspective of the user based on the first predicted degree of priority and user behavioral information associated with previous conversations of the user; and
assigning a priority label to the piece of communication based on the second predicted degree of priority.

US Pat. No. 11,113,464

SYNCHRONIZING DATA-ENTRY FIELDS WITH CORRESPONDING IMAGE REGIONS

EQUIFAX INC., Atlanta, G...


1. A method comprising:receiving an image of a document, the image including regions, wherein each region of the image displays a portion of information from the document as represented by the image;
receiving metadata associated with the image;
generating, based on the received metadata, a data-entry interface including data-entry fields and a displayed image that is based on the received image;
detecting, on the image of the document, a calibration mark indicating a coordinate framework of the displayed image;
detecting, by a processing device, a selection of a target data-entry field from the data-entry fields;
determining, by the processing device and based on detecting the selection, an associated region from the regions, wherein the associated region corresponds to the target data-entry field; and
modifying, by the processing device, the displayed image in the data-entry interface to include a visual enhancement of the associated region from the image of the document.

US Pat. No. 11,113,463

NOTE BROWSER

Dropbox, Inc., San Franc...


1. A computer implemented method of displaying shared notes, the method comprising:receiving, in a note browser on a client device from a remote note sharing system, a first note, a second note, and a third note, each note being a separate and distinct content item, and each note including a creation location at which an author of the note was located when the note was created, wherein the creation location of each note is distinct, and wherein the creation location of each note is a geographical location;
for each of the first note, the second note, and the third note, mapping the creation location to a nearest geographical location marker, wherein the creation locations of the first note and the second note are mapped to a first geographical location marker and the creation location of the third note is mapped to a second geographical location marker based on proximity of each respective note to its nearest geographical location marker; and
generating for display the first note, the second note, and the third note in the note browser in conjunction with the geographical location markers to which they are mapped, wherein the first note, the second note, and the third note are ordered for display according to proximity of the corresponding geographical location marker to a location of the client device.

US Pat. No. 11,113,462

SYSTEM AND METHOD FOR CREATING AND SHARING INTERACTIVE CONTENT RAPIDLY ANYWHERE AND ANYTIME

RXPRISM HEALTH SYSTEMS PR...


1. A computer-implemented method (1200) for creating and sharing Interactive content (1165), the method (1200) comprising the steps of:providing (1202) First Media (1161) and/or text content as speaker notes in one or multiple languages to first user (102) in a first user device (104);
providing (1204) second Media (1162) by first user (102) using First Media (1161), and/or text content by using first user device (104);
processing (1206) first media (1161) and/or second media (1162) and storing an interactive content (1165) as network based resource;
transcoding and/or encoding and/or processing first media (1161) and/or second media (1162), in multiple media formats and resolutions;
sharing (1208) the stored interactive content (1165) by using first user device (104) with second user (114);
loading and playing (1210) interactive content (1165) on second user devices (112) by second user(114);
wherein the first user device (104) associated with the first user (102) having at least a processor, memory, display, media library stored locally or in remote location associated with the first user's (102) account.

US Pat. No. 11,113,461

GENERATING EDIT SUGGESTIONS FOR TRANSFORMING DIGITAL DOCUMENTS

Adobe Inc., San Jose, CA...


1. In a digital medium environment to transform a digital document based on an edit suggestion, a method implemented by at least one computing device, the method comprising:processing, by the at least one computing device, code of a digital document to identify data embedded in the code that identifies a network-based platform that publishes the digital document, wherein the network-based platform is identified and differentiated from multiple different network-based platforms that publish digital documents;
determining a page type that is specific to the identified network-based platform for a digital page of the digital document;
extracting, by the at least one computing device, a set of editable page elements from the digital page by matching page elements from the digital page to categories of editable page elements, wherein the categories of editable page elements are identified based on the page type of the identified network-based platform;
generating, by the at least one computing device, visual representations of the editable page elements that each include an edit suggestion for editing a respective page element of the editable page elements; and
transforming, by the at least one computing device, the digital document by modifying a particular editable page element based on an edit interaction with one or more of the particular editable page element or a respective visual representation of the editable page element.

US Pat. No. 11,113,460

MULTI-PATH COPYING AND PASTING METHOD AND MOBILE TERMINAL

VIVO MOBILE COMMUNICATION...


1. A multi-path copying and pasting method for a mobile terminal, comprising:detecting a selection operation made on a to-be-copied content in a first file;
outputting a first prompt box in accordance with the selection operation, wherein the first prompt box comprises a first option indicating an addition of the to-be a copied content into a pasting source list and a second option indicating the addition of the to-be-copied content into a target file in a pasting destination list wherein the number of the second portion is the same as the number of the target file in the pasting destination list; receiving a first selection operation made on at least one of the first option and the second option; and
executing: (i) adding the to-be-copied content into the pasting source list as a to-be-pasted content, or (ii) pasting the to-he-copied content to the selected target file or (iii) adding the to-be-copied content into the pasting source list as a to-be-pasted content and pasting the to-be-copied content to the selected target file, in response to the first selection operation,
wherein the target file is add into the pasting destination list through:
detecting a selection operation made on a to-be-pasted position in a second file;
outputting a second prompt box in accordance with the selection operation, wherein the prompt box comprises a third option indicating the addition of the second file into the pasting destination list and a fourth option indicating the to-be-pasted content in the pasting source list into the second file;
receiving a second selection operation made on (i) the third option, or (ii) the fourth option, or (iii) the third option the fourth option; and
executing: (i) adding the second file into the pasting destination list as a target file, or (ii) pasting the selected to-be-pasted content to the second file, or (iii) adding the second file into the pasting destination list as target lie and pasting the selected to-be-pasted content to the second file, in response to the second selection operation,
wherein the pasting source list is adapted for adding one or more to-be-pasted contents selected and copied from different first files; and the pasting destination list is adapted for adding one or more second files where the one or more to-be-pasted content are to be pasted,
wherein subsequent to the executing: (i) adding to-be-copied content into the pasting source list as a to-be-pasted content, or (ii) pasting the to-be-pasted content to the selected target file, or (iii) adding to-be-copied content into the pasting source list as a to-be-pasted content and pasting the to-be-copied content to the selected target file, in response to the first selection operation, the multi-path copying and pasting method further comprises:
displaying context information about a pasted content in the target file for the preview of a pasting result, when the to-be-copied content has been pasted to the selected target file; and
displaying the to-be-pasted content in the pasting source list, and setting the pasting source list to be in an editable state, when the to-be-copied content has been added into the pasting source list as the to-be-pasted content,
wherein subsequent to detecting the selection operation made on the to-be-pasted position in the second file, the multi-path copying and pasting method further comprises:
outputting a shortcut pasting prompt option in accordance with the selection operation; and
adding a newly-added to-be-pasted content in the pasting source list to the to-be-pasted position in the second file, upon the receipt of a selection operation made on the prompt option.

US Pat. No. 11,113,459

DYNAMIC GUIDANCE ENGINE FOR SOFTWARE CUSTOMIZATION SYSTEMS

salesforce.com, inc., Sa...


1. A system comprising:a web page customization system implemented using at least one computing device, the web page customization system configurable to cause:
processing an indication of user input in relation to a modification to a portion of a web page, the modification including deletion of a user interface object from the web page or addition of a user interface object to the web page;
ascertaining at least one characteristic of run-time computing performance related to the modification to the portion of the web page, the at least one characteristic of run-time computing performance including processing speed;
generating or updating, based on the at least one characteristic of run-time computing performance related to the modification to the portion of the web page, at least one web page customization rule;
analyzing at least the portion of the web page using a plurality of web page customization rules comprising the generated or updated at least one web page customization rule, the plurality of web page customization rules including at least one of: a first rule pertaining to at least one user-selectable data object field or a second rule pertaining to at least one user-selectable web page component; and
providing feedback pertaining to customization of the web page for presentation by a client device, via a graphical user interface (GUI), based at least in part on a result of analyzing at least the portion of the web page using the plurality of web page customization rules, the feedback indicating the at least one characteristic of run-time computing performance related to the modification to the portion of the web page.

US Pat. No. 11,113,458

CONCURRENTLY SUPPORTING BOTH DOCUMENT-BASED AND OBJECT-BASED UNDO OPERATIONS

Adobe Inc., San Jose, CA...


1. A method comprising:adding, in response to a user edit to data of a document, a session to an undo record in a last in first out manner, wherein the undo record is structured as a modified stack, wherein a modified stack allows an identified session to be percolated to the top and removed, the session indicating an action performed as part of the user edit as well as one or more objects of the data on which the action was performed, each of the one or more objects comprising a user-selectable element of the data; and
in response to receiving an object-based undo request, wherein the object-based undo request comprises an object selection of the object from a single display of the document in which the object appears, performing an object-based undo operation by:identifying a topmost session of the undo record that includes a first selected object;
percolating the identified session to the top of the undo record; and
undoing the action in the identified session.


US Pat. No. 11,113,457

SYSTEMS AND METHODS FOR EXECUTABLE CONTENT AND EXECUTABLE CONTENT FLOW DISTRIBUTION

WiseTech Global Limited, ...


1. A method comprising:on a server, storing a form flow process file, the form flow process file configured to provide access to form files, to determine an order or sequence of multiple forms that defines a logical pathway by which one or more of the related forms are accessed, and being interpretable by multiple different platforms without modification;
receiving at the server, a request from a device for the form flow process file;
transmitting the form flow process file to the device;
receiving a request of a form file from the logical pathway by which the one or more of the related forms are accessed based upon the transmitted form flow process file and an indication of a rendering language of the device transmitting the request; and
transmitting the form file in the rendering language of the device making the request, the form file independent from the form flow process file that defines the logical pathway by which the one or more of the related forms are accessed.

US Pat. No. 11,113,456

SYSTEM AND METHOD FOR DEEP LINKING AND SEARCH ENGINE SUPPORT FOR WEB SITES INTEGRATING THIRD PARTY APPLICATION AND COMPONENTS

Wix.com Ltd., Tel Aviv (...


1. A method for a website building system (WBS), the method comprising:enabling a user to create a website page with said WBS;
enabling a user to add at least one instance of at least one third party application to said website page, each said third party application comprising multiple internal pages;
parsing said website page and extracting at least one identifier for said at least one instance;
reconstructing a new outgoing uniform resource location (URL) for said website page at least from said at least one identifier, said new outgoing URL providing direct access to internal pages of said at least one third party application, said reconstructing further comprising providing a permalink to a new outgoing URL based on at least one of: said third party applications, said multiple internal pages and internal URLs of said third party applications; and
wherein said permalink provides multiple position indicators for each of the embedded third party applications for said new outgoing URL.

US Pat. No. 11,113,455

WEB PAGE RENDERING ON WIRELESS DEVICES

Microsoft Technology Lice...


1. A method comprising:receiving a markup language document from a web server via a network interface, the markup language document corresponding to a web page;
parsing the markup language document into original blocks by a processor, each of the original blocks comprising code representing a respective portion of original content of the web page, each respective portion of the original content configured to be displayed;
ranking the original blocks by assigning respective values to the original blocks based on an amount of a type of information that is contained in each of the original blocks;
changing the value of a designated original block based on content represented by the designated original block being requested more than a predetermined number of times;
creating a plurality of replacement blocks by the processor, each replacement block of the plurality of replacement blocks corresponding to a respective one of the original blocks, the plurality of replacement blocks including less information than a plurality of respective original blocks to which the plurality of replacement blocks correspond, each of the plurality of replacement blocks comprising code representing substituted content of the web page, the substituted content configured to be displayed in lieu of the portion of the original content represented by the corresponding original block;
building a modified markup language document that includes some of the original blocks and one or more of the replacement blocks based at least in part on each original block that is included in the modified markup language document having a rank that is greater than a predetermined threshold and further based at least in part on each replacement block that is included in the modified markup language document corresponding to a respective original block having a rank that is less than or equal to the predetermined threshold; and
sending the modified markup language document in lieu of an entirety of the original content of the requested web page to a wireless device via the network interface for rendering by the wireless device.

US Pat. No. 11,113,454

IN-LINE EDITING OF WEBPAGES

International Business Ma...


1. A computer-implemented method comprising:identifying, by one or more computing devices, an editable region of a dynamically rendered webpage, wherein the editable region is available for selection by a user for entry of in-line edits, or wherein the editable region is available for entry of in-line edits by the user, or both;
providing, by the one or more computing devices, an indicator associated with the editable region, wherein the indicator identifies the editable region as available for editing source content of the dynamically rendered webpage, wherein the indicator includes one or more action buttons, wherein the one or more action buttons include one or more commands including at least one of submitting and discarding one or more changes to a content draft, wherein the one or more action buttons are not visible when a field included within the editable region is not being actively edited;
identifying, by the one or more computing devices, an in-line edit to the source content of the dynamically rendered webpage, made by a user, to a portion of the editable region wherein the in-line edit modifies the field;
creating the content draft in a content management system associated with the webpage, the content draft including the in-line edit made by the user;
identifying, by the one or more computing devices, commitment of the in-line edit for rendering;
identifying, by the one or more computing devices, in an edit mode of the dynamically rendered webpage, any errors associated with the modified field after identifying the commitment of the in-line edit for rendering, wherein the any errors would result in one of an incomplete and a failed rendering of the modified field;
providing, by the one or more computing devices, an indication of an error associated with the modified field to the user when the error associated with the modified field is identified;
rendering, by the one or more computing devices, a first portion of the webpage when no errors associated with the modified field are identified, wherein the rendering is based upon, at least in part, the commitment of the in-line edit for rendering, wherein the first portion of the webpage is affected by the in-line edit and one or more portions of the webpage that are not affected by the in-line edit are not rendered concurrently with the first portion of the webpage;
identifying a listening region of the dynamically rendered webpage, wherein the listening region is dependent on the editable region where the in-line edit is committed, and is associated with a second portion of the webpage that is not available for in-line editing;
identifying any errors associated with the listening region based upon, at least in part, the in-line edit to the portion of the editable region;
providing an indication of an error associated with the listening region when the error associated with the listening region is identified; and
rendering the second portion of the webpage when no errors associated with the listening region are identified based upon, at least in part, the commitment of the in-line edit for rendering of the first portion of the webpage.

US Pat. No. 11,113,453

METHOD AND APPARATUS FOR IMPROVED PRESENTATION OF INFORMATION


1. A method comprising:generating a dynamic content blocker
wherein said dynamic content blocker filters image content comprising at least one of image(s), picture(s), system(s), a word or text,
wherein said dynamic content blocker comprises a blocker image that uses a filtering algorithm that changes over time points, and
wherein at each time point in said time points,
an analysis of said image content on a display is performed,
wherein said image content contains item(s) of interest and item(s) of non-interest,
wherein said analysis of said image content on said display evaluates for item(s) of non-interest to said user,
wherein said analysis comprises an artificial intelligence algorithm for continued feedback, and
wherein said artificial intelligence algorithm learns based on a user's facial expression upon a gaze at on items, and
said blocker image is generated,
wherein said blocker image is configured to cover said item(s) of non-interest; and
displaying, at each time point in said time points, said dynamic content blocker and said image content on said display.

US Pat. No. 11,113,452

DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM

FUJIFILM Business Innovat...


1. A document management apparatus, comprising:a display that displays a document structure in which an edition element of a document to be edited is identifiable, the edition element being a portion of the document that serves as an element of editing work, the edition element being one of a plurality of edition elements of the document;
a specifying operation receiving part that receives an operation of specifying the edition element based on the document structure displayed on the display; and
a notification controller that provides a notification to a notification destination associated with the edition element specified through the operation received by the specifying operation receiving part, wherein
the notification includes an approval request requesting approval to edit the edition element, and
when the edition element has plural versions, the notification includes the approval request for the respective versions.

US Pat. No. 11,113,451

REPRESENTATION OF MARK-UP OF MASTER DOCUMENTS

Thomson Reuters Enterpris...


1. A method comprising:displaying a master document of a document generation system, the master document comprising unconditional content, conditional content, and non- graphical mark-up which evaluates based on input to determine whether the conditional content is included in a customized document generated from the master document by the document generation system;
selecting a portion of the unconditional content of the master document;
causing the selected portion of the unconditional content to become selected conditional content in the master document by generating and displaying a graphical representation of how the non-graphical mark-up is related to the selected conditional content in the master document, including conditions under which the selected conditional content is included in the customized document; and
responsive to modification of the displayed graphical representation, modifying the non-graphical mark-up in the master document correspondingly, thereby modifying how the non-graphical mark-up is related to the selected conditional content in the master document.

