US Pat. No. 10,691,937

METHOD AND SYSTEM FOR DETERMINING STRUCTURAL BLOCKS OF A DOCUMENT

Wipro Limited, Bangalore...

1. A method of determining structural blocks of a document, the method comprising:extracting, by a document analysis device, a plurality of text lines from the document;
generating, by the document analysis device, a feature vector for each of the plurality of text lines by determining a set of feature values for a set of corresponding features in each of the plurality of text lines;
determining, by the document analysis device, at least one dominant feature from among the set of corresponding features and at least one corresponding dominance factor, for each of a plurality of structural classes, based on the feature vector for each of the plurality of text lines;
deriving, by the document analysis device, a set of rules for classification of the plurality of text lines into the plurality of structural classes, wherein each of the set of rules correspond to one of the plurality of structural classes and is based on the at least one dominant feature and the at least one corresponding dominance factor for that class; and
determining, by the document analysis device, a structural block tag for each of the plurality of text lines based on the set of rules.

US Pat. No. 10,691,936

COLUMN INFERENCER BASED ON GENERATED BORDER PIECES AND COLUMN BORDERS

KONICA MINOLTA LABORATORY...

1. A method for processing an electronic document (ED) to infer columns in the ED, wherein the ED comprises a plurality of characters, the method comprising:generating a mark-up version of the ED comprising text-layout attributes of the characters in the ED, wherein
the characters are grouped into a plurality of paragraphs based on the text-layout attributes, and
each of the plurality of paragraphs corresponds to a paragraph bounding box surrounding a corresponding paragraph;
generating a plurality of border pieces by initiating a pair of left scan and right scan from each of the plurality of paragraph bounding boxes to identify any adjacent paragraph bounding box, at least one scan of the left scan and the right scan being initiated from said first one of the two adjacent paragraph bounding boxes to reach a second one of the two adjacent paragraph bounding boxes, wherein at least one border piece of the plurality of border pieces comprises:
a white space separating two adjacent paragraph bounding boxes of the plurality of paragraph bounding boxes in the horizontal direction;
a horizontal dimension equaling a separation between the two adjacent paragraph bounding boxes;
a vertical dimension equaling a height of a first one of the two adjacent paragraph bounding boxes;
a direction of said at least one scan of the left scan and the right scan; and
generating, based at least on the plurality of border pieces, a plurality of column borders for use in inferring the columns in the ED,
wherein at least one column comprises a vertically aligned portion of the plurality of paragraphs.

US Pat. No. 10,691,935

APPARATUS FOR PROVIDING GRAPHIC EFFECT OF HANDWRITING INPUT AND METHOD THEREOF

Samsung Electronics Co., ...

1. A method for applying a graphic effect in an electronic device, the method comprising:identifying a stroke constituting a character based on an input sensed through a display of the electronic device;
displaying the identified stroke through the display;
identifying a language corresponding to the identified stroke;
identifying a variation value for a graphic effect of the displayed stroke based on a complexity of the identified language; and
wherein the variation value represents one of a time interval ranging from a time point at which the stroke is displayed to a time point at which the graphic effect is applied and a time interval ranging from a time point at which the graphic effect is applied to a time point at which the graphic effect is completely applied.

US Pat. No. 10,691,934

REAL-TIME VISUAL FEEDBACK FOR USER POSITIONING WITH RESPECT TO A CAMERA AND A DISPLAY

iProov Limited, London (...

1. A method of determining whether a user of a user device is present, the method comprising:capturing real-time video imagery of the user with a built-in camera of the user device;
while capturing the real-time video imagery, tracking a motion of the user device using data captured by at least one of an accelerometer and a gyroscope built into the user device; and
using at least one of a processor of the user device and a remote server in data communication with the user device to:
detect changes in the captured real-time imagery;
compute a comparison of the detected changes in feature locations in the captured real-time imagery with geometrically determined changes in feature locations, wherein the geometrically determined changes in feature locations are a consequence of a changing geometric relationship between features of a static three-dimensional human head and an imaging viewpoint that is moving in accordance with the tracked motion of the user device; and
use the comparison as a basis for determining whether a user depicted in the real-time imagery is not a real user physically present within a field of view of the camera while the real-time video imagery was captured.