US Pat. No. 11,113,450

COGNITIVE FONT ENRICHMENT MANAGEMENT FOR ADDING SYSTEM FONTS

International Business Ma...


1. A system, comprising:a monitoring module that:maintains a web font list of different known system font formats included in a local system font repository,
monitors web information received from a web server to identify each web font included in the web information,
receives, from the web server, new web information from a website comprising a new glyph that includes a web font associated with the new glyph,
independently and unilaterally determines whether the web font associated with the new glyph in the received new web information is a known web font by comparing the web font associated with the new glyph in the received new web information and each known system font format in the web font list of different known system font formats to determine whether a set of first characteristics of the web font associated with the new glyph matches a set of second characteristics of one or more known system font formats in the web font of known system font formats,
in response to the set of first characteristics of the web font associated with the new glyph not matching the set of second characteristics of any known system font format in the web font list of different known web fonts, independently and unilaterally identifies the web font associated with the new glyph as an unknown web font,
compares the set of first characteristics of the unknown web font to the set of second characteristics for each different known system font format in the web font list of different known system font formats included in the local system font repository to independently and unilaterally determine which known system font format is most similar to the unknown web format,
independently and unilaterally selects, as a new default system font format for the unknown web font, the known system font format in the web font list of different system font formats that includes the set of second characteristics that are the most similar to the set of first characteristics of the unknown web font, and
in response to the selection, independently and unilaterally changing a current default system font format for the website to the new default system font format for the unknown web font;

a font conversion module that converts the unknown web font associated with the new glyph into the new default system font format;
a validation module that validates the converted unknown web font associated with the new glyph; and
an update module that updates the web font list of different known system font formats in the local system font repository with the validated converted unknown web font associated with the new glyph,
wherein at least a portion of each of said modules comprises one or more of a set of hardware circuits, a set of programmable hardware devices, and executable code stored on a set of non-transitory computer-readable storage media.

US Pat. No. 11,113,449

METHODS AND SYSTEMS FOR CREATING, ORGANIZING, AND VIEWING ANNOTATIONS OF DOCUMENTS WITHIN WEB BROWSERS

ExactNote, Inc., Wilming...


1. A method comprising:receiving from an annotation capable web browser a screenshot bundle representing an annotation and an associated marked screenshot, the screenshot bundle comprising:a uniform resource locator (URL) for a document;
data for representing a selected piece of text from the document, wherein the selected piece of text is representative of the annotation;
information for finding the selected piece of text in the document; and
the marked screenshot of a portion of the document showing the selected piece of text, wherein the selected piece of text is visually marked; and
storing the screenshot bundle using one or more computer systems;

reducing in size the marked screenshot before storing the screenshot display bundle and creating a screenshot display bundle comprising at least a thumbnail marked screenshot created from the marked screenshot in the received screenshot bundle using one or more computer systems;
compiling, upon receipt of a request from a web browser running on an electronic device, a screenshot bundles display set comprising a plurality of screenshot display bundles using one or more computer systems, wherein compiling further comprises instructions to exclude a pre-specified list of screenshot display bundles from the plurality of screenshot display bundles, and wherein the pre-specified list is received from the web browser, and the pre-specified list depends on selections made by the user of the web browser; and
transmitting the screenshot bundles display set in a format that allows the plurality of screenshot display bundles to be displayed by the web browser running on the electronic device.

US Pat. No. 11,113,448

PRESENTING VIEWS OF AN ELECTRONIC DOCUMENT

QUALTRICS, LLC, Provo, U...


1. A method comprising:binding a document model for an electronic document to a plurality of document views;
providing, to a first client device, a visual identifier associated with the electronic document for display within a graphical user interface on the first client device;
receiving, from a second client device, an indication that the second client device scanned the visual identifier displayed within the graphical user interface on the first client device; and
based on receiving the indication, providing the electronic document to the second client device, wherein providing the electronic document to the second client device causes the second client device to present, via a graphical user interface of the second client device, the electronic document in accordance with a first document view of the plurality of document views, the first document view comprising a first layout format corresponding to a first type of manipulation of survey content of the electronic document that is different from a second layout format corresponding to a second type of manipulation of the survey content of the electronic document corresponding to a second document view from the plurality of document views.

US Pat. No. 11,113,447

CROSS-APPLICATION INGESTION AND RESTRUCTURING OF SLIDE PRESENTATION CONTENT

Microsoft Technology Lice...


9. A computer implemented method, comprising:generating a first document by a first content generation application;
instructing a display device to display an application user interface that includes the first document;
receiving a selection input that selects a source slide presentation document corresponding to a slide presentation application different from the first content generation application, the source slide presentation document comprising a set of slides, having slide presentation content, in a slide sequence;
identifying a graphical object in the slide presentation content;
parsing the slide presentation content to identify a first portion of the graphical object and a second portion of the graphical object;
automatically identifying a data correlation between the first portion and the second portion of the graphical object;
generating an insight based on the data correlation between the first portion and the second portion of the graphical object;
adding the generated insight to the first document in the application user interface;
identifying a type of transition between the set of slides; and
generating a textual transition in the first document based on the identified type of transition.

US Pat. No. 11,113,445

HOTSPOT DETECTION BASED ON LITHO-AWARE MACHINE LEARNING

Siemens Industry Software...


1. A method, executed by at least one processor of a computer, comprising:receiving a layout design;
identifying pinching-type hotspot candidates and bridging-type hotspot candidates in the layout design based on predetermined criteria;
performing simulation to derive aerial image intensity values for a plurality of sites on each of the pinching-type hotspot candidates and for a plurality of sites on each of the bridging-type hotspot candidates;
determining pinching-type hotspots from the pinching-type hotspot candidates based on one or more machine learning models for pinching-type hotspots and bridging-type hotspots from the bridging-type hotspot candidates based on one or more machine learning models for bridging-type hotspots, the input for the one or more machine learning models for pinching-type hotspots being the aerial image intensity values for the plurality of sites on each of the pinching-type hotspot candidates, the input for the one or more machine learning models for bridging-type hotspots being the aerial image intensity values for the plurality of sites on each of the bridging-type hotspot candidates;
storing information of the pinching-type hotspots and the bridging-type hotspots; and
thereafter finalizing the layout design to repair the pinching-type hotspots and the bridging-type hotspots, and manufacturing a circuit according to the finalized layout design using a photolithographic process.

US Pat. No. 11,113,444

MACHINE-LEARNING BASED SCAN DESIGN ENABLEMENT PLATFORM

Taiwan Semiconductor Manu...


1. A computer system for grouping and ordering a plurality of scan flip-flops within electronic circuitry of an electronic device, the computer system comprising:a memory that stores one or more instructions; and
a processor configured to execute the one or more instructions, the one or more instructions, when executed by the processor, configuring the processor to:group the plurality of scan flip-flops into a first plurality of scan chains having a first number of scan chains based upon a first cluster analysis of the plurality of scan flip-flops and a second plurality of scan chains having a second number of scan chains based upon a second cluster analysis of the plurality of scan flip-flops;
determine a first consistency coefficient representing a measure of a similarity between scan flip-flops within each scan chain from among the first plurality of scan chains compared to scan flip-flops of other scan chains from among the first plurality of scan chains and a second consistency coefficient representing a measure of a similarity between scan flip-flops within each scan chain from among the second plurality of scan chains compared to scan flip-flops of other scan chains from among the second plurality of scan chains;
select the first number of scan chains to be an optimum number of scan chains for the electronic circuitry when the first consistency coefficient is larger than the second consistency coefficient or the second number of scan chains to be the optimum number of scan chains for the electronic circuitry when the second consistency coefficient is larger than the first consistency coefficient;
group the plurality of scan flip-flops into the optimum number of scan chains based upon centroid-based clustering of the plurality of scan flip-flops; and
determine a plurality of routing orders for the plurality of scan flip-flops based upon a routing analysis of scan flip-flops within each scan chain from among the optimum number of scan chains.


US Pat. No. 11,113,443

INTEGRATED CIRCUIT WITH THICKER METAL LINES ON LOWER METALLIZATION LAYER

TAIWAN SEMICONDUCTOR MANU...


1. An integrated circuit (IC) structure, comprising:a first transistor, a second transistor, a third transistor and a fourth transistor formed on a substrate;
a first metallization layer above the first, second, third and fourth transistors, the first metallization layer having a plurality of first metal lines extending laterally along a first direction and having a first line width measured in a second direction perpendicular to the first direction, each of the plurality of first metal lines having a first length measured along the first direction, wherein one or more of the plurality of first metal lines are part of a first net electrically connecting the first transistor and the second transistor; and
a second metallization layer over the first metallization layer, the second metallization layer having a plurality of second metal lines extending laterally along the second direction and having a second line width measured in the first direction, each of the plurality of second metal lines having a second length measured along the second direction, wherein the second line width of the second metal lines is less than the first line width of the first metal lines, one or more of the plurality of second metal lines are part of a second net electrically connecting the third transistor and the fourth transistor, and a total length of the second lengths of the one or more of the plurality of the second metal lines in the second net is less than a total length of the first lengths of the one or more of the plurality of the first metal lines in the first net.

US Pat. No. 11,113,442

METHODS AND APPARATUS FOR REDUCING RELIABILITY DEGRADATION ON AN INTEGRATED CIRCUIT

Intel Corporation, Santa...


1. A method of using integrated circuit design tools to implement a circuit design on an integrated circuit, the method comprising:with the integrated circuit design tools, generating a first configuration image to implement the circuit design using a first random fitter seed to perform place and route;
with the integrated circuit design tools, generating a second configuration image that is different than the first configuration image using a second random fitter seed that is different than the first random fitter seed to perform place and route, wherein the second configuration image implements the circuit design;
configuring the integrated circuit using the first configuration image; and
reconfiguring the integrated circuit using the second configuration image.

US Pat. No. 11,113,441

REDUCE/BROADCAST COMPUTATION-ENABLED SWITCHING ELEMENTS IN AN EMULATION NETWORK

Siemens Industry Software...


1. A reconfigurable hardware modeling device comprising:a plurality of reconfigurable hardware modeling circuits, each reconfigurable hardware modeling circuit of the plurality of reconfigurable hardware modeling circuits comprising:a model computation subsystem configurable either to model elements of a circuit design, or to serve as a testbench element, or both, and
a network subsystem comprising: network circuitry and signal reduction circuitry, the network circuitry comprising circuitry configurable to perform a signal broadcast function, the signal reduction circuitry configurable to perform a signal reduction function, the signal reduction function being a function of combining a plurality of status signals into a single status signal, the plurality of status signals comprising status signals received from one or more reconfigurable hardware modeling circuits in the plurality of reconfigurable hardware modeling circuits, the signal broadcast function being a function of transmitting the single status signal to one or more other circuits in the reconfigurable hardware modeling device.


US Pat. No. 11,113,440

MEMORY MIGRATION IN HYBRID EMULATION

Synopsys, Inc., Mountain...


1. A hybrid emulation system for hybrid emulation of a design under test (DUT) having system memory logically segmented into a plurality of memory blocks, the system comprising:a hardware emulation system to emulate a first portion of the DUT during the hybrid emulation;
and a simulation system to simulate a second portion of the DUT during the hybrid emulation,
wherein at least one of the hardware emulation system or the simulation system is configured to:
assign a first set of the plurality of memory blocks to a first owning system, wherein the first owning system is the simulation system or the emulation system;
assign a second set of the plurality of memory blocks to a second owning system, wherein the second owning system is the hardware emulation system or the simulation system,
wherein in response to the second owning system being the simulation system, direct memory access (DMA) to the second set of memory blocks is disabled for the emulated first portion of the DUT,
wherein in response to the second owning system being the emulation system, direct memory interface (DMI) to the second set of memory blocks is disabled for the simulated second portion of the DUT; and
re-assign, during hybrid emulation, a memory block of the first set of memory blocks to a requesting system based on memory access statistics describing access to the memory block during hybrid emulation.

US Pat. No. 11,113,439

TRIGGER-ACTION-CIRCUITS: LEVERAGING GENERATIVE DESIGN TO ENABLE NOVICES TO DESIGN AND BUILD CIRCUITRY

AUTODESK, INC., San Rafa...


1. A computer-implemented method for designing a circuit, comprising:(a) authoring a behavior of the circuit using a visual programming language;
(b) computing two or more circuit designs, wherein each of the two or more circuit designs satisfies the behavior;
(c) generating and displaying a data grid table, for the two or more circuit designs, wherein:(1) each row of the data grid table represents one of the two or more circuit designs; and
(2) the data grid table is sortable; and

(d) upon selecting one of the two or more circuit designs in the data grid table, rendering a computer generated circuit diagram of the selected circuit design in an interactive circuit diagram area.

US Pat. No. 11,113,438

FLUID SIMULATION PROGRAM, FLUID SIMULATION METHOD, AND FLUID SIMULATION DEVICE

FUJITSU LIMTIED, Kawasak...


1. A non-transitory computer-readable storage medium storing a fluid simulating program for causing a computer to execute a process, the process comprising:extracting, based on positional information included in particle data of particles, including fluid particles and wall boundary particles related to a boundary with a wall, during a predetermined time period, a first particle from among the wall boundary particles with a predetermined value or less of distance from a fluid particle among the fluid particles and a second particle with the predetermined value or less of distance from the first particle from among the wall boundary particles excepting the first particle;
setting a boundary condition of a pressure Poisson equation for calculating pressure to be applied to each of the particles;
calculating the pressure to be applied to each of the particles, based on the first particle and the second particle; and
calculating the particle data of the particles during a next time period based on the pressure,
the boundary condition includes that the first particle is set to a fixed fluid particle whose velocity is a predetermined value and that pressure to be applied to the second particle is 0.

US Pat. No. 11,113,437

JOINT HARDWARE AND CONTROLLER DESIGN

SIEMENS AKTIENGESELLSCHAF...


1. A system for designing a product comprising physical hardware and a controller for controlling the physical hardware, wherein the system comprises:a computer-readable medium comprising a detailed hardware model corresponding to the physical hardware and a controller model corresponding to the controller;
a receiver module configured to receive one or more user requirements via a user input device;
an optimization module configured to jointly optimize the detailed hardware model and the controller model over a plurality of iterations, wherein each iteration comprises (i) optimizing of the detailed hardware model with respect to the one or more user requirements; (ii) matching the detailed hardware model to a reduced order model of the detailed hardware model; and (iii) optimizing the controller model with respect to the reduced order model of the detailed hardware model.

US Pat. No. 11,113,436

METHOD FOR SIMULATION OF FLOW IN FLUID FLOW NETWORK HAVING ONE-DIMENSIONAL AND MULTI-DIMENSIONAL FLOW COMPONENTS

United States of America ...


1. A computer-implemented method for simultaneous simulation of one-dimensional flow and multi-dimensional flow in a fluid flow network, comprising the steps of:a first process in which a one-dimensional mesh of nodes is defined in a computer for each first component of the fluid flow network supporting one-dimensional flow there through;
a second process in which a multi-dimensional mesh of nodes is defined in the computer for each second component of the fluid flow network supporting multi-dimensional flow there through, wherein a portion of the fluid flow network between any two adjacent nodes of the multi-dimensional mesh of nodes is a flow branch, and wherein sets of two adjacent nodes and corresponding flow branch are defined in the computer;
a third process in which, for each of the sets associated with each second component of the fluid flow network, a relational data structure is defined in the computer wherein each relational data structure is constructed as an array that identifies
first flow branches in the multi-dimensional mesh of nodes that lead to and away from a set's two adjacent nodes and that are aligned with the set's corresponding flow branch,
second flow branches in the multi-dimensional mesh of nodes that lead to and away from the set's two adjacent nodes and that are not aligned with the set's corresponding flow branch, and
third flow branches in the multi-dimensional mesh of nodes immediately adjacent to the set's corresponding flow branch; wherein the array is used in a flow analysis of a multi-dimensional flow component irrespective of node location and flow movement; and
a fourth process in which a flow analysis code is executed in the computer to model fluid flow throughout the fluid flow network using integration of the one-dimensional mesh of nodes for each first component, the multi-dimensional mesh of nodes for each second component, and each relational data structure for each second component: wherein the first process, the second process and the third process are executed simultaneously in the fourth process.

US Pat. No. 11,113,435

EVALUATION OF A SIMULATED VEHICLE FUNCTIONALITY FEATURE

Volvo Car Corporation, G...