US Pat. No. 10,691,933

USING CLOSED CIRCUIT CAMERAS FOR EMERGENCY SERVICES

CA, Inc., New York, NY (...

1. A method by a computer of a computing system having a plurality of camera sensors, the method comprising:identifying a first gesture input event detected by a camera sensor of the plurality of camera sensors, each camera sensor routing video captured by the camera sensor to a data storage system, the first gesture input event being identified as corresponding to a defined attention-based gesture performed by a user;
determining a time the first gesture input event was identified;
fetching video stored in the data storage system using the time that is determined as a pointer;
transmitting an indication of the first gesture input event and the video that is fetched towards an emergency call center.

US Pat. No. 10,691,932

SYSTEMS AND METHODS FOR GENERATING AND ANALYZING USER BEHAVIOR METRICS DURING MAKEUP CONSULTATION SESSIONS

PERFECT CORP., New Taipe...

1. A method implemented in a server device, comprising:detecting initiation of a video conferencing session between a consultation device utilized by a makeup professional and a client device utilized by a user receiving a makeup consultation from the makeup professional;
extracting data from the client device during the video conferencing session, the data characterizing behavior of the user performed on the client device with respect to suggested cosmetic effects transmitted by the makeup professional via the consultation device to the client device;
applying weight values to the extracted data;
generating one or more hesitation metrics based on the weight values; and
causing the one or more hesitation metrics to be displayed in a user interface on the consultation device.

US Pat. No. 10,691,931

SENSOR-BASED ENVIRONMENT FOR PROVIDING IMAGE ANALYSIS TO DETERMINE BEHAVIOR

Toshiba Global Commerce S...

1. A computer-implemented method for use with an environment divided into a plurality of regions, the computer-implemented method comprising:acquiring, using one or more visual sensors disposed within the environment, first image information indicative of a first person in the environment, wherein the one or more visual sensors are operatively connected to one or more computer processors;
identifying, based on image analysis performed on the first image information by the one or more computer processors, a first behavior of the first person within the environment, wherein the first behavior relates to a first item in the environment, wherein the first item is selected from a purchasable item and a purchased item;
determining a time at which the first behavior is performed;
determining location information for the first person within the environment;
determining a first region, of the plurality of regions, corresponding to the location information; and
providing, to the first person, assistance relating to the first item, by performing a first responsive action by one or more modules, wherein the first responsive action is determined based on at least (i) the first behavior, (ii) the time relative to one or more time-of-day criteria, and (iii) the first region;wherein the one or more modules are configured such that, responsive to the first behavior being performed at a different time or in a different region, no responsive action or a second responsive action is performed by the one or more modules.

US Pat. No. 10,691,930

IMAGE BASED USER IDENTIFICATION ACROSS MULTIPLE ONLINE SYSTEMS

Facebook, Inc., Menlo Pa...

12. A method comprising:receiving, from a third party system by an online system, a photo of a user of the third party system, wherein the third party system is independently operating from the online system;
applying, by the online system, a trained identity mapping model to predict a degree of a match between the user of the third party system and the user of the online system based on the photo of the user of the third party system and a profile photo of the user of the online system; and
responsive to the degree of the match satisfying a threshold condition, providing for display, by the online system, a content item targeting the user of the online system, the content item selected at least in part based on information associated with the user of the third party system, wherein the third party system and the online system do not share identity information of their users prior to satisfaction of the threshold condition by the degree of the match.

US Pat. No. 10,691,929

METHOD AND APPARATUS FOR VERIFYING CERTIFICATES AND IDENTITIES

Alibaba Group Holding Lim...

1. A computer-implemented method for verifying authenticity of an image, comprising:identifying a baseline image depicting a baseline background, wherein the baseline background is an area of the baseline image other than an area occupied by a card;
identifying a comparison image depicting the card;
identifying a comparison background in the comparison image, wherein the comparison background is an area of the comparison image other than an area occupied by the card;
determining a probability that the baseline background matches the comparison background;
determining that the probability satisfies a verification threshold; and
in response to determining that the probability satisfies a verification threshold, determining that the comparison image was acquired by capturing an image of a physical card corresponding to the card depicted in the comparison image.

US Pat. No. 10,691,928

METHOD AND APPARATUS FOR FACIAL RECOGNITION

Baidu Online Network Tech...

1. A method for recognizing a face, comprising:acquiring a to-be-recognized image;
inputting the to-be-recognized image into a pre-trained first convolutional neural network to obtain complete facial feature information and partial facial feature information, the first convolutional neural network being used to extract a complete facial feature and a partial facial feature; and
inputting the complete facial feature information and the partial facial feature information into a pre-trained second convolutional neural network to obtain a facial recognition result, the second convolutional neural network being used to represent a correlation between the facial recognition result, and the complete facial feature information and the partial facial feature information,
wherein the method is performed by at least one processor.

US Pat. No. 10,691,927

IMAGE DEFORMATION PROCESSING METHOD AND APPARATUS, AND COMPUTER STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A method comprising:positioning facial feature base points in a face image of an obtained image;
obtaining a deformation template, the deformation template carrying configuration reference points and configuration base points;
determining, in the facial feature base points, a current reference point corresponding to the configuration reference point, and a to-be-matched base point corresponding to the configuration base point;
determining that a location that corresponds to the configuration base point and that is in a to-be-processed image is a target base point, the configuration base point and the target base point forming a mapping point pair; and
mapping a to-be-processed image point to a corresponding target location base on a location relationship between the target base point and the to-be-matched base point, and a location relationship between the mapping point pair and the to-be-processed image point.

US Pat. No. 10,691,926

SINGLE-PIXEL SENSOR

ANALOG DEVICES, INC., No...

1. A sensor for detecting an object; the sensor comprising:a light source arranged to emit a light pulse to illuminate a face of the object, wherein the light pulse has a duration of less than 5 nanoseconds;
a diffuser to diffuse the light pulse across the face of the object;
a photo detector arranged to detect light from the light pulse reflected from the object's face to generate a one-dimensional time-based reflection signal representative of properties of the object's face;
a recognition processor arranged to receive the time-based reflection signature and to recognize the object in dependence on the time-based reflection signature, wherein the recognition processor is to store object-specific one-dimensional time-based signal trace data against which the time-based reflection signature is compared to recognize the object; and
a processor arranged to receive signals representative of the one-dimensional time-based reflection signal and to generate a time-based reflection signature for the object in dependence thereon;
wherein the object-specific one-dimensional time-based signal trace data comprises respective sets of samples of respective object-specific time-based signal traces that are to be captured during a training phase, and the recognition processor is to interpolate between the set of samples to recreate the object-specific time-based signal traces to match against.

US Pat. No. 10,691,925

ENHANCED FACE-DETECTION AND FACE-TRACKING FOR RESOURCE-LIMITED EMBEDDED VISION SYSTEMS

AltumView Systems Inc., ...

1. A computer-implemented method for identifying near-duplicate face images and selectively transmitting best-pose-face images to a server, the method comprising:receiving a determined best-pose-face image associated with a tracked face when the tracked face is determined to be lost;
extracting an image feature from the best-pose-face image;
computing a set of similarity values between the extracted image feature and each of a set of stored image features in a feature buffer, wherein the set of stored image features are extracted from a set of previously transmitted best-pose-face images;
determining if any of the computed similarity values is above a predetermined threshold; and
if no computed similarity value is above the predetermined threshold,
transmitting the best-pose-face image to a server; and
storing the extracted image feature into the feature buffer.

US Pat. No. 10,691,924

BIOLOGICAL INFORMATION DETECTION DEVICE AND BIOLOGICAL INFORMATION DETECTION METHOD

Hitachi, Ltd., Tokyo (JP...

1. A biological information detection device comprising:a camera that images reflected light from a person and outputs a video signal comprised of a plurality of video frames;
a memory; and
a processor that is communicatively coupled the camera and the memory, wherein the processor is configured to:
receive a first video frame of the video signal from the camera,
separate the first frame into Red, Green and Blue (RGB) signals by applying a spatial filter,
convert the RGB signals into a Hue signal (H), a Saturation signal (S), and Value signal (V),
determine a number of pixels in the first video frame that contain a skin color based on the Hue signal, the Saturation signal, and the Value signal, wherein a respective pixel contains the skin color when the respective pixel has respective Hue, Saturation, and Value parameters within a predetermined range stored in the memory,
calculates a magnitude of a difference between the hue signal and a prior hue signal stored in the memory, wherein the prior hue signal was derived from a prior video frame of the video signal,
calculate a wavelength difference value by dividing the magnitude of the difference by the number of pixels in the first video frame that contain the skin color,
and
detects a pulse of the person by comparing the wavelength difference calculated with a prior wavelength difference stored in the memory, wherein the prior wavelength difference was calculated based on the prior video frame.