1. A method performed by a vehicle feature evaluation system for enabling evaluation of a simulated vehicle functionality feature, the method comprising:determining in relation to a road-driven vehicle, with support from a tracking system, an orientation of a head-mounted display, HMD, adapted to be worn by an occupant on-board the road-driven vehicle;
determining a simulated vehicle functionality feature to be evaluated in the road-driven vehicle;
providing in real-time to a HMD display of the HMD, taking into consideration the HMD orientation, a virtual representation of the simulated vehicle functionality feature superimposed on a real-time real-world video stream derived from real-world image data captured with support from one or more forward-facing cameras provided on the HMD in eye-position of the occupant; and
updating the virtual representation based on a vehicle signal affecting the simulated vehicle functionality feature, derived from the road-driven vehicle, wherein the simulated vehicle functionality feature comprises a simulated effect resulting from a simulation of the simulated vehicle functionality feature.

US Pat. No. 11,113,434

METHOD FOR PREDICTING ARC FLASH ENERGY AND PPE CATEGORY WITHIN A REAL-TIME MONITORING SYSTEM

POWER ANALYTICS CORPORATI...


1. A method for making real-time predictions about an arc flash event on an electrical system, comprising:automatically and continuously updating a virtual system model of the electrical system with real-time data from a plurality of sensors located throughout the electrical system by comparing the real-time data from the plurality of sensors to expected values and automatically updating the virtual model of the electrical system based on the comparison of the real-time data from the plurality of sensors to the expected values;
modifying the virtual system model of the electrical system to introduce a short-circuit feature to an uninterrupted power supply bypass circuit branch;
choosing a standard to supply equations used for arc flash event simulation;
simulating an arc flash event utilizing the modified virtual system model and the real-time data;
calculating a quantity of arc energy released by the arc flash event using results from the simulation;
predicting at least one aspect of the arc flash event; and
communicating a prediction report for the arc flash event.

US Pat. No. 11,113,433

TECHNIQUE FOR GENERATING A SPECTRUM OF FEASIBLE DESIGN SOLUTIONS

AUTODESK, INC., San Rafa...


1. One or more non-transitory computer-readable media including instructions that, when executed by one or more processors, cause the one or more processors to generate a spectrum of design solutions, by performing the steps of:synthesizing a problem specification that indicates at least one design criterion;
based on a classification of the problem specification, identifying within a database at least a first approach from a plurality of approaches for solving the problem specification, wherein each approach included in the plurality of approaches in the database comprises a different process for generating three-dimensional geometry for solving the problem specification;
generating a spectrum of design solutions for the first approach, wherein the spectrum of design solutions comprises a plurality of design solutions, each design solution in the spectrum of design solutions representing a different instance of three-dimensional geometry that satisfies the at least one design criterion;
evaluating manufacturability of a first design solution included in the spectrum of design solutions;
evaluating manufacturability of a second design solution included in the spectrum of design solutions; and
displaying, via a graphical user interface (GUI), the spectrum of design solutions for the first approach and a comparison of the manufacturability of the first design solution relative to the manufacturability of the second design solution.

US Pat. No. 11,113,432

ENCODING IMAGES ON PHYSICAL OBJECTS TO TRACE SPECIFICATIONS FOR A MANUFACTURING PROCESS

Micron Technology, Inc., ...


1. A method comprising:receiving, by a supplier from a vehicle manufacturer, a first printed document including specifications for a product to be integrated into a vehicle, wherein the first printed document further includes a first encoded image, the first encoded image including first parameters that identify a manufacturing process;
scanning, by a scanner of the supplier, the first encoded image to obtain the first parameters;
manufacturing, by the supplier using the manufacturing process identified by the first parameters, a sample of the product;
sending, by the supplier to the vehicle manufacturer, the sample with a second printed document indicating that the sample was made using the specifications, wherein the second printed document includes a second encoded image, the second encoded image including the first parameters, and further including second parameters related to process conditions during manufacture of the sample using the manufacturing process;
receiving, by the supplier from the vehicle manufacturer in response to the second printed document, a third printed document that corresponds to revisions to the specifications, wherein the third printed document includes a third encoded image, the third encoded image including the first parameters;
scanning, by at least one computing device of the supplier, the third encoded image;
determining, by the at least one computing device and based at least on scanning the third encoded image, that the third printed document corresponds to the second printed document; and
in response to determining that the third printed document corresponds to the second printed document, manufacturing, by the supplier, the product according to the revisions to the specifications.

US Pat. No. 11,113,431

MBD-BASED THREE-DIMENSIONAL PROCESS DESIGNING METHOD AND PLATFORM FOR TYPICAL AUTOMOBILE MACHINED PART


1. An MBD-based three-dimensional process designing method for a typical automobile machined part, characterized in that, the MBD-based three-dimensional process designing method for the typical automobile machined part comprises the following steps of:by taking three-dimensional CAD software as a carrier, an MBD design model as an unique data input, and a three-dimensional process MBD model as a data output, sequentially carrying out establishment of MBD-related standards, creation of an MBD design model, feature classification and creation of a feature information library, feature recognition and information extraction, generation of manufacturing elements, clustering of the manufacturing elements and generation of procedures, sequencing of the procedures, and creation of manufacturing feature bodies and procedure models; and generating a process MBD model integrating the procedure models and the manufacturing feature bodies to realize visualization of a process design flow:
comprising the following steps of:
Step 1, establishing MBD-related standards according to requirements for the creation of an MBD design model;
Step 2, according to a set of the established MBD standards, determining all process information of part process design, including sizes and dimensional tolerances, geometric tolerances and references, face roughness degrees, technical requirements, process information and attribute annotations, and defining and labelling, in a three-dimensional labeling module of the CAD software, all the information of the process design to complete the creation of the MBD design model;
Step 3: according to a design model of a typical part, carrying out attribute customization and feature classification on features of the model, wherein the customized features are classified according to a manufacturing face adjacency graph (MFAG) of the feature, and the classified features include individually manufactured faces, steps, holes, grooves and bosses; and then completing creation of a manufacturing feature information library in an XML file format, wherein the feature information library includes attributes of the customized feature faces and edges in various types, wherein attributes of a face mainly include a type of the face, a normal vector, and inner and outer loop information of the face; and attributes of an edge include a type of the edge, a normal vector, and concavity and convexity of the edge;
Step 4: according to a STEP-format file of the part design model, acquiring an attribute adjacency graph (AAG) of a part, deleting all transitional features, blank faces and edges adjacent to the blank faces, and simplifying the attribute adjacency graph of the part to a manufacturing face adjacency graph (MFAG) of a feature; carrying out feature matching on the MFAG and the manufacturing feature information library, and if the matching is successful, recognizing corresponding features; if the matching is not successful, carrying out attribute decomposition on the MFAG, and integrating or dividing corresponding faces to obtain a plurality of feature sub-graphs, then carrying out feature matching on the feature sub-graphs and the manufacturing feature information library, and if the matching is successful, recognizing corresponding features; and for the recognized features, extracting product manufacturing information of each feature manufacturing face, including basic process design information and process auxiliary information, and outputting and storing the product manufacturing information in the XML file format to a background;
Step 5: according to content of a process decision rule, extracting feature information from the manufacturing feature information library, and carrying out information mapping on the feature information and a feature manufacturing rule library to complete the creation of a manufacturing element, wherein the manufacturing element comprises all manufacturing information of a feature or a feature face, including a manufacturing element name, a manufacturing feature type, a manufactured portion, a manufacturing method, a manufacturing precision, a manufacturing tool, a manufacturing machine tool, a manufacturing time, a work fixture, a cutting amount, a manufacturing allowance, a main shaft rotation speed and a cutting speed;
Step 6, for the manufacturing element created in Step 5, by means of a manufacturing element clustering algorithm based on a weighted attribute fuzzy c-means (WAFCM), according to the influences of different manufacturing attributes on a clustering result, assigning different weights to attributes such as the manufacturing method, the manufacturing precision, the manufacturing tool, the manufacturing machine tool and the work fixture, determining a number of clusters c, an iteration ending threshold s and a number of iterations T, and clustering manufacturing elements with similar manufacturing attributes to generate manufacturing procedures by integration;
Step 7, by means of a genetic algorithm, carrying out optimized sequencing on the procedures generated in Step 6 to obtain an optimal procedure sequencing list for the part; and
Step 8: with regard to the feature to be manufactured by each procedure, according to a reverse generation thought, using a half-space intersection or parametric modeling method to create, from the MBD design model, a manufacturing feature body of an Nth procedure, wherein a procedure MBD model of the Nth procedure is a collection of the MBD design model and process information of the procedure, and therefore, a procedure model of an (N?1)th procedure is generated by means of carrying out a Boolean addition calculation on the manufacturing feature body and the design model, and on this basis, creating manufacturing feature bodies and procedure models of the remaining procedures, until a final blank model is created, and then completing the creation of the procedure model.

US Pat. No. 11,113,430

TECHNIQUES FOR USING CONTROLLED NATURAL LANGUAGE TO CAPTURE DESIGN INTENT FOR COMPUTER-AIDED DESIGN

AUTODESK, INC., San Rafa...


1. A computer-implemented method, comprising:receiving a design problem statement comprising a product definition specifying a plurality of objects of a first design that are to be included in a design solution, wherein:the design problem statement is delineated in a controlled natural language (CNL) comprising a human-based language and not a computer-based language that defines permitted lexicons and sentence structures for a plurality of problem statements, and
the design problem statement includes a first plurality of problem statements of different types, each type defining a different aspect of the product definition, the first plurality of problem statements complying with at least one sentence structure defined by the CNL and including:at least one function problem statement defining a functional property of the first design, wherein the at least one function problem statement specifies an object with a first lexicon at a first position in a first sentence structure, and a function with a second lexicon at a second position in the first sentence structure, and
at least one statement using a second sentence structure that is different than the first sentence structure, wherein the at least one statement is one of an objective problem statement, a constraint problem statement, an environmental object problem statement, or an environmental interaction problem statement;


processing the design problem statement, based on the permitted lexicons and sentence structures of the CNL, to generate a design problem model by:producing, using the permitted lexicons, a set of tokenized terms associated with portions of the design problem statement, and
producing, from the set of tokenized terms and using the sentence structures, the design problem model comprising a parsed representation of the design problem statement; and

displaying, via a graphical user interface, a graphical representation of the design problem model according to the first plurality of problems statements being processed that includes:a plurality of nodes associated with the plurality of objects specified by the design problem statement, wherein the plurality of nodes are presented at specific positions within the graphical representation to indicate environmental interaction and relative spatial positions of correspondent objects within an environment and
a first edge associated with a relationship, specified by the design problem statement between two objects included in the plurality of objects, wherein the first edge connects the two objects based on the environmental interaction and a relative spatial relationship identified by the design problem statement.


US Pat. No. 11,113,429

SOLID STATE STORAGE DATA DESTRUCTION

JPMORGAN CHASE BANK, N.A....


1. A solid-state drive (SSD) destruction system, the system comprising:an induction coil proximate to a SSD;
an energy storage device;
a switch device that is connected to the induction coil and the energy storage device; and,
a controller device in communication with the switch device and a communication bus that is between a control circuitry associated with the SSD and a drive controller,
wherein the controller device is configured to:store an association between the SSD and the drive controller, the association including an affiliation between a SSD identifier and a drive controller identifier;
determine whether the SSD identifier and the drive controller identifier match the stored association; and
when the SSD identifier and the drive controller identifier do not match the stored association,control the switch device to regulate energy discharged from the energy storage device into the induction coil such that heat generated by the discharged energy destroys data stored in the SSD.



US Pat. No. 11,113,428

SHIPPABLE DATA TRANSFER DEVICE WITH ANTI-TAMPER CASING

Amazon Technologies, Inc....


1. A data transfer device comprising:a persistent solid-state electronics medium; and
an anti-tamper case enclosing the persistent solid-state electronics medium, wherein the anti-tamper case comprises:a durable outer layer;
a shock absorbent inner layer; and
an anti-tamper layer positioned between the durable outer layer and the shock absorbent inner layer, wherein the anti-tamper layer comprises:a plurality of identifying elements arranged in a unique pattern in a polymer matrix of the anti-tamper layer, wherein the unique pattern is arranged such that the unique pattern can be captured in an image and compared to a subsequently captured image to determine if the unique pattern has been altered; and
one or more substances encapsulated in pockets of the polymer matrix of the anti-tamper layer, wherein the one or more substances are configured to actively re-arrange or obscure the plurality of identifying elements such that the unique pattern is altered in response to a breach of the anti-tamper case penetrating beyond the durable outer layer.



US Pat. No. 11,113,427

METHOD OF DISPLAYING CONTENTS, A FIRST ELECTRONIC DEVICE AND A SECOND ELECTRONIC DEVICE

LENOVO (BEIJING) CO., LTD...


1. A method of displaying contents, comprising:providing a first electronic device configured to display one or more virtual contents to a user, wherein the first electronic device is communicable with and coupled to a second electronic device, which includes a physical display configured to display one or more non-virtual contents, and the one or more virtual contents is displayed to the user at a space that does not visually overlap with the physical display;
determining the user's line of sight; and
prohibiting the physical display of the second electronic device from displaying the one or more non-virtual contents, in response to the user's line of sight not being on the physical display of the second electronic device.

US Pat. No. 11,113,426

METHOD OF INTERACTING WITH AN ELECTRONIC DEVICE WHILE THE DISPLAY SCREEN IS DEACTIVATED

BlackBerry Limited, Wate...


20. A handheld electronic device, comprising:a processor;
a display screen coupled to the processor;
an input device coupled to the processor;
a plurality of notification elements coupled to the processor, wherein the plurality of notification elements comprise a light emitting diode (LED), a vibrator and a speaker; and
a communication subsystem coupled to the processor for communication over a wireless network;
wherein the processor is configured to:turn off the display screen;
detect a first input at the input device; and
in response to the detection of the first input at the input device while the display screen remains turned off:determine a number and type of new events associated with the first input; and
activate a notification element in the plurality of notification elements a number of times equal to the number of new events of the event type associated with the first input, wherein the notification element that is activated is selected from the LED, vibrator or speaker in dependence on the event type associated with the first input.



US Pat. No. 11,113,425

SECURITY COMPONENT FOR DEVICES ON AN ENUMERATED BUS

Crowd Strike, Inc., Irvi...


1. A system comprising:a processor; and
a PnP driver attached as a filter in a device stack of an enumerated bus device of one or more enumerated bus devices plugged in to the system, the PnP driver being operated by the processor to:receive a message directed through the device stack, the message specifying indicative features of at least one of the one or more enumerated bus devices or commanding the at least one of the one or more enumerated bus devices to take an action; and
based on the message, take an action to alter, limit, or otherwise block functionality of the at least one of the one or more enumerated bus devices, wherein the action includes:sending a request to a hub device requesting that an individual port of the hub device associated with the at least one of the one or more enumerated bus devices be powered off, disabled, or power cycled, or
suspending the at least one of the one or more enumerated bus devices by updating a state machine of a hub device.



US Pat. No. 11,113,424

DEVICE, SYSTEM AND METHOD FOR INSTALLING ENCRYPTED DATA

MOTOROLA SOLUTIONS, INC.,...


1. A device comprising:a communication unit;
a memory;
a processor including: an immutable memory portion storing preconfigured trust anchor data; and a module storing preconfigured non-exportable data for obtaining a manufacturing protection key using the preconfigured trust anchor data;
the processor configured to:receive, via the communication unit: an encrypted common protection key, encrypted using the manufacturing protection key; and an encrypted distribution private key, encrypted using a common protection key corresponding to the encrypted common protection key;
obtain the manufacturing protection key using the preconfigured trust anchor data and the preconfigured non-exportable data;
decrypt the encrypted common protection key using the manufacturing protection key to obtain the common protection key;
decrypt the encrypted distribution private key using the common protection key to obtain a distribution private key;
receive, via the communication unit, an encrypted data package including image-at-rest data encrypted with an image-at-rest key, the encrypted data package including encryption data for obtaining the image-at-rest key using the distribution private key; and
install the encrypted data package at the memory.


US Pat. No. 11,113,423

FPGA HARDWARE-BASED SECURE COMPUTING METHOD AND APPARATUS

Advanced New Technologies...