US Pat. No. 10,691,923

FACE ANTI-SPOOFING USING SPATIAL AND TEMPORAL CONVOLUTIONAL NEURAL NETWORK ANALYSIS

Intel Corporation, Santa...

1. An apparatus for authenticating a facial image, the apparatus comprising:a facial image detector;
a spatial convolutional neural network score generator to generate a first score for one or more detected facial images from the facial image detector, wherein the first score comprises a first two-dimensional vector;
a temporal convolutional neural network score generator to generate a second score for detected facial video frames from the facial image detector, wherein the second score comprises a second two-dimensional vector; and
an overall spatial-temporal score generator to generate a combined spatial-temporal score, based on a combination of the first and second scores, to determine whether a detected facial image gains user access to a protected resource, wherein the combined spatial-temporal score comprises a third two-dimensional vector that includes a first element and a second element, the first element indicative of a probability of the detected facial images as being attributable to an authorized user that can access the protected resource, and the second element indicative of a probability of the detected facial images as being attributable to an unauthorized user that cannot access the protected resource;
wherein user access to the protected resource is provided in response to the first element being greater than the second element, and user access to the protected resource is denied in response to the first element being less than the second element.

US Pat. No. 10,691,922

DETECTION OF COUNTERFEIT ITEMS BASED ON MACHINE LEARNING AND ANALYSIS OF VISUAL AND TEXTUAL DATA

ACCENTURE GLOBAL SOLUTION...

1. A system for counterfeit detection, comprising:one or more data stores that store and manage data within a network;
one or more servers that facilitate operations using information from the one or more data stores;
a machine learning processing system that communicates with the one or more servers and the one or more data stores in the network to provide counterfeit detection of a protected product, the machine learning processing system comprising:
a data access interface that receives product data associated with the protected product from the one or more data stores or from a user device, wherein the product data comprises multimodal data that describes the protected product;
a search term generator that generates search terms based on the received product data, wherein the search term generator uses a translator to convert the generated search terms into one of English language or a non-English natural language used by at least one web source;
a processor that identifies one or more potential counterfeit items from at least one web source based on the generated search terms and the received product data associated with the protected product by:
using a crawling technique to obtain data associated with similar products from the at least one web source;
identifying at least one match for similar products based on the crawling technique wherein the at least one match includes at least a target image with an image of the protected product;
creating an extracted image including the protected product by cropping the target image;
translating textual data associated with the at least one match for similar products to a user language that is different from the natural language used by the at least one web source; and
using image processing data from the extracted image and analysis of the textual data to determine if the at least one match for similar products comprises at least one or more potential counterfeit items;
a report generator to generate a report comprising the identified one or more counterfeit items; and
an output interface to transmit the report with the identified one or more counterfeit items to the one or more data stores or the user device.

US Pat. No. 10,691,921

DISPLAY DEVICE

LG Display Co., Ltd., Se...

1. A display device comprising:an electroluminescence display panel including a display area configured to display an image, the display area including a first area and a second area that is distinct from the first area, the first area for sensing a finger print and displaying the image, and the second area for displaying the image but not for sensing the fingerprint;
an ultrasonic fingerprint sensor under the electroluminescence display panel and in the first area of the display area but not in the second area of the display area, the ultrasonic fingerprint sensor configured to sense the fingerprint in the first area of the display area;
an impact mitigating layer in the second area of the display area but not in the first area of the display area and configured to absorb impacts or pressure to the display device, the impact mitigating layer under the electroluminescence display panel and at least partially surrounding the ultrasonic fingerprint sensor such that a gap is formed between the impact mitigating layer and the ultrasonic fingerprint sensor;
a shielding layer between the electroluminescence display panel and the ultrasonic fingerprint sensor and the impact mitigating layer that are under the electroluminescence display panel and covering the gap, the shielding layer configured to block at least one of heat, electromagnetic interference, or light from the gap; and
a first adhesive layer that is between the impact mitigating layer and the shielding layer in the second area without being disposed in the first area such that the first adhesive layer overlaps the impact mitigating layer without overlapping the ultrasonic fingerprint sensor.