1. A method for processing data based on FPGA hardware, comprising:obtaining, at an FPGA hardware device, encrypted data of at least one participant of a plurality of participants of a secure computing system, wherein the FPGA hardware device stores a plurality of immutable first keys of a plurality of trusted managers, wherein the FPGA hardware device comprises an FPGA chip, and wherein the FPGA chip is configured based on running logic jointly determined by the plurality of trusted managers or by the plurality of participants of the secure computing system to prevent tampering of configuration of the FPGA chip;
decrypting, at the FPGA hardware device and by using at least one dynamic working key of the at least one participant, the encrypted data of at least one participant to obtain plaintext data, wherein each dynamic working key of the at least one dynamic working key is obtained based on a corresponding immutable first key of the plurality of immutable first keys;
performing, at the FPGA hardware device, computing based on the plaintext data to obtain a computing result; and
outputting, at the FPGA hardware device, the computing result.

US Pat. No. 11,113,422

DATA PROTECTION IN COMPUTER PROCESSORS

Micron Technology, Inc., ...


1. A computer system, comprising:a memory configured to store scrambled data;
a processor coupled with the memory, wherein the processor is packaged in an integrated circuit chip; and the memory is separate from the integrated circuit chip, the processor having:a cache;
a register;
an execution unit;
an unscrambler, wherein the processor is configured to load the scrambled data into the cache, wherein the unscrambler is configured to convert the scrambled data in the cache into unscrambled data for the register or the execution unit; and
a scrambler, wherein the scrambler is configured to convert a result of the execution unit into a scrambled form for storing in the cache, the memory, or a storage device;

an external cache coupled between the memory and the processor to cache the scrambled data for the processor; and
a second processor having access to the memory or the cache, wherein the second processor is prevented from accessing a key used by the unscrambler to convert the scrambled data into the unscrambled data.

US Pat. No. 11,113,421

SECURE COMMUNICATIONS IN A BLOCKCHAIN NETWORK

Advanced New Technologies...


1. A computer-implemented method for improving security of a blockchain network, comprising:obtaining, by a first node of the blockchain network, a first certificate authority (CA) trust list comprising a plurality of CA identifiers;
receiving, by the first node from a second node of the blockchain network, a communication request comprising a public key certificate of the second node;
determining, by the first node of the blockchain network, a first CA identifier from the received public key certificate of the second node of the blockchain network;
determining, by the first node of the blockchain network, that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list;
in response to determining that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list, approving, by the first node of the blockchain network, the communication request, comprisingtransmitting, by the first node of the blockchain network and to the second node of the blockchain network, a verification request for the second node to determine whether a second CA identifier corresponding to a public key certificate of the first node matches one of a plurality of CA identifiers included in a second CA trust list of the second node, wherein the verification request comprises the public key certificate of the first node;

determining, by the second node, the second CA identifier from the received public key certificate of the first node;
determining whether the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list of the second node;
in response to determining that the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list, establishing a communication session with the first node; and
in response to determining that the second CA identifier does not match one of the plurality of CA identifiers of the second CA trust list, denying, by the second node, establishment of the communication session with the first node.

US Pat. No. 11,113,420

POLICY BASED CLIPBOARD ACCESS

VMware, Inc., Palo Alto,...


1. A system for providing policy-based access to a clipboard, comprising:a computing device comprising a processor and a memory;
an operating system stored in the memory, the operating system providing the clipboard class, an individual instance of which can be used by a client application executing on the computing device to access a clipboard provided by the operating system of the computing device; and
machine readable instructions stored in the memory that extend the clipboard class and, when executed by the processor, cause the computing device to at least:intercept a request from the client application to access the clipboard, wherein the request comprises data to be stored in the clipboard;
check a permission associated with the client application, wherein the permission is checked by:transmitting a query over a network to a management service, the query including a device identifier assigned to the computing device by the management service, the management service using the device identifier to manage an operation of the computing device; and
receiving a response from management service, the response indicating that the client application is authorized to store the data in the clipboard;

generate encrypted data based on the data received from the client application using a temporary encryption key, wherein the temporary encryption key is generated at a point in time in which the computing device was powered on; and
store the encrypted data in the clipboard.


US Pat. No. 11,113,419

SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS

International Business Ma...


1. A computer-implemented method comprising:identifying a first protected piece from a conversation, wherein the first protected piece corresponds to a portion of the conversation that includes sensitive information;
selecting, from a plurality of types of protection actions, a first type of protection action for the first protected piece, wherein a type of sensitive information associated with the first protected piece and a type of medium in which the protected piece is stored indicates from which of the plurality of types of protection actions to select; and
performing the first type of protection action on the first protected piece to form a modified conversation, wherein the modified conversation is devoid of the sensitive information.

US Pat. No. 11,113,418

DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS FOR CONTINUOUS DATA DEVELOPMENT

International Business Ma...


1. A method for providing de-identified protected health information (PHI) associated with electronic medical records (EMRs) based on a common analysis structure (CAS), the method comprising:generating a first common analysis structure (CAS) for representing the PHI associated with the EMRs, wherein generating the first CAS comprises logically representing unstructured data associated with the EMRs and including the PHI as objects to create an object-based data structure associated with the electronic medical records (EMRs), wherein the objects comprise normalized annotations;
in response to detecting a system event, extracting first CAS data associated with the first CAS from one or more log files, wherein the first CAS data comprises the unstructured data and the normalized annotations based on the objects that are associated with the unstructured data;
obfuscating the unstructured data associated with the first CAS based on the extracted first CAS data; and
generating and providing a second CAS comprising the obfuscated unstructured data and a copied version of the normalized annotations, wherein the copied version of the normalized annotations are correlated with the obfuscated unstructured data.

US Pat. No. 11,113,417

DYNAMIC DATA ANONYMIZATION USING TAINT TRACKING

SAP SE, Walldorf (DE)


1. A computer-implemented method comprising:receiving data from a database of a source;
introducing taint information based upon the source by bundling metadata associated with the data in the database, wherein the taint information comprises,an attribute semantic, and
a data object identifier comprising a row identifier of the database;

storing the taint information;
generating derived data from the data and propagating the taint information with the derived data;
referencing the taint information to perform a security evaluation;
where the security evaluation reveals the source to be a trusted source, flowing the data to a sensitive sink; and
where the security evaluation reveals the source to be an untrusted source,considering the taint information to generate an anonymized data set including at least part of the data, according to an anonymization metric;
storing the anonymized data set; and
communicating the anonymized data set as output, wherein the anonymized data set includes at least a portion of the derived data.


US Pat. No. 11,113,416

APPLICATION PRIVACY SCANNING SYSTEMS AND RELATED METHODS

OneTrust, LLC, Atlanta, ...


1. A computer-implemented data processing method for performing static mobile application privacy analysis, the method comprising:obtaining, by a privacy analysis system, a mobile device application;
determining, by the privacy analysis system, identifying information for the mobile device application;
querying, by the privacy analysis system, a database of application characteristics using the identifying information;
receiving, by the privacy analysis system, a response to the database query comprising an identifier of a software development kit used to generate the mobile device application;
decompiling, by the privacy analysis system, the mobile device application to generate a decompiled mobile device application based at least in part on the software development kit used to generate the mobile device application;
analyzing, by the privacy analysis system, the decompiled mobile device application to determine one or more data types referenced by the decompiled mobile device application;
determining, by the privacy analysis system, that the one or more data types comprise personal data;
at least partially in response to analyzing the decompiled mobile device application, determining, by the privacy analysis system, to perform dynamic privacy analysis of the mobile device application;
responsive to determining to perform the dynamic privacy analysis of the mobile device application, setting, by the privacy analysis system, a dynamic privacy analysis indicator;
determining, by the privacy analysis system, a privacy risk score based at least in part on the response to the database query and the one or more data types referenced by the decompiled mobile device application; and
storing, by the privacy analysis system, the privacy risk score and the one or more data types referenced by the decompiled mobile device application.

US Pat. No. 11,113,415

PRIVACY AND SECURITY OF PERSONAL INFORMATION STORED IN COMMUNICATIVELY CONNECTED AND SYNCHRONIZED DEVICES IN A SHORT-RANGE WIRELESS NETWORK

PRIVACY4CARS, Inc., Kenn...


1. A privacy information cleaning system comprising:a first device that is communicatively coupled to a second device, the first device comprising a privacy information cleaning engine that is configured to:receive, at the first device, a request to clean privacy information of a user that is shared with the second device by the first device and is stored in the second device,
responsively, create and store a backup copy of a data file of the first device that comprises the privacy information of the user that has been shared with and stored in the second device;
delete the data file from the first device;
create a replacement file for the data file that is deleted, wherein data entries in the replacement file are populated with non-sensitive data, and
upload the replacement file to the second device to overwrite the privacy information of the user stored in the second device with the data entries of the replacement file;
responsively, disable radio frequency communication channel that allows the first device to communicate with the second device;
restore the data file in the first device using the backup copy of the data file; and
enable the radio frequency communication channel when the first device is outside a radio range of the second device.


US Pat. No. 11,113,414

METHOD FOR CONFIGURING MOBILE ONLINE SERVICES

VOLKSWAGEN AKTIENGESELLSC...


1. A method for configuring mobile online services for use with a transportation vehicle, the method comprising:defining, by a configuration system, at least two data release classes of a plurality of predetermined data release classes, wherein defining includes assigning data contents to at least one of the at least two data release classes different from data contents assigned to another of the at least two data release classes;
enabling a selection input for a user by the configuration system, by which selection input the user respectively authorizes one or more mobile online services to use the data contents of at least one of the plurality of predetermined data release classes to increase transparency in the data to be released via simple instruction to increase the user's trust;
executing selection, responsive to user input via the selection input, of at least one data release class of the plurality of data release classes for the one or more mobile online services; and
responsive to executed selection, releasing the data contents of the selected data release class for use by the respective mobile online service by the configuration system,
wherein the configuration system comprises at least one of a transportation vehicle-internal man-machine interface and a transportation vehicle-external man-machine interface for providing the selection input for the user of the configuration system, by which the user respectively permits the one or more mobile online services to use the data contents of the selected data release class,
wherein the at least one man-machine interface is implemented using at least one hardware processor.

US Pat. No. 11,113,413

CALCULATING DIFFERENTIALLY PRIVATE QUERIES USING LOCAL SENSITIVITY ON TIME VARIANT DATABASES

IMMUTA, INC., College Pa...


1. A system for enhancing the determination of differential privacy query results, the system comprising:a database;
a result cache;
one or more processors; and
a computer-readable data storage device storing program instructions that, when executed by the one or more processors, cause the system to perform operations comprising:
obtaining a first query of the database;
determining that a specificity of the first query exceeds a specificity threshold;
determining that the result cache lacks any query results of previous queries that are substantially equivalent to the first query;
partitioning the database into a plurality of groups;
determining a query result by executing the first query on the plurality of groups;
determining a sensitivity of the query and a nominal measurement of the query;
determining a noisy result by adding noise to the query result based on the sensitivity of the query and the nominal measurement of the query;
storing the noisy result in the result cache with a hash value generated using the first query, the sensitivity of the query, and the nominal measurement of the query;
providing the noisy result in response to the first query;
determining in response to a subsequent query that the result cache includes query results substantially equivalent to the subsequent query based at least on the hash value; and
providing the noisy result from the result cache in response to the subsequent query.

US Pat. No. 11,113,412

SYSTEM AND METHOD FOR MONITORING AND VERIFYING SOFTWARE BEHAVIOR

TONGJI UNIVERSITY, Shang...


1. A method for monitoring and verifying software behavior, comprising:the method is executed by a processor;
receiving, by a software behavior verification system based on a physical hardware system, legal user behavior data containing user activities performed during legal electronic transactions and storing the legal user behavior data as a software behavior model;
monitoring, by a software behavior monitor, data packets transmitted in a transaction, and sending data packets to the software behavior verification system;
retrieving, by the behavior verification system, expected key sequences and information in the data packets;
comparing, by the behavior verification system, the key sequences and information retrieved from the data packets with that of the software behavior model;
if the key sequences and information retrieved from the data packets does not consistence with the software behavior model, it is determined that the transaction is an illegal electronic transactions, and the transaction is closed;
the software behavior in the software behavior model has behavior logic;
the software behavior in the software behavior model has behavior nodes, wherein the behavior nodes are arranged according to a transaction sequence.

US Pat. No. 11,113,411

AUTHENTICATION SECURITY MODEL FOR A CONTENT MANAGEMENT SYSTEM

Dropbox, Inc., San Franc...


1. A computer-implemented method comprising:storing, by a content management system, credentials for an external user account of a third-party source that is external to the content management system, wherein the credentials are required to display third-party content embedded into a content item stored on the content management system, the credentials are stored in association with the content item;
receiving, from a client device, a request to receive the content item that is associated with a first domain of the content management system;
receiving, from the client device, a request for third-party code based on a portion of the content item, the third-party code associated with a second domain of the content management system;
providing the client device with the third-party code associated with the second domain of the content management system, wherein the third-party code references data associated with the third-party content;
receiving, from the client device, a client request for the data associated with the third-party content embedded into the content item, the data stored at the third-party source;
retrieving the credentials for the external user account from the content management system;
sending, to the third-party source, a proxy-request for the data associated with the external user account, wherein the proxy-request comprises the credentials and parameters associated with the client request;
receiving, from the third-party source, the data associated with the third-party content embedded into the content item, based on confirmation of the credentials of the external user account; and
sending, to the client device, the data for the embedded content to be displayed with the content item.

US Pat. No. 11,113,410

USER CONTROLLED, DECENTRALIZED, DISTRIBUTED, AND SECURE CONTENT DISTRIBUTION

THE UNIVERSITY OF STAVANG...


1. A method for controlling the distribution of a data item using a data set and a blockchain,wherein the data set is stored at a data storage,
wherein the data set comprises a first encrypted data item and a first file identifier paired with the first encrypted data item, and the first encrypted data item has been generated by an encryption of the data item by a first user terminal using a first public key,
wherein the blockchain comprises the first file identifier and a first recipient identifier identifying one or more, or a plurality of, allowed first recipients with access to the data storage and the blockchain, and each allowed first recipients has the first recipient identifier and a first private key matching the first public key, wherein the first file identifier is paired with the first recipient identifier in the blockchain
wherein the method is performed by a second user terminal being an allowed first recipient of the one or more, or the plurality of, allowed first recipients, and the second user terminal has a second public key, and the method comprises:identifying the first file identifier in the blockchain using the first recipient identifier,
sending a request containing the first file identifier to the data storage for a downloading of the first encrypted data item,
receiving the first encrypted data item from the data storage,
decrypting the first encrypted data item using the first private key,
generating a second encrypted data item by an encryption of the decrypted first encrypted data item using the second public key,
generating a second file identifier,
sending the second encrypted data item and the second file identifier to the data storage for an updating of the data set with the second encrypted data item paired with the second file identifier, and
adding the second file identifier and a second recipient identifier to the blockchain, wherein the second recipient identifier identifies, or is associated with, one or more, or a plurality of, allowed second recipients with access to the data storage and the blockchain, and each allowed second recipient has the second recipient identifier and a second private key matching the second public key.


US Pat. No. 11,113,409

EFFICIENT REKEY IN A TRANSPARENT DECRYPTING STORAGE ARRAY

Pure Storage, Inc., Moun...


1. A method, comprising:decrypting, by a processing device of a storage array controller, encrypted write data to be stored at a storage array and encrypting, by the processing device of the storage array controller, read data to be sent by the storage array controller to a client device using a first encryption key;
receiving an instruction to rekey data at the storage array, wherein the instruction identifies first encryption information that identifies the first encryption key and second encryption information that identifies a second encryption key, and;
writing, by the processing device of the storage array controller, metadata that instructs a storage application executed by the processing device of the storage array controller to use the second encryption key to encrypt the data for subsequent read operations and decrypt the data for subsequent write operations.

US Pat. No. 11,113,408

PROVIDING A SECURE OBJECT STORE USING A HIERARCHICAL KEY SYSTEM

Hewlett Packard Enterpris...


9. A computing system comprising:a secure object store comprised of a plurality of data objects residing on a plurality of nodes; and
a hardware processor to execute instructions to implement a hierarchical key structure, wherein the hierarchical key structure includes:a Node Key Encryption Key, wherein the Node Key Encryption Key is associated with a given node of a plurality of nodes; and
a plurality of Data Encryption Keys, each Data Encryption Key corresponding to a respective data object of the plurality of data objects,

wherein the hardware processor to execute the instructions to:generate the plurality of Data Encryption Keys using the Node Key Encryption Key;
encrypt the plurality of data objects using the Data Encryption Keys to provide a plurality of encrypted data objects to be stored on the given node, wherein each data object of the plurality of data objects is encrypted by a respective Data Encryption Key, is associated with a different user of a plurality of users, and contains data representing a level of access of the associated user; and
access an encrypted data object of the plurality of encrypted data objects using the Node Key Encryption Key and a selected Data Encryption Key of the Data Encryption Keys.