US Pat. No. 10,691,920

INFORMATION IMAGE DISPLAY METHOD AND APPARATUS

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:receiving a user input comprising biometric information and a predefined key activation, wherein the biometric information is provided in a biometric detection state of a client device that is in a locked mode, in which a fingerprint collector of the client device receives a first user input from a first finger of a user and the predefined key activation is provided by activating a predefined key comprising a touch-based virtual key on the client device receiving a second user input from a second finger of the user, wherein simultaneously activating the fingerprint collector and the predefined key is pre-specified as a password to trigger a display of an information image corresponding to a data of an interface of an application;
determining a time period and a pressure for receiving the biometric information;
comparing the time period to a predetermined stored time period and the pressure to an obtained pressure;
in response to determining that the time period is greater than the predetermined stored time period, triggering the display of the data indicating the interface of the application on a display screen of the client device, wherein the predetermined stored time period is 1 second;
determining whether the received biometric information matches a predetermined biometric information from a plurality of stored predetermined biometric information;
in response to determining the received biometric information matches one of the stored predetermined biometric information, retrieving the data indicating the interface of the application that corresponds to the stored predetermined biometric information;
displaying the information image comprising the data indicating the interface of the application on the display screen of the client device for a predetermined duration while the client device is in the locked mode, wherein the information image is a dynamically changing image of a payment barcode generated in real time.

US Pat. No. 10,691,919

DYNAMIC REGISTRATION USING MULTIPLE MATCH ENROLLMENT

IDEX ASA, Fornebu (NO)

1. A computer-implemented method for dynamically enrolling a pattern-under-test into a template image, the template image including a set of image elements, where each image element is a discrete matchable unit of the template image, wherein the method comprises:a) determining, using at least one processor, that a number N of distinct image elements in the template image independently match the pattern-under-test using a matching engine, wherein N is greater than one;
b) comparing, using the at least one processor, the number N of matching distinct image elements to a threshold number of distinct image elements defined by a multi-match mode, the multi-match mode being for a dynamic enrollment of the pattern-under-test into the template image; and
c) dynamically enrolling, using the at least one processor, the pattern-under-test into the template image based on the comparison of the number N to the threshold number.

US Pat. No. 10,691,918

METHOD AND APPARATUS FOR DETECTING FAKE FINGERPRINT, AND METHOD AND APPARATUS FOR RECOGNIZING FINGERPRINT

Samsung Electronics Co., ...

1. A method of recognizing a fingerprint, comprising:determining an image quality assessment (IQA) value of an input fingerprint image, the determining the IQA including,
obtaining a processed input fingerprint image by filtering the input fingerprint image, and
determining the IQA value of the input fingerprint image based on a difference between the input fingerprint image and the processed input fingerprint image;
determining a degree of similarity between a registered fingerprint and an input fingerprint in the input fingerprint image;
determining a matching score by multiplying the IQA value and the degree of similarity; and
verifying the input fingerprint based on the matching score.

US Pat. No. 10,691,917

UNDER-SCREEN BIOMETRIC IDENTIFICATION APPARATUS AND ELECTRONIC DEVICE

SHENZHEN GOODIX TECHNOLOG...

1. An under-screen biometric identification apparatus, applicable to an electronic device having a display screen, comprising:a lens barrel having a lens unit arranged therein and structured to be arranged under a display screen, the lens unit being configured for receiving an optical signal that is generated when a human finger on the display screen is illuminated and transmitted through the display screen;
a holder for holding the lens barrel, the holder being engaged to the lens barrel through a focusing thread, the focusing thread is used to adjust a distance between the lens unit and the display screen; and
an imaging chip arranged under the lens barrel, the imaging chip being configured for implementing optical imaging based on the optical signal passing through the lens unit to obtain a biometric pattern;
wherein the holder is structured to be fixed to a lower surface of a fixing support of the electronic device, such that the holder and the lens barrel are distanced from the display screen to maintain a predetermined gap between the display screen and the lens unit; and
wherein the holder comprises a glue dispensing structure, wherein the glue dispensing structure comprises a concave groove formed around the lens barrel for providing an accommodation space for glue, wherein the glue dispensing structure is an annular step structure comprising a step surface being parallel to an upper surface of the holder and communicated with a threaded hole of the holder, and a vertical surface connected between the upper surface of the holder and the step surface.