US Pat. No. 11,113,407

SYSTEM AND METHODS FOR AUTOMATED DETECTION OF INPUT AND OUTPUT VALIDATION AND RESOURCE MANAGEMENT VULNERABILITY

VIRSEC SYSTEMS, INC., Sa...


1. A computer-implemented method for determining unexpected behavior of a computer routine, the method comprising:analyzing a set of computer routines to identify a given computer routine of the set of computer routines having a vulnerability to unexpected behavior wherein, the identifying includes determining functions and system call sequences used by each thread associated with the set of computer routines to map run time control flow of the set of computer routines and the analysis includes at least one of: (i) performing a simulation to cause at least one failure condition and observing response of at least one computer routine of the set of computer routines to the simulation, (ii) extracting a histogram including a frequency of usage associated with the set of computer routines, (iii) determining size of one or more buffer read or write computer operations associated with the set of computer routines, (iv) determining size of one or more corresponding stacks associated with the set of computer routines, (v) determining size of one or more memory read or write operations based upon examining a corresponding loop size, and (vi) performing a taint analysis of one or more computer routine of the set;
manipulating the given computer routine using a testing technique; and
determining unexpected behavior of the given computer routine based on a result of the manipulating.

US Pat. No. 11,113,406

METHODS AND SYSTEMS FOR DE-DUPLICATION OF FINDINGS

CAPITAL ONE SERVICES, LLC...


1. A system for performing de-duplication of findings, comprising:one or more processors;
a graphical user interface configured for display and operably connected to the one or more processors; and
a memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to:receive, from a first software security analysis tool, a first finding comprising one or more software issues, the first software security analysis tool being a Static Application Security Testing (SAST) tool or a Dynamic Application Security Testing (DAST) tool;
determine a first identifier that identifies the first finding;
store the first finding and the first identifier;
receive, from a second software security analysis tool, a second finding comprising one or more software issues, the second software security analysis tool being a Static Application Security Testing (SAST) tool or a Dynamic Application Security Testing (DAST) tool;
determine a second identifier that identifies the second finding;
determine that the second identifier at least partially matches the first identifier;
appending the first finding to the second finding;
comparing the one or more software issues of the first finding to the one or more software issues of the second finding to determine at least a partial match; and
removing the at least partial match from the first finding.


US Pat. No. 11,113,405

VULNERABILITY ASSESSMENT

Rapid7, Inc., Boston, MA...


1. A method for assessing a vulnerability of a network device, the method comprising:receiving a list of one or more services externally exposed on the network device, including receiving at least one of a port and a protocol associated with each of the one or more externally exposed services;
receiving an indication of at least one vulnerability in at least one software package installed on the network device, wherein contents of the vulnerability indication include a list of services provided by the software package and a list of ports or protocols to which each of the services provided by the software package are bound;
determining that a process is provided by the software package with the at least one vulnerability;
determining whether an externally exposed service of the one or more services externally exposed is associated with the process that is provided by the software package with the at least one vulnerability by matching at least some of the ports or protocols in the contents of the vulnerability indication to the port or protocol associated with the externally exposed service; and
executing at least one remedial action upon determining that the externally exposed service is associated with the process that is provided by the software package with the at least one vulnerability.

US Pat. No. 11,113,404

SECURING OPERATING SYSTEM CONFIGURATION USING HARDWARE

International Business Ma...


1. A method comprising:receiving, from a user application executing under a first operating system configuration on a computing device, a request to execute a second operating system configuration of a set of operating system configurations, wherein the second operating system configuration is signed by a private key of a public-private key pair; and
during a pre-boot state of the computing device:receiving, from a local interface physically coupled to the computing device, a signal confirming the received request;
moving a public key of the public-private key pair to a protected memory in response to receiving the signal confirming the request; and
executing a boot loader having access to the protected memory to authenticate the second operating system configuration using the public key stored in the protected memory, and to boot the second operating system configuration in response to the authenticating.


US Pat. No. 11,113,403

SPLIT CHAIN OF TRUST FOR SECURE DEVICE BOOT

CISCO TECHNOLOGY, INC., ...


1. A method, comprising:by a first processor of a computing device,
obtaining a first input indicating a request to shut down the computing device;
initiating a shutdown mode of the computing device, the shutdown mode comprising:asserting a power-on reset (POR) mode on a second processor to prevent the second processor from executing a boot-up procedure until the first processor has executed a secure chain of trust to boot-up,
validating an image associated with the second processor of the computing device by verifying a signature of the image, wherein the second processor image is stored in a memory location associated with the second processor,
storing results of the validation of the second processor image in a memory location associated with the first processor, and
initiating a low power mode for the computing device;

obtaining a second input indicating a request to power on the computing device;
executing a boot-up procedure for the first processor;
de-asserting the POR mode of the second processor, wherein de-asserting the POR mode of the second processor allows the second processor to execute the secure chain of trust to boot-up;
providing instructions to the second processor to execute the boot-up procedure for the second processor, wherein the instructions comprise instructions to verify a status of the validated second processor image based on the stored validation results; and
when the status indicates that the second processor image is valid, executing, by the second processor, the boot-up procedure, wherein executing the boot-up procedure comprises using the second processor image to initiate an operating system of the computing device.

US Pat. No. 11,113,402

TUNNELING FUNCTIONAL SAFETY COMMUNICATIONS OVER AN ENHANCED SERIAL PERIPHERAL INTERFACE

Intel Corporation, Santa...


1. A system comprising:a vehicle subsystem;
a system on chip (SoC) coupled to the vehicle subsystem, the SoC including a root of trust;
an embedded controller to conduct functional safety operations and non-functional safety operations; and
an enhanced serial peripheral interface (eSPI) coupled to the SoC and the embedded controller, wherein the eSPI is to tunnel communications associated with the functional safety operations between the embedded controller and the root of trust.

US Pat. No. 11,113,401

SECURE BOOTLOADER FOR ELECTRONIC GAMING MACHINES AND OTHER COMPUTING DEVICES

Aristocrat Technologies A...


1. An apparatus comprising:one or more processors;
one or more memory devices; and
one or more non-volatile storage devices, wherein:the one or more non-volatile storage devices are, collectively, partitioned into a plurality of logical disk partitions,
the plurality of logical disk partitions at least includes: (a) one or more operating system partitions and (b) one or more shadow partitions,
the one or more shadow partitions collectively store one or more operating system datasets,
each operating system dataset represents a corresponding set of one or more operating system volumes,
the one or more non-volatile storage devices further store a secure bootloader that is configured to execute in one or more boot modes,
the one or more boot modes include at least a secure boot mode, and
the secure bootloader is configured to, when the secure bootloader is executed in the secure boot mode, cause the one or more processors to:a) select a first operating system dataset of the one or more operating system datasets, wherein the first operating system dataset represents a corresponding first set of one or more operating system volumes,
b) obtain a corresponding one or more reference hash values for the first operating system dataset,
c) authenticate the first operating system dataset using the one or more corresponding reference hash values,
d) create, using the first operating system dataset, each operating system volume in the first set of one or more operating system volumes on a corresponding one of the one or more operating system partitions, and
e) cause a kernel of a first operating system to be loaded into the one or more memory devices from at least one operating system volume of the first set of one or more operating system volumes and to be executed by the one or more processors responsive, at least in part, to a successful authentication of the first operating system dataset in (c) and after each operating system volume in the first set of one or more operating system volumes is created on the corresponding operating system partition of the one or more operating system partitions in (d).



US Pat. No. 11,113,400

SYSTEM AND METHOD FOR PROVIDING DISTRIBUTED COMPUTE PLATFORM ON UNTRUSTED HARDWARE

Virtuozzo International G...


1. A method for providing a secure computing platform on an untrusted computing node, the method comprising:providing a hypervisor on the untrusted computing node;
receiving, by the untrusted computing node, a request generated by a client device to perform a computing function for the client device using hardware of the untrusted computing node;
in response to the received request, creating, an enclave in memory of the untrusted computing node and launching a virtual machine in the memory enclave;performing a chain of trust to verify that the virtual machine is running on a secure computing node and a trusted hypervisor, wherein the chain of trust includes:
verifying, by a BIOS of the untrusted computing node, the hardware of the untrusted computing node and then starting a boot loader;
verifying, by the boot loader, the BIOS and then starting a kernel of an operating system;
verifying, by the kernel, the boot loader, and then starting the hypervisor;
verifying the kernel by the hypervisor running on the kernel, and then creating a virtual machine; and
verifying, security of the untrusted computing node by a guest operating system in the virtual machine; and

performing, by the guest operating system, the computing function using the hardware of the untrusted computing node upon the guest operating system verifying the security of the untrusted computing node.

US Pat. No. 11,113,399

ELECTRONIC APPARATUS AND CONTROL METHOD OF ELECTRONIC APPARATUS

TOSHIBA MEMORY CORPORATIO...


1. An electronic apparatus comprising:a first hardware processor;
a second hardware processor with a security capability higher than a security capability of the first hardware processor;
a first hardware memory that is nonvolatile and configured to store a program which is to be executed by the first hardware processor, the first hardware memory including a first region configured to store the program and a second region configured to store log data of the electronic apparatus;
a second hardware memory that is volatile and configured to store the program, data that is to be referred to by the first hardware processor while the first hardware processor executes the program, and control data indicating whether to permit the log data to be read from the second region; and
a command execution circuit configured to set a specific region of the second hardware memory as an access prohibition region before a rewrite command is executed, the rewrite command requesting to change data in the second hardware memory, the rewrite command including a command configured to change a value of the control data stored in the second hardware memory into a value indicating that the log data is permitted to be read from the second region, the specific region of the second hardware memory including a region configured to store security information of the first hardware processor,
wherein the second hardware processor is configured to authenticate the rewrite command, selectively execute the rewrite command based on the authentication, and execute the rewrite command if the authentication succeeds.

US Pat. No. 11,113,398

DEPLOYMENT OF MACHINE LEARNING MODELS FOR DISCERNMENT OF THREATS

Cylance Inc., Irvine, CA...


1. A method for implementation by one or more data processors forming part of at least one computing device, the method comprising:detecting, by at least one data processor, a mismatch between model-based classifications produced by a first version of a computer-implemented machine learning threat discernment model and a second version of a computer-implemented machine learning threat discernment model for a file, each of the first version of the machine learning threat discernment model and the second version of the machine learning threat discernment model for a file output a respective threat score, wherein the mismatch is based on a difference between the threat scores;
executing or accessing, by at least one data processor, the file in response to the difference between the threat scores being below a pre-defined threshold; and
analyzing, by at least one data processor, the mismatch to determine appropriate handling for the file in response to the threat score being equal to or above a pre-defined threshold including causing information relating to the mismatch to be displayed in a graphical user interface of an electronic visual display.

US Pat. No. 11,113,397

DETECTION OF MALICIOUS EXECUTABLE FILES USING HIERARCHICAL MODELS

Cisco Technology, Inc., ...


1. A method comprising:disassembling, by a device, an executable file into assembly instructions;
mapping, by the device, each of the assembly instructions to a fixed length instruction vector using one-hot encoding and an instruction vocabulary;
forming, by the device, vector representations of blocks of a control flow graph for corresponding functions of the executable file by embedding and aggregating bags of the instruction vectors;
generating, by the device and based on the formed vector representations of the blocks of the control flow graph, a call graph model of the functions in the executable file;
forming, by the device, a vector representation of the executable file based in part on the call graph model; and
determining, by the device and based on the vector representation of the executable file, whether the executable file is malware.

US Pat. No. 11,113,396

DATA MANAGEMENT SYSTEM AND METHOD


9. A digital computer system, comprising:at least one computer readable database configured to maintain a plurality of computer readable nodes; and
at least one computing device, operatively connected to the at least one computer readable database, configured to:
receive an EDI (Electronic Data Interchange) digital record data payload including an originating node attribute, a security ranking index attribute and at least one data element associated with a computer readable record;
electronically sample the EDI digital record data payload including the at least one data element and determining a value of the security ranking index attribute;
electronically process an injectable tracking attribute into the EDI digital record data payload;
electronically route the EDI digital record data payload including the originating node attribute, the injectable tracking attribute and the at least one data element associated;
electronically extract the injectable tracking attribute to determine a designation network location; and
electronically transmit the designation network location associated with the injectable tracking attribute to the originating data communication network and determining a security-at-risk network from a virtual network mesh.

US Pat. No. 11,113,395

SYSTEM AND METHOD FOR ANOMALY AND CYBER-THREAT DETECTION IN A WIND TURBINE

General Electric Company,...


1. A system to protect a wind turbine from a cyber attack at a physical domain level of the wind turbine, comprising:a plurality of monitoring nodes each generating a series of current monitoring node values over time that represent a current operation of the wind turbine; and
an abnormality detection computer platform, coupled to the plurality of monitoring nodes, to:receive the series of current monitoring node values and generate a set of current feature vectors,
access an abnormality detection model having a plurality of decision boundaries created using wind information along with at least one of a set of normal feature vectors and a set of abnormal feature vectors for each of the monitoring nodes, wherein the abnormal feature vectors are generated from abnormal monitoring node values over time that represent a cyber-attack on the wind turbine at the physical domain level of the monitoring nodes resulting in the abnormal monitoring node values,
for each of the monitoring nodes, select one of the decision boundaries based on current wind information associated with the wind turbine,
execute the abnormality detection model and transmit an abnormality alert signal based on the set of current feature vectors and the selected decision boundary, the alert signal generating an automatic response to a cyber-attack; and

wherein the abnormality detection model includes a below-rated normal power production decision boundary and an above-rated normal power production decision boundary, and said selection is based at least in part on a current wind speed and a threshold value associated with the wind turbine reaching its rated power.

US Pat. No. 11,113,394

DATA TYPE RECOGNITION, MODEL TRAINING AND RISK RECOGNITION METHODS, APPARATUSES AND DEVICES

Advanced New Technologies...


1. A data type recognition method for recognizing data as first-type data or second-type data, wherein the method comprises:acquiring data to be recognized, and using a preset anomaly detection model to detect whether the data to be recognized is first-type data; and
inputting other data than the first-type data recognized by the anomaly detection model, into a classification model for recognition, wherein the classification model classifies the other data as first-type data and second-type data,
wherein the anomaly detection model is a first machine learning model and obtained by pre-training based on a first sample data set, and the classification model is a second machine learning model and obtained by pre-training based on a second sample data set different from the first sample data set; and
the pre-training of the classification model comprises:
detecting, by the anomaly detection model, an abnormal sample data set from the second sample data set;
optimizing the abnormal sample data set based on a feature optimization algorithm; and
using the optimized abnormal sample data set to train the classification model.

US Pat. No. 11,113,393

PROVIDING SECURITY FEATURES IN WRITE FILTER ENVIRONMENTS

Dell Products L.P., Roun...


1. A method, performed by a security client on a computing device, for providing security features in a write filter environment that includes a protected I/O stack on which a write filter is loaded to prevent modification to artifacts on a protected volume and an unprotected I/O stack by which the write filter enables excluded artifacts to be modified, the method comprising:receiving, at a minifilter of the security client that is loaded on the unprotected I/O stack, an I/O request;
determining, by the minifilter, whether the I/O request is a reparsed I/O request or a direct I/O request;
when the minifilter determines that the I/O request is a reparsed I/O request, allowing the I/O request to be passed down the unprotected I/O stack; and
when the minifilter determines that the I/O request is a direct I/O request, blocking the I/O request.

US Pat. No. 11,113,392

EXECUTABLE BINARY CODE INSERTION

RUNSAFE SECURITY, INC., ...


1. A method for modifying an executable software file, the method comprising:receiving an existing executable software file;
receiving a new loadable section for an executable segment of software to be added to the existing executable software file;
copying content of a section header string table in the existing executable software file into a new section header string table for which memory has been allocated;
adding a new section name for the new loadable section into the new section header string table;
writing the new loadable section to an end of the existing executable software file;
copying content of a section header table in the existing executable software file into a new section header table and adding a new section entry data for the new loadable section into the new section header table and writing the new section header table into the existing executable software file;
copying content of a program header table in the existing executable software file into a new program header table and adding a new segment entry data for the executable segment into the new program header table and writing the new program header table into the existing executable software file;
returning a virtual address and a file offset for the executable segment added to the existing executable software file to create a new executable software file.