US Pat. No. 10,691,916

PATTERN RECOGNITION DEVICE, ARRAY SUBSTRATE AND DISPLAY APPARATUS

BOE TECHNOLOGY GROUP CO.,...

1. A pattern recognition device comprising:a base substrate; and
a plurality of pattern recognizers on the base substrate, at least one of the plurality of pattern recognizers comprising a photosensitive structure and an optical path selector,
wherein the photosensitive structure comprises a first light-shielding electrode, a photoelectric conversion layer and a second light-shielding electrode which are arranged in a stacked manner, the first light-shielding electrode comprising a light-transmitting region; and
the optical path selector is configured to direct pattern light rays having a predetermined angle with respect to a surface of the pattern recognition device to the light-transmitting region.

US Pat. No. 10,691,915

DEVICE FOR CAPTURING AN IMPRINT OF A BODY PART

1. A device for capturing an imprint of a body part comprising a plurality of optically coupled elements comprising:a first transparent plate comprising a top face on which the body part bearing the imprint to be imaged can rest;
a light source;
a screen opaque to light situated below the first transparent plate;
a second transparent plate situated below the opaque screen;
a sensor comprising light-sensitive photoreceptors situated below the second transparent plate supplying information allowing generation of an image of the imprint;
the faces of the transparent plates, the opaque screen and the sensor being parallel, wherein:
the light source generates light beams passing through at least the first transparent plate towards the top face having an incident angle relative to a normal to said top face of a value less than a critical angle dependent on the refractive indices of the first plate and of air and beyond which a light ray is totally reflected by said top face in the presence of air above said top face;
the opaque screen comprises a network of holes such that each light ray directed towards the sensor which reaches the opaque screen at a hole passes through the opaque screen and reaches the sensor;
all light-sensitive photoreceptors of the sensor are positioned outside of any position of the sensor that can be struck by a light ray from the body part having an incidence angle relative to said normal less than the critical angle; and
each point of the body part in contact with the top face is imaged by at least one photoreceptor of said sensor.

US Pat. No. 10,691,914

OPTICAL FINGERPRINT SENSING UNIT AND MANUFACTURING METHOD THEREOF

PRIMAX ELECTRONICS LTD, ...

1. An optical fingerprint sensing unit, comprising:a substrate;
a circuit pattern formed on a surface of the substrate;
an optical fingerprint sensing chip fixed on the substrate, wherein the optical fingerprint sensing chip is electrically connected with the circuit pattern through a metal wire;
an encapsulation layer, wherein the optical fingerprint sensing chip, the circuit pattern and the metal wire are covered by the encapsulation layer; and
a fiber-optic layer disposed on the encapsulation layer,
wherein after a UV-curable optically clear adhesive is subjected to a light-curing reaction, the encapsulation layer is formed.

US Pat. No. 10,691,913

DISPLAY PANEL AND DISPLAY APPARATUS

SHANGHAI TIANMA MICRO-ELE...

1. A display panel, comprising:an array substrate;
a plurality of light emitting units disposed on the array substrate, each having a plurality of sub-light emitting units; and
a plurality of fingerprint recognition units, configured to recognize fingerprints based on light reflected by a touch object to the fingerprint recognition units, wherein:
each fingerprint recognition unit is configured in coordination with at least one sub-light emitting unit;
a shape and a size of each fingerprint recognition unit are the same as a shape and a size of a corresponding sub-light emitting structure; and
an orthogonal projection of each fingerprint recognition unit on the array substrate has a shape with a first boundary, an orthogonal projection of the corresponding sub-light emitting structure on the array substrate has a shape with a second boundary, and the first and second boundaries are completely overlapped with each other on a top surface of the array substrate.