US Pat. No. 11,113,391

METHOD AND COMPUTER SYSTEM FOR PREVENTING MALICIOUS SOFTWARE FROM ATTACKING FILES OF THE COMPUTER SYSTEM AND CORRESPONDING NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM

INDUSTRIAL TECHNOLOGY RES...


1. A method for preventing malicious software from attacking files of a computer system, the method comprising:checking whether a file type of a specific file corresponding to an input/output (I/O) request is a to-be-backed-up file type, wherein the to-be-backed-up file type belongs to one of multiple predetermined file types susceptible to malicious software attack;
checking a backup already tag in a file context tag structure of the specific file when the file type of the specific file is the to-be-backed-up file type; and
performing a backup process for the specific file when the backup already tag shows that the specific file has not been backed up.

US Pat. No. 11,113,390

SECURE EXECUTION OF A USER DEFINED FUNCTION

Snowflake Inc., Bozeman,...


1. A system comprising:at least one hardware processor; and
a memory storing instructions that cause the at least one hardware processor to perform operations comprising:
receiving, in a first computing process, a user defined function, the user defined function including code related to at least one operation to be performed;
sending a request based at least in part on the at least one operation to a second computing process to perform;
determining, by a security manager executing within the second computing process, whether performing the at least one operation is permitted, the security manager determines restrictions, based at least in part on a security policy, on operations executing within a sandbox environment provided by the second computing process;
performing, in the second computing process, the at least one operation, the security manager executing within the second computing process; and
sending, by the second computing process, a result of the at least one operation to the first computing process, wherein sending, by the second computing process, the result of the at least one operation utilizes a data transport mechanism that supports a network transfer of columnar data, the columnar data is transferred without memory copying or serialization.

US Pat. No. 11,113,389

SYSTEMS AND METHODS FOR PROVIDING PERSISTENT VISUAL WARNINGS FOR APPLICATION LAUNCHERS

NortonLifeLock Inc., Tem...


1. A computer-implemented method for providing persistent visual warnings for an application launcher, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:loading, by the computing device, the application launcher into a sandbox;
monitoring one or more functions of an application launched from the sandbox from the application launcher;
querying a malware detection manager using information obtained from monitoring the one or more functions of the application to determine whether the application is potentially harmful;
modifying, based on determining that the application is potentially harmful, an icon for the application to notify a user that the application is potentially harmful;
monitoring one or more functions of a different application launched from the sandbox from the application launcher;
determining, using information obtained from monitoring the one or more functions of the different application, that an attribute of the different application has exceeded a threshold;
modifying, based on determining that the attribute of the different application has exceeded the threshold, an icon for the different application to notify the user that the different application has exceeded the threshold; and
in response to determining that the attribute of the different application no longer exceeds the threshold, restoring the icon of the different application to an original state.

US Pat. No. 11,113,388

CLOUD FORENSICS AND INCIDENT RESPONSE PLATFORM


1. A computer-implemented method for performing cloud forensics and incident response, the computer-implemented method comprising:intercepting, by a cloud incident response module (CIRM), communication between a virtual machine (VM) and a hypervisor; and
extracting, by the CIRM, data from the communication between the VM and the hypervisor according to a forensic policy,
wherein intercepting and the extracting are transparent to the VM and to the hypervisor,
wherein the intercepting and the extracting are performed without knowledge of the VM and of the hypervisor, and
wherein the intercepting and the extracting are performed independent of the VM.

US Pat. No. 11,113,387

METHOD AND APPARATUS FOR IMPROVING SECURITY OF JAVA SANDBOX

Alibaba Group Holding Lim...


1. A method for improving security of a Java sandbox, comprising:performing a permission check on a to-be-checked code;
determining whether a method bypassing the permission check exists in a call stack of the code;
in response to the method bypassing the permission check existing, determining whether methods in the call stack have a signature; and
processing the to-be-checked code based on the determination whether the methods in the call stack have the signature, wherein processing the to-be-checked code comprises:
in response to a determination that methods in the call stack have the signature, determining whether a depth of a method corresponding to the signature is greater than a depth of a privileged method, and
in response to a determination that the depth of the method corresponding to the signature is not greater than the depth of the privileged method, determining that the to-be-checked code has a security problem,
wherein processing the to-be-checked code further comprises:acquiring preset calling information from a policy file in response to the methods having the signature,
determining whether calling information of the methods in the call stack is the same as the preset calling information, and
determining that the to-be-checked code has a security problem in response to the calling information of the methods in the call stack not being the same as the preset calling sequence.


US Pat. No. 11,113,386

INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...


1. An information processing apparatus that is capable of connecting to an external device, comprising:a controlling unit configured to control power supply to the external device;
a storing unit configured to store firmware of the external device;
a transferring unit configured to transfer the firmware to the external device at a predetermined timing; and
a detecting unit configured to detect alteration of the firmware stored in the storing unit, wherein
in a case where the alteration of the firmware is detected by the detecting unit, the controlling unit is configured to cause the transferring unit to not transfer the firmware to the external device and stop the power supply to the external device.

US Pat. No. 11,113,385

COMMUNICATING TRACE INFORMATION BETWEEN SECURITY ZONES

PayPal, Inc., San Jose, ...


1. A method comprising:running, in a first security zone of a computer system, a first portion of an application, wherein a second portion of the application runs in a second security zone, wherein the first security zone is a secure zone of the computer system and the second security zone is a public cloud computing platform;
storing, in the first security zone, trace information generated from running the first portion of the application;
generating, in the first security zone, filtered trace information by removing specified information from the trace information, wherein the specified information is a subset of information in the trace information that is identified for filtering prior to the trace information being generated;
storing, in a particular storage location within the first security zone, the filtered trace information;
running, in the first security zone, an adapter application executable to access the particular storage location within the first security zone and to call a second security zone, wherein second trace information is generated from running the second portion of the application and is stored in a datastore of the second security zone;
transmitting, from the first security zone to the datastore of the second security zone using the adapter application, the filtered trace information, wherein the filtered trace information and second trace information are useable by a trace analysis tool running outside the first security zone;
wherein communication between the first security zone and the second security zone is one-way from the first security zone to the second security zone;
receiving, from the trace analysis tool, a trace analysis of the filtered trace information and the second trace information; and
based on the trace analysis, generating a trace analysis report for the application indicative of a reliability of the first portion of the application and the second portion of the application.

US Pat. No. 11,113,384

STACK OVERFLOW PROTECTION BY MONITORING ADDRESSES OF A STACK OF MULTI-BIT PROTECTION CODES

STMICROELECTRONICS (ROUSS...


1. A hardware monitor circuit, comprising:an electronic control circuit configured to be coupled to a processing unit, the electronic control circuit being configured to generate multi-bit protection codes and to direct operations of the hardware monitor circuit;
a bus interface coupled to an address bus of the processing unit, the bus interface configured to pass signals associated with a stack structure of the processing unit, the electronic control circuit being configured to store the multi-bit protection codes in at least one internal memory of the electronic control circuit and to control insertion of the multi-bit protection codes into the stack structure of the processing unit;
a plurality of comparators arranged to accept values from the at least one internal memory; and
gating logic coupled to the plurality of comparators, the gating logic arranged to generate an error signal upon detection of an address on the address bus read via the bus interface being equal to an address stored in the at least one internal memory, wherein the error signal forces the processing unit into a secure mode, wherein in response to a multi-bit protection code erase request by the processing unit or by a program executed by the processing unit, the hardware monitor electronic circuit is configured to:read an erase request multi-bit protection code in the stack structure at an address specified by the multi-bit protection code erase request;
compare the erase request multi-bit protection code with an expected multi-bit protection code value; and
generate the error signal when the erase request multi-bit protection code is different from the expected multi-bit protection code value.


US Pat. No. 11,113,383

PERMITTING LOGIN WITH PASSWORD HAVING DYNAMIC CHARACTER(S)

Lenovo (Singapore) Pte. L...


1. At least a first device, comprising:at least one processor; and
storage accessible to the at least one processor and comprising instructions executable by the at least one processor to:
present a graphical user interface (GUI) on a display, the GUI comprising a prompt instructing a user to select one or more preestablished parameters to use that correspond to respective dynamic characters that are to form part of a password to permit a login via the first device, the GUI listing at least two preestablished parameters that are each respectively selectable from the GUI to establish the respective preestablished parameter selected from the GUI as a preestablished parameter to use for the password;
receive password input;
determine whether the password input indicates at least one predetermined character and at least one dynamic character that conforms to at least one preestablished parameter selected from the GUI; and
responsive to a determination that the password input indicates the at least one predetermined character and at least one dynamic character that conforms to the at least one preestablished parameter selected from the GUI, permit a login via the first device.

US Pat. No. 11,113,382

VEHICLE NETWORK SYSTEM WHOSE SECURITY IS IMPROVED USING MESSAGE AUTHENTICATION CODE

PANASONIC INTELLECTUAL PR...


1. A vehicle network system employing a controller area network protocol, the vehicle network system comprising:a bus;
a first electronic control unit connected to the bus; and
a second electronic control unit connected to the bus,
wherein the first electronic control unit performs operations includingtransmitting, via the bus, one data frame including an identifier, the identifier being data in the one data frame that indicates a position of different data in the one data frame, the different data being used for a calculation for obtaining a message authentication code indicating authenticity of transmission content,

wherein the second electronic control unit performs operations includingreceiving the one data frame transmitted via the bus,
selecting the different data used for the calculation for obtaining the message authentication code in accordance with the identifier included in the one data frame, and
verifying the message authentication code using the selected different data,

wherein the identifier indicates an area in a data field of the one data frame, the different data being stored in the area of the data field, and
wherein each of the identifier and the different data is in the data field of the one data frame.

US Pat. No. 11,113,381

PROVIDING AN AUGMENTED REALITY OVERLAY TO SECURE INPUT DATA

Capital One Services, LLC...


1. A device, comprising:one or more memory devices; and
one or more processors, operatively coupled to the one or more memory devices, to:receive first information indicating that the device is in communication with an automated teller machine (ATM) device;
cause an augmented reality (AR) overlay to be displayed, by the device, based on receiving the first information,the AR overlay including second information related to authenticating a user to the ATM device,
the AR overlay being displayed to overlay an image of a touch capacitive screen of the ATM device, and
the AR overlay displaying buttons, over the image of the touch capacitive screen, of one or more of varying sizes, of varying shapes, or at varying locations of the touch capacitive screen;

determine whether the user interacts with the ATM device using the touch capacitive screen after causing the AR overlay to be displayed; and
perform an action related to one or more of the second information, the ATM device, or the AR overlay based upon determining whether the user interacted with the ATM device.


US Pat. No. 11,113,380

SECURE GRAPHICS

IRDETO B.V., Hoofddorp (...


1. A computer-implemented method of obtaining a user input, comprising:providing access to video content, the video content representing a user interface including a plurality of elements for selection by a user;
playing a first portion of the video content to the user;
detecting a first user interaction occurring in response to the played first portion of the video content; and
determining a first element selected by the user based on one or more properties of the detected first user interaction;
wherein the video content represents rotation of a wheel of graphical elements, the plurality of elements including the graphical elements.

US Pat. No. 11,113,379

UNLOCKING METHOD AND VIRTUAL REALITY DEVICE

GOERTEK TECHNOLOGY CO., L...


1. An unlocking method, applied to a virtual reality device, comprising:displaying A candidate icons, by the virtual reality device, the A candidate icons comprising M password icons related to latest operations; wherein the A candidate icons are displayed in a scene created by the virtual reality device, and the M password icons related to the latest operations are determined according to an operation order;
acquiring, by the virtual reality device, in response to an operation of selecting an unlocking icon from the A candidate icons, a selected unlocking icon; and
performing, by the virtual reality device, an unlocking operation of the virtual reality device according to the selected unlocking icon, the M password icons related to the latest operations and an order of the selecting the unlocking icon matching an operation order of the selected unlocking icon;

wherein A and M are integers, and A is larger than M, andwherein a method of generating the M password icons related to the latest operations comprises:acquiring, by the virtual reality device, a task list of a system;
determining, by the virtual reality device, a corresponding operation order according to execution time of tasks in the task list, to determine M latest operations; and
generating, by the virtual reality device, the M password icons related to the latest operations according to the M latest operations;
wherein the M password icons related to the latest operations have a one-to-one correspondence with icons of the M latest operations.


US Pat. No. 11,113,378

CONTENT-BASED AUTHENTICATION

Lenovo (Singapore) Pte. L...


1. A method comprising:selecting a plurality of content categories from a set of content categories, wherein one of the selected content categories is an image category and at least one of the selected content categories is a non-image category;
presenting, to a user of a device, a plurality of content items that are identified as being familiar to an actual user of the device and a plurality of comparable items that are identified as being unfamiliar to the actual user of the device, wherein each of the content items and each of the comparable items corresponds to the selected plurality of content categories;
receiving a plurality of responses at the device from the user after the presenting; and
determining a number of correct responses from the plurality of responses, wherein an authentication of the user is based on the number of correct responses.

US Pat. No. 11,113,377

AUTHENTICATION SYSTEM, AND INFORMATION RECORDING MEDIUM

Passlogy, Co., Ltd.


1. An authentication system for a server to determine whether or not to permit a sign-in to the server to which a site seed not opened to public is assigned via an access terminal using a token terminal, the system configured to:(1) enable a user of the token terminal to register the server in the token terminal by:(a) enabling the token terminal to have specified access information to sign-in to the server, and enabling the token terminal to transmit the specified access information to a management device;
(b) applying, via the management device, a first function to at least the transmitted access information and the site seed assigned to the server, thereby obtaining a user seed with respect to the server, and transmitting the obtained user seed to the token terminal; and
(c) recording, via the token terminal, the transmitted user seed, thereby registering the server in the token terminal; and

(2) enable the user to attempt a sign-in to the server via the access terminal using the token terminal in which the server is registered by:(d) enabling the token terminal to obtain a share seed independently obtained from the server with respect to the attempted sign-in, and shared with the server, apply a second function to at least the obtained share seed and the recorded user seed, thereby obtaining a key code, and present the obtained key code to the user;
(e) receiving, via the access terminal, the presented key code by the token terminal to the user, and transmitting, to the server, a request that specifies the received key code; and
(f) receiving, via the server, the transmitted request, obtaining access information relating to the received request, applying the first function to at least the obtained access information and the site seed assigned to the server, thereby obtaining a checkup seed, obtaining a share seed independently obtained from the token terminal with respect to the attempted sign-in, and shared by the token terminal, applying the second function to at least the obtained shared seed and the obtained checkup seed, thereby obtaining a checkup code, and setting a necessary condition to permit the sign-in relating to the request via the access terminal in which the received key code and the obtained checkup code are consistent with each other.


US Pat. No. 11,113,376

DETECTION SYSTEM, FINGERPRINT SENSOR, AND METHOD OF FINGER TOUCH AUTHENTICATION THEREOF

NOVATEK Microelectronics ...


1. A method of finger touch authentication for an electronic device comprising a fingerprint sensor comprising a fingerprint sensing array and a processing device coupled to the fingerprint sensing array of the fingerprint sensor and a memory device for storing a program code for instructing the processing device to perform finger touch authentication and for storing registered data of a user, the registered data comprising a registered pattern and a registered fingerprint, the method comprising configuring the processing device according to the program code stored in the memory device to perform the following steps:obtaining a fingerprint of the user sensed by the fingerprint sensing array of the fingerprint sensor;
obtaining a plurality of touch operations sensed by the fingerprint sensing array of the fingerprint sensor when the fingerprint is sensed by the fingerprint sensing array;
obtaining a pattern of the plurality of touch operations;
comparing the fingerprint with the registered fingerprint stored in the memory device to generate a first comparison result;
comparing the pattern with the registered pattern stored in the memory device to generate a second comparison result; and
controlling an electronic device to perform a corresponding operation according to both the first comparison result and the second comparison result.

US Pat. No. 11,113,375

ELECTRONIC DEVICES WITH PROXIMITY AUTHENTICATION AND GAZE ACTUATION OF COMPANION ELECTRONIC DEVICES AND CORRESPONDING METHODS

Motorola Mobility LLC, C...


1. A wearable electronic device, comprising:one or more processors identifying one or more companion electronic devices operating within a wireless communication radius of the wearable electronic device;
one or more sensors identifying the wearable electronic device being within a predefined distance of a companion electronic device of the one or more companion electronic devices; and
a wireless communication circuit responsive to the one or more processors, the wireless communication circuit delivering an authentication credential to the companion electronic device in response to the one or more sensors identifying that the wearable electronic device is within the predefined distance of the companion electronic device;
the one or more sensors thereafter detecting a gaze of an authorized user of the wearable electronic device being directed at the companion electronic device; and
the wireless communication circuit delivering an actuation command to the companion electronic device in response to the one or more sensors detecting that the gaze of the authorized user is directed at the companion electronic device.

US Pat. No. 11,113,374

MANAGING SEAMLESS ACCESS TO LOCKS WITH PERSON/HEAD DETECTION

CARRIER CORPORATION, Pal...


1. A method of managing seamless access to locks, the method comprising:receiving, at a mobile device, signals from a plurality of access control devices, each access control device including a camera sensor, and each signal comprising an identifier of a sending access control device and a status of a region of interest of the camera sensor of the sending access control device;
determining that the mobile device comprises a credential that is authorized to unlock the plurality of access control devices;
determining, based on the signal, whether a person is in the region of interest of the camera sensor of one of the plurality of access control devices and moving towards the one of the plurality of access control devices; and
transmitting a request, to the one of the plurality of access control devices and not to any other of the plurality of access control devices, to unlock the one of the plurality of access control devices based on determining that a person is in the region of interest of the camera sensor of the one of the plurality of access control devices and moving towards the one of the plurality of access control devices, the request including the credential,
wherein the receiving and transmitting are via a short-range wireless communication interface that is initiated in response to the mobile device being within a transmission range of transceivers on the plurality of access control devices.

US Pat. No. 11,113,373

UNLOCKING ELECTRONIC DEVICES USING TOUCH-BASED SENSORS

Hewlett-Packard Developme...


1. An electronic device comprising:a touch-based sensor;
a proximity sensor; and
a processor to:determine, based on output from the proximity sensor, whether the electronic device is in an enclosed space;
in response to determining that the electronic device is in the enclosed space, activate a count-based unlocking process that comprises:counting a number of multiple touches of the touch-based sensor,
determining, based on the counting, whether a specified number of the multiple touches of the touch-based sensor has been detected by the touch-based sensor, and
in response to determining that the specified number of the multiple touches of the touch-based sensor has been detected by the touch-based sensor, unlock the electronic device that is determined to be in the enclosed space; and

in response to determining that the electronic device is not in the enclosed space, activate a different unlocking process that comprises:unlocking the electronic device determined to not be in the enclosed space in response to a single touch of the touch-based sensor.



US Pat. No. 11,113,372

DELAYED TWO-FACTOR AUTHENTICATION IN A NETWORKED ENVIRONMENT

Google LLC, Mountain Vie...


1. A system to authenticate computing devices in a networked environment, comprising:a data processing system comprising one or more processors and memory, the one or more processors executing a natural language processor component, a content selection component, and an authorization component to:receive, by the natural language processor component, an input audio signal detected by a sensor at a first client device;
parse, by the natural language processor component, the input audio signal to identify a request for content in the input audio signal;
select, by the content selection component, a first digital component based at least on the request for content;
determine, by the authorization component, based on a context of a second client device, a time delay within which the first client device is to be authorized;
set, by the content selection component, a length for a first portion of the first digital component based on prior authorization of the first client device;
transmit, by the content selection component and to the first client device, the first portion of the first digital component to present for the length;
transmit, by the authorization component, an authorization request to the second client device to cause the second client device to render a prompt to authorize, with the authorization component of the data processing system, a transmission of a second portion of the first digital component to the first client device in response to detection of an action on the prompt at the second client device within the time delay;
receive, by the authorization component, a confirmation message generated by the second client device in response to the detection of the action on the prompt at the second client device within the time delay; and
transmit, by the content selection component, the second portion of the first digital component to the first client device for presentation with the first portion of the first digital component, responsive to receipt of the confirmation message.


US Pat. No. 11,113,371

CONTINUOUS AUTHENTICATION BASED ON MOTION INPUT DATA

BEHAVIOSEC INC, San Fran...


1. A method of determining a timestamp of a keydown action of a touchscreen of a device, based on the following steps, in order:receiving, from said device, a first timestamp of a key-up action of a particular key displayed on said touchscreen at first location coordinates;
retrieving time and coordinate data comprising at least pairs of location coordinates and associated timestamps of previously-recorded touch sensor readings on said touchscreen from said device, wherein said previously recorded touch sensor readings are from a time before said first timestamp;
retroactively determining that a second timestamp of a key-down action of said particular key corresponding to said key-up action has not been received from said device;
comparing first location coordinates of said particular key displayed on said touchscreen with said retrieved time and coordinate data of said previously recorded touch sensor readings on said touchscreen;
based on said comparing, obtaining from said previously-recorded touch sensor readings a third timestamp associated with second location coordinates of a first touch on said touchscreen, wherein said third timestamp is proximate to said first timestamp and said second location coordinates match said first location coordinates of said particular key;
using said third timestamp to obtain said second timestamp of said particular key; and
comparing said second timestamp and said first timestamp of said particular key with other inputs obtained from said device or another device;
wherein said other inputs comprise timestamps of key-up and key-down actions of said particular key obtained from said device or said another device; and
wherein said another device comprises a device which has non-touchscreen or touchscreen inputs.

US Pat. No. 11,113,370

PROCESSING AUTHENTICATION REQUESTS TO SECURED INFORMATION SYSTEMS USING MACHINE-LEARNED USER-ACCOUNT BEHAVIOR PROFILES

Bank of America Corporati...


1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:receive, via the communication interface, from an account portal computing platform, a first authentication request corresponding to a request for a first user of a first client computing device to access one or more secured information resources associated with a first user account in a first client portal session;
based on receiving the first authentication request from the account portal computing platform, capture one or more behavioral parameters associated with the first client computing device;
authenticate the first user of the first client computing device to the first user account based on the one or more behavioral parameters associated with the first client computing device and one or more authentication credentials associated with the first authentication request;
based on authenticating the first user of the first client computing device to the first user account, generate one or more authentication commands directing the account portal computing platform to allow access to the one or more secured information resources associated with the first user account in the first client portal session;
send, via the communication interface, to the account portal computing platform, the one or more authentication commands directing the account portal computing platform to allow access to the one or more secured information resources associated with the first user account in the first client portal session;
after sending the one or more authentication commands directing the account portal computing platform to allow access to the one or more secured information resources associated with the first user account in the first client portal session, capture first activity data associated with one or more interactions in the first client portal session; and
update a first behavioral profile associated with the first user account based on the first activity data associated with the one or more interactions in the first client portal session.


US Pat. No. 11,113,369

INFORMATION PROCESSING APPARATUS, AUTHENTICATION SYSTEM, AND METHOD OF DELETING CARD INFORMATION

Ricoh Company, Ltd., Tok...


1. An information processing apparatus configured to communicate with an electronic apparatus to perform authentication of users for the electronic apparatus comprising:a processor configured to manage card-related information relating to cards used by the users for the authentication by,
acquiring identification information of the cards,
storing, in a memory of the information processing apparatus, the identification information of respective ones of the cards and timestamps in association with each other in response to authentication of the respective ones of the cards,
storing, in the memory, card management information that associates, for each of the users, the identification information of the cards with identification information of a respective one of the users who owns the cards,
storing, in the memory, user information that associates, for each of the users, the identification information of the respective one of the users with a set maximum number of cards that the respective one of the users can own,
determining that one or more of cards are expired cards in response to the timestamps of the respective ones of the cards indicating that a predetermined time period has passed since the authentication of the respective ones of the cards,
identifying, from the user information, the identification information of the respective one of the users associated with the expired cards,
determining whether a number of cards associated with the respective one of the users associated with the expired cards exceeds the set maximum number of cards that the respective one of the users can own based on the card management information and the user information, and
deleting, from the memory of the information processing apparatus, the card-related information associated with the identification information of a number of the expired cards such that the number of the cards of the respective one of the users associated with the expired cards does not exceed the set maximum number of cards that the respective one of the users can own.

US Pat. No. 11,113,368

METHOD AND ELECTRONIC DEVICE FOR CONTROLLING PERMISSION OF APPLICATION PROGRAM

Samsung Electronics Co., ...


1. An electronic device comprising:a housing;
a touchscreen display;
a wireless communication circuit;
a processor electrically connected to the touchscreen display and the wireless communication circuit; and
a memory electrically connected to the processor, wherein the memory is configured to store an application program comprising a user interface, and store an instruction that, when executed, enables the processor to:store a permission for accessing, by an application program stored in the memory, at least one among hardware components or software components of the electronic device according to a background state or a foreground state of the application program;
classify the permission to correspond to at least one of a normal permission and a dangerous permission based on the at least one among the hardware components or the software components to which the permission allows access;
receive an access request for the hardware or software components;
operate a first activity of the application program while the application program is in the foreground state;
convert the application program from the foreground state to the background state while the first activity is being operated;
identify an acquisition request from the application program for the permission;
based on identifying that the application program is executed in the background state, the permission is classified as the dangerous permission, and the permission is not used for the first activity, prevent the application program from using the permission; and
based on identifying that the application program is executed in the background state, the permission is classified as the dangerous permission, and the permission is used for the first activity, allow use of the permission to access the at least one hardware components or software components.


US Pat. No. 11,113,366

CRYPTOGRAPHIC MECHANISMS FOR SOFTWARE SETUP USING TOKEN-BASED TWO-FACTOR AUTHENTICATION

INFOSYS LIMITED, Bangalo...


1. A method comprising;receiving, by a computing device, a request for software authentication from a client machine of a software subscriber;
distributing, by the computing device, an electronic license between a software vendor and the client machine of the software subscriber based on the received request for the software authentication, wherein the electronic license comprises software responsive to the request and a token configured to interact with an authentication engine at the client machine for one or more validation checks;
generating, by the computing device, a license key in response to a received notification of the validation of the token by the authentication engine at the client machine; and
distributing, by the computing device, the generated license key to the client machine of the software subscriber, wherein the distributed license key is configured to initiate enablement of the software at the client machine.

US Pat. No. 11,113,365

SYSTEM AND METHOD TO LIMIT CONTENT DISTRIBUTION

ARRIS Enterprises LLC, S...


1. A method of selectively providing media program assets to a plurality of devices, each device disposed in only one of a plurality of service regions and having access to only one of a plurality of digital rights management (DRM) service instances, the method comprising:grouping the media program assets into a plurality of asset groups, each respective asset group having same required security capability (RSC), wherein each of the plurality of media program assets is uniquely associated with a media key that is required to decrypt the media program asset associated with the media key;
assigning one of a plurality of distribution range values to each of the plurality of asset groups;
processing the media program assets so that each media program asset in a respective asset group is decryptable only by use of the media key associated with that media program asset; and
hierarchically migrating only authorized asset groups from an originating DRM service instance across the other of the plurality of DRM service instances according to the distribution range value respectively assigned to each of the plurality of asset groups, wherein each of the plurality of DRM service instances serves devices disposed in only one of the service regions and is associated with only one of the plurality of distribution range values for each asset group.

US Pat. No. 11,113,364

TIME SERIES DATA ANALYSIS CONTROL METHOD AND ANALYSIS CONTROL DEVICE

Hitachi, Ltd., Tokyo (JP...


1. An analysis control device that controls an analysis based on time series data of each of a plurality of sensors corresponding to a plurality of components that constitute a target device, the analysis control device comprising:a storage unit including one or more memories; and
a processor unit including one or more processors connected to the storage unit, wherein
the processor unit is configured to:(A) acquire a sensor data set belonging to an analysis target time zone among the time series data of each of the plurality of sensors,each sensor data set including a measurement value that is a value measured by a sensor corresponding to the sensor data set,

(B) calculate, for each of the plurality of sensors, an evaluation value according to a simple evaluation by using two or more sensor data sets corresponding to the sensor among the plurality of sensor data sets belonging to the analysis target time zone, and
(C) set an execution order of the analysis based on the measurement value of the sensor within a restricted time corresponding to the analysis target time zone in a descending order of the evaluation value calculated in (B).


US Pat. No. 11,113,363

INDOOR EVENT DETECTION SYSTEM AND METHOD

WISTRON NEWEB CORPORATION...


1. An indoor event detection system, comprising:a transmitter disposed at a first position in an indoor space, including a first antenna having a transmitting direction; and
a receiver disposed at a second position in the indoor space, including:
a second antenna communicating with the transmitter based on a line of sight link between the transmitter and the receiver covering an area to be detected in the indoor space, wherein the transmitter is configured to send a probe signal toward the transmitting direction, and the receiver is configured to receive the probe signal;
a processor; and
a memory storing first event channel state information (CSI) and a first eigenvalue range obtained from the first event CSI;
wherein the processor is configured to detect whether an event associated to the indoor space is occurred by performing the following steps:
obtaining a current CSI from the probe signal;
obtaining an amplitude matrix by extracting a plurality amplitudes of a plurality of sub-carriers from the current CSI;
applying a statistical operation on the amplitude matrix to obtain a statistical matrix;
obtaining a plurality of eigenvalues from the statistical matrix;
obtaining a current eigenvalue statistical value according to the plurality of eigenvalues; and
determining whether the current eigenvalue statistical value is within the first eigenvalue range,
wherein when the current eigenvalue statistical value is within the first eigenvalue range, a first event associated with the indoor space is determined to be occurred,
wherein the statistical operation includes performing a covariance operation on the amplitude matrix to obtain a current covariance matrix as the statistical matrix,
wherein obtaining the plurality of eigenvalues from the statistical matrix includes:
obtaining a diagonal eigenvalue matrix from the current covariance matrix; and
sorting elements of the diagonal eigenvalue matrix, according to magnitudes of the elements, to obtain a sorted eigenvalue matrix, wherein elements of the sorted eigenvalue serve as the plurality of eigenvalues.

US Pat. No. 11,113,362

MULTICOMPONENT MODEL PARAMETERISATION

Malvern Panalytical Limit...


1. A method of estimating a diffusion coefficient or hydrodynamic radius of a sample by:performing a Taylor dispersion analysis, wherein performing the Taylor dispersion analysis comprises:flowing a carrier solution through a capillary;
injecting a sample fluid into the capillary to form a sample plug or a sample front;
determining Taylorgram data by measuring absorbance over time at a detector as the sample plug or sample front flows past the detector; and

using a computer to fit a multi-component Taylorgram model to the Taylorgram data g(t) obtained from the sample, the Taylorgram data comprising a multi-component Taylorgram peak or front at t=tr; the method comprising:
evaluating a value of an integration or a differential of the data;
determining the diffusion coefficient or hydrodynamic radius of a component of the multi-component Taylorgram model, based on an analytical expression that includes the value of the integral or differential of the data, the diffusion coefficient or hydrodynamic radius corresponding with a physical property of a component of the sample from which the Taylorgram data was obtained;
determining a maximum value, w, of a differential of the data,





and a value t? corresponding with the maximum value, w; anddetermining the diffusion coefficient or hydrodynamic radius from the values w, t? and tr.

US Pat. No. 11,113,361

ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF

SAMSUNG ELECTRONICS CO., ...


1. An electronic apparatus, comprising:a storage configured to store object data and kernel data; and
a processor comprising a plurality of processing elements arranged in a matrix formation,
wherein the processor is configured to:input corresponding first elements, among a plurality of first elements included in the object data, respectively into processing elements arranged in a first row among the plurality of processing elements,
input a plurality of second elements, included in the kernel data, sequentially into the processing elements arranged in the first row to perform operations between the corresponding first elements and the plurality of second elements,
compare, through a logic circuit included in each of the processing elements arranged in the first row, the corresponding first elements and the plurality of second elements input to the processing elements arranged in the first row by depth, the corresponding first elements and the plurality of second elements are composed of an equal number of plural depths,
identify a depth among the plural depths in which a first element and a second element, among the compared corresponding first elements and the plurality of second elements input to the processing elements arranged in the first row, have a non-zero value, and

input the first element and the second element corresponding to the identified depth into a calculator included in each of the processing elements arranged in the first row to perform a convolution operation,
wherein the processor is further configured to:based on operations with respect to an input second element, among the plurality of second elements, being completed in the processing elements arranged in the first row, input another second element, among the plurality of second elements, into the processing elements arranged in the first row;
based on operations with respect to the input plurality of second elements being completed in the processing elements arranged in the first row, compare, through a logic circuit included in each of processing elements arranged in a second row, a corresponding first elements, among the plurality of first elements, and the plurality of second elements respectively input to the processing elements arranged in the second row by depth;
identify a depth in which a first element and a second element, among the compared corresponding first elements and the plurality of second elements input to the processing elements arranged in the second row, have a non-zero value; and
input the first element and the second element corresponding to the identified depth, among the compared corresponding first elements and the plurality of second elements input to the processing elements arranged in the second row, into a calculator included in each of the processing elements arranged in the second row to perform a convolution operation.


US Pat. No. 11,113,360

PLANT ABNORMALITY PREDICTION SYSTEM AND METHOD


1. A system for predicting plant abnormality, the system comprising:a computer processor configured to:receive a plurality of tags from a plant under operation;
calculate a correlation coefficient for each of two tags among the plurality of tags, the two tags among the plurality of tags being randomly set for input to the computer processor as by an operator unfamiliar with the system;
determine a relevant tag for each tag of the plurality of tags by comparing the correlation coefficient with a reference value, the relevant tag determined by extracting a primary tag for each tag of the plurality of tags and extracting a secondary tag for each tag of the plurality of tags, the extracted primary tag being a tag wherein an absolute value of the correlation coefficient is less than a first upper limit and is not less than a first lower limit;
remove tags from the extracted primary tag for each tag, the removed tags including at least one tag among the secondary tags; and
determine one or more among the plurality of tags as an independent tag based on the relevant tag,
wherein the relevant tags determined by the relevant tag determining are a final set of tags in which some tags have been removed from the extracted primary tag for each tag, the final set of tags determined byspecifying a relevant tag for each tag of the plurality of tags, the specified relevant tags having had tags removed from the extracted primary tag,
specifying a count of the relevant tags, and
determining a specific tag as the independent tag when the count of the relevant tags of the specific tag is less than a specific percentage relative to an entire number of tags, and

wherein the computer processor is further configured to perform k-NN-based prediction by using as an input the relevant tags for the specific tag determined as the independent tag.


US Pat. No. 11,113,359

METHOD AND SYSTEM FOR NAVIGATION CONTROL

OPEN TEXT CORPORATION, W...


1. A non-transitory computer readable medium for navigation control storing therein computer readable program code, the computer readable program code comprising instructions for:providing a navigation trigger as a user selectable user interface component of a first page of a web application, the navigation trigger including navigation trigger code, the navigation trigger code including an expression within the navigation trigger code, the expression specifying a first data source and an operation to perform and defining a target page to select from a set of possible target pages based on performing the operation;
receiving an event of the navigation trigger based on a user interaction with the navigation trigger while the first page is displayed;
in response to the event, executing the navigation trigger code, said executing the navigation trigger code comprising:gathering first data from the first data source specified in the expression; and
evaluating the expression, evaluating the expression comprising performing the operation using the first data to select a second page from the set of possible target pages; and

requesting the second page from a server as a next immediate page after the first page.

US Pat. No. 11,113,358

TRAINING AND SUPPORT OVERLAY MACHINE


1. A programmed computer, comprising:a display;
a processor is programmed to:display a page on the display, where the page includes a plurality of different fields, each of the plurality of different fields being selectable, and each of the plurality of different fields requiring a response from a user,
include a first control which is selected to switch between a first mode in which a viewer of the page sees the page and also views the plurality of different fields and in the first mode, the viewer is prompted to enter data in the plurality of different fields, and a second help mode in which the viewer of the page receives item specific help when the user selects a specific field, where the item specific help is for the specific field that is selected, and where each of the plurality of different fields includes a help item for that field, and
include a second control which is selected to enter an administrative mode, in which an administrator enters information that will be displayed to a user accessing the page, where the administrative mode includes, for each of the plurality of different fields, data indicative of information to be shown to the user when that field is selected by the user,
where, in the administrative mode, the administrator is prompted to optionally assign process numbers to each of the plurality of different fields, to define an ordered list based on the assigned process numbers, wherein the ordered list representing an order of operations in which the plurality of different fields must be filled in, and
enforce the order of operations in which the plurality of different fields on the page are filled in according to the ordered list, and no enforcement on fields with no assigned process numbers.


US Pat. No. 11,113,357

METHOD AND SYSTEM FOR ONBOARDING A VIRTUAL NETWORK FUNCTION PACKAGE UTILIZED BY ONE OR MORE NETWORK SERVICES

INFOSYS LIMITED, Bangalo...


1. A method for onboarding a Virtual Network Function (VNF) package utilized by one or more network services, comprising:receiving an identification of a version of the VNF package;
performing one or more validations on the VNF package, and uploading the VNF package when the one or more validations are successfully performed;
executing a precertification by mapping a set of identifiers to the uploaded VNF package; and
executing a certification by initiating the one or more network services and certifying the VNF package based on setting up monitoring using the mapped identifiers;
wherein a rollback validation is executed to delete the uploaded VNF package when the performing one or more validations fail and a rollback certification is executed to remove configurations and the monitoring when the executing the certification fails.

US Pat. No. 11,113,356

CAPTURING AND MANAGING KNOWLEDGE FROM SOCIAL NETWORKING INTERACTIONS

Airbnb, Inc., San Franci...


1. A system for capturing and managing knowledge from social networking interactions comprising:a presenting engine, comprising memory, to:present a marking element in a social networking interaction wherein:said marking element is a visual interface element that allows a user to mark a message of the social networking interaction with at least one of a question specifier and an answer specifier;
said question specifier indicates that the user found a message to include a question; and
said answer specifier indicates that the user found a message to include an answer;

a creating engine, comprising memory, to create a knowledge element in response to a user specifying a message of said social networking interaction to be a question and specifying another message of said social networking interaction to be an answer; and
a storing engine, comprising memory, to store said knowledge element in a catalog of knowledge elements.


US Pat. No. 11,113,355

NETWORK SERVER AND METHOD FOR PROVIDING WEBPAGE TO USER TERMINAL

NHN CORPORATION, Gyeongg...


1. A network server for providing a webpage through communication with a user terminal over a network, comprising:a webpage provider configured to provide to the user terminal the webpage including a first region and a second region, which are arranged in a first direction, in response to a request from the user terminal, wherein the first region includes pieces of first content arranged in a second direction crossing the first direction, and the second region includes pieces of second content arranged in the second direction;
a user monitor configured to detect an action of the user terminal associated with at least one of the pieces of first content; and
a content selector configured to:
search for pieces of third content related to the at least one of the pieces of first content, associated with the action of the user terminal detected by the user monitor, among the pieces of first content stored in a database, and
in response to a user input scrolling the second region along the second direction crossing the first direction, arrange the searched pieces of third content related to the at least one of the pieces of first content, associated with the action of the user terminal detected by the user monitor, next to the pieces of second content with respect to the second direction crossing the first direction and in the scrolled second region of the webpage.

US Pat. No. 11,113,354

METHOD AND APPARATUS FOR MANAGING REGION TAG

ALIBABA GROUP HOLDING LIM...


1. A method for managing a region tag, comprising:acquiring region identifier information of a geographic region;
acquiring an attribute evaluation tag of the geographic region by a user whose geographic position is in the geographic region and a time identifier of the attribute evaluation tag, and scoring the attribute evaluation tag to obtain a score of the attribute evaluation tag, wherein the score of the attribute evaluation tag comprises a ratio of a number of the attribute evaluation tag to a total number of all attribute evaluation tags;
integrating the region identifier information, the attribute evaluation tag, and the time identifier thereof into a region tag of the geographic region;
clustering one or more region tags to generate a region time period tag of the geographic region for a time period based on that each of the one or more region tags comprises the region identifier information of the geographic region and a time identifier within the time period, wherein the region time period tag of the geographic region for the time period corresponds to a function attribute of the geographic region for the time period; and
outputting one or more region time period tags of the geographic region for one or more time periods, respectively.

US Pat. No. 11,113,353

VISUAL PROGRAMMING FOR ITERATIVE MESSAGE PROCESSING SYSTEM

Splunk Inc., San Francis...


1. A method comprising:providing a graphical interface to receive user input to program operation of an iterative message processing system by specifying a series of modules and interconnections between individual modules within the series, wherein the series includes a beginning module designating a source messaging system, an ending module designating a destination messaging system, and one or more additional modules, wherein the individual modules of the one or more additional modules designate a manipulation of messages on the iterative message processing system, and wherein the interconnections designate a routing of messages on the iterative message processing system;
receiving specification of the series of modules and the interconnections; and
configuring the iterative message processing system according to the series of modules and the interconnections, wherein configuring the system according to an individual module of the one or more additional modules causes the system to retrieve a message from a preceding module designated by a source interconnection for the individual module, process the message according to the manipulation designated by the individual module to result in a manipulated message, and pass the manipulated message to a destination module designated by a destination interconnection for the individual module.

US Pat. No. 11,113,352

ADJUSTING SYSTEM ACTIONS, USER PROFILES AND CONTENT IN A SOCIAL NETWORK BASED UPON DETECTED SKIPPED RELATIONSHIPS

International Business Ma...


1. A computer-implemented method executed automatically by a social network application running on a hardware processor, the method comprising:detecting absence of connection acceptance by a plurality of users in a computer-implemented social networking system despite repeated recommendations by the social network application to connect;
correlating patterns of the absence of connection acceptance of the plurality of users;
clustering the plurality of users with common patterns of absence of connection acceptance into a cluster of users;
determining a cause of a skipped relationship, the cause of the skipped relationship including a reason as to why at least one of the plurality of users has intentionally skipped accepting a connection request; and
applying the determined cause to a user in the cluster with a confidence value according to cluster membership strength associated with the user in the cluster, the applying including at least updating the cluster of users,
responsive to detecting a new connection, which breaks the determined cause of a skipped relationship, by the user in the cluster, discarding the new connection as an outlier in the patterns based the confidence value.

US Pat. No. 11,113,351

AGGREGATED SEARCH ENGINE QUERY ANALYSIS

TD Ameritrade IP Company,...


1. A system comprising:memory hardware; and
processor hardware configured to execute code stored by the memory hardware, the code implementing:a data acquisition module configured to:acquire data from a plurality of sources of search query data via a communications network, wherein the data indicates searches performed at a plurality of search engines; and
identify a set of search terms from the data;

a count determining module configured to determine a number of times each of the identified set of search terms was searched and to generate a search count for each of the identified set of search terms;
a classification module configured to classify, based on predetermined criteria, the searches for the identified set of search terms as being active or passive;
a weight determining module configured to:assign weights according to predetermined rules to each of the searches based on whether each of the searches is active or passive, where an active search is assigned a greater weight than a passive search; and
generate weighted search counts by multiplying the search counts with respective weights;

a score generating module configured to generate a score for a first search term from the identified set of search terms as a ratio of a sum of the weighted search counts for the first search term to an average of previously generated weighted search counts for the first search term accumulated over a period of time, wherein the score indicates an interest level in the first search term; and
a query processing module configured to, in response to receiving a query for a current assessment for the first search term via the communications network:obtain the current assessment for the first search term;
obtain the score for the first search term from the score generating module; and
send a response to the query via the communications network,
wherein the response includes the score for the first search term and the current assessment for the first search term.



US Pat. No. 11,113,350

SYSTEMS AND METHODS FOR ADMINISTRATING SUGGESTED MERCHANDISING ARRANGEMENTS


1. A method, comprising:receiving, by a processing system including a processor, a description of a product, the description including a text description and a visual description, the text description including a fillable blank portion;
determining, by the processing system, attributes of the product based on the description;
obtaining, by the processing system responsive to input from equipment of an end user, end user information regarding a behavior history and a language history of the end user, the input comprising a query regarding the product;
repeatedly modifying, by the processing system in accordance with the end user information, the description resulting in a plurality of modified product descriptions, the modifying comprising:assigning relative weights to the respective attributes of the product,
selecting attributes of the product according to the relative weights,
identifying text regarding the selected attributes of the product, based on natural language processing (NLP) of the text description and the language history of the end user,
adding the identified text to the text description to fill the blank portion,
arranging the text description as one or more blocks of text, and
determining a presentation arrangement of the blocks of text and the visual description;

presenting, by the processing system, the plurality of modified product descriptions at the equipment of the end user in a rotation;
determining, by the processing system for each of the plurality of modified product descriptions, a relative effectiveness in engaging attention of the end user, based on end user behaviors responsive to the presenting; and
updating, by the processing system, the end user information in accordance with the end user behaviors.

US Pat. No. 11,113,349

COHORT SERVICE

Microsoft Technology Lice...


1. A computer implemented method comprising:in an online connection system, detecting a request for recommendations with respect to a first member represented by a first member profile, the request received from a client application executing at a client system associated with the first member;
from the client application, receiving information indicating a viewing context associated with the detected request, the viewing context indicating a first attribute value of a member with whom the first member has recently established a connection via the online connection system;
at a server system, fetching a first plurality of candidate member profiles for providing to the first member as connection recommendations, each candidate member profile in the first plurality of candidate member profiles having a member profile indicating the first cohort attribute value;
ranking the first plurality of candidate member profiles using a machine learning model;
selecting a first cohort of member profiles from the first plurality of candidate member profiles based on the ranking; and
causing display of a reference one or more references to one or more member profiles in the first cohort of member profiles on a display device associated with the first member.

US Pat. No. 11,113,348

DEVICE, SYSTEM, AND METHOD FOR DETERMINING CONTENT RELEVANCE THROUGH RANKED INDEXES


1. A computer-implemented method of remotely identifying and retrieving at least one content article from a computer network, determining and ranking said content article based on relevance within the computer network, and generating a searchable database of ranked content, comprising the following steps:a. identifying at least one social profile;
b. identifying at least one social indicator associated with the at least one social profile;
c. assigning the at least one social profile to a user;
d. categorizing, indexing, and adding to a generated interest graph at least one interest associated with the user;
e. categorizing, indexing, and adding to a generated knowledge graph at least one area of knowledge associated with the user;
f. estimating and assigning an expertise value to the user;
g. estimating and assigning an insider knowledge value to the user
h. generate at least one meta profile assigned to at least one user, comprising the expertise indicator, the at least one interest, and the at least one knowledge topic;
i. generate a database comprising an entry for the at least one meta profile, the at least one meta profile further comprising: the expertise indicator, at least one expertise indicator, the knowledge indicator, at least one interest, at least one knowledge topic, and the at least one social profile;
j. generate an index in the database comprising an entry for at least one topic;
k. identify at least one content article associated with at least one topic;
l. identify a number of meta profiles mentioning the content article;
m. generate an expertise weight indicator assigned to the content article;
n. generate a content total score indicator based on the number of meta profiles mentioning the content article and the expertise weight indicator, the content total score indicator being assigned to the content article; and
o. generate a list including the at least one content article, with the list configured with a ranking order based on content total score.

US Pat. No. 11,113,347

METHOD AND SYSTEM FOR PROVIDING ORGANIZED CONTENT

BEIJING PARTICLE INFORMAT...


1. A method, implemented on a machine having at least one processor, storage, and a communication platform connected to a network for providing content to a user, the method comprising:obtaining information related to a user;
determining one or more channels for the user from a plurality of channels based on the information, wherein each of the plurality of channels includes one or more online content items;
establishing a personal interest space associated with the user based on the information related to the user and the one or more channels;
obtaining dynamic information associated with the user, wherein the dynamic information includes at least information related to interactions of the user with online content;
updating the personal interest space based on the dynamic information; and
providing content in the one or more channels to the user based on the updated personal interest space.

US Pat. No. 11,113,346

SEARCH MEDIA CONTENT BASED UPON TEMPO

Spotify AB, Stockholm (S...


1. A media system, comprising:a media-playback device including:a media-output device that plays media content items;
wherein the media-playback device is configured to:select media content items for playback during a repetitive-motion activity by sorting a universe of media content into buckets of tempos, and subsequently selecting the media content items from a bucket associated with a cadence of the repetitive-motion activity, the bucket generated by:
filtering media content according to the repetitive-motion activity;
placing each media content item from the filtered media content into two or more pools of media content, the two or more pools comprising:a first pool including media content that is from the filtered media content for the repetitive-motion activity and that a user has previously listened to using the media system; and
a second pool including media content that is from the filtered media content for the repetitive-motion activity, and that the user has not previously listened to using the media system and is related to the media content in the first pool; and

filling the bucket with media content selected from each of the two or more pools of media content, the selected media content having a range of tempos associated with the cadence, and wherein filling the bucket with media content from each of the two or more pools of media content includes:filling the bucket with media content from the first pool;
determining whether a threshold amount of media content from the first pool is reached; and
when the threshold amount of media content from the first pool is reached, filling the bucket with media content from the second pool.