US Pat. No. 10,691,912

ULTRASONIC BIOMETRIC SENSING DEVICE INTEGRATED WITH OPTICS

The Board of Trustees of ...

11. The biometric sensing device of claim 1, wherein the optical system is configured to generate and transmit light having at least two different wavelengths, wherein the optical system is configured to receive light that has the at least two different wavelengths and that is reflected from the finger through the ultrasonic fingerprint sensor, the biometric sensing device further comprising:one or more processors configured to generate the image of at least the portion of the finger based on the data from the ultrasonic fingerprint sensor and to generate a liveness parameter based at least in part on differences in the received light between the at least two different wavelengths.

US Pat. No. 10,691,911

ARRAY SUBSTRATE, DISPLAY PANEL, DISPLAY DEVICE AND METHOD FOR MANUFACTURING ARRAY SUBSTRATE

BOE TECHNOLOGY GROUP CO.,...

1. An array substrate, the array substrate including a display area and a non-display area, the array substrate comprising:an ultrasonic emission sensor;
a substrate over the ultrasonic emission sensor;
a pixel circuit layer over the substrate; and
an ultrasonic reception sensor over the pixel circuit layer, the ultrasonic reception sensor being electrically connected to the pixel circuit layer;
wherein projections of the ultrasonic emission sensor and the ultrasonic reception sensor in a direction perpendicular to the substrate do not overlap with each other;
wherein the ultrasonic emission sensor comprises a first drive electrode layer, a first piezoelectric layer over the first drive electrode layer, and a second drive electrode layer over the first piezoelectric layer; and
wherein a thickness of the first piezoelectric layer in the display area is the same as a thickness of the first piezoelectric layer in the non-display area, and a material of the first piezoelectric layer in the display area has a frequency constant larger than that of a material of the first piezoelectric layer in the non-display area.

US Pat. No. 10,691,910

DISPLAY DEVICE AND MOBILE INFORMATION TERMINAL INCLUDING THE SAME

LG Display Co., Ltd., Se...

1. A display device comprising:a display panel configured to receive touch by a user's finger on a display area of the display panel, wherein the display panel has a width and a length, the width being perpendicular to the length; and
a fingerprint sensor coupled to the display panel configured to sense light reflected from a fingerprint of the user's finger, wherein the light reflected from the fingerprint is incident on the fingerprint sensor through the display panel, the fingerprint sensor having a length,
wherein the fingerprint sensor is attached obliquely on the display panel such that the length of the fingerprint sensor is at a predetermined angle to a reference line parallel to a long axis of the display panel, and the fingerprint sensor and the display panel are in a same plane.

US Pat. No. 10,691,909

USER AUTHENTICATION METHOD USING FINGERPRINT IMAGE AND METHOD OF GENERATING CODED MODEL FOR USER AUTHENTICATION

Samsung Electronics Co., ...

1. A user authentication method using a fingerprint image, the user authentication method comprising:receiving at least a portion of a fingerprint image of a user;
actuating a processor:
to divide the fingerprint image into first sub-blocks;
to generate a set of binary input codes by encoding the first sub-blocks based on a coded model;
to measure a similarity between the set of the binary input codes and a set of registered binary codes in a binary codebook; and
to authenticate the user based on the similarity,
wherein the binary codebook is generated based on
dividing each of enrolled partial fingerprint images of the user into a plurality of second sub-bocks, each of the plurality of the second sub-blocks being different than the first sub-blocks,
changing at least one of a position or an angle at which each of the enrolled fingerprint images is to be cropped, and
updating the binary codebook by encoding the second sub-blocks based or the coded model.

US Pat. No. 10,691,907

APPARATUS HAVING HYBRID MONOCHROME AND COLOR IMAGE SENSOR ARRAY

HAND HELD PRODUCTS, INC.,...

1. A method for operating an apparatus, the apparatus comprising a two dimensional image-sensor array comprising a plurality of rows of pixels, the plurality of rows being operable in a global shutter mode of operation to capture one or more frames of image data, the method comprising:capturing one or more parameter determination frames of image data using the global shutter mode of operation;
processing the one or more parameter determination frames of image data to determine at least one parameter of the apparatus;
applying the at least one parameter to the apparatus;
capturing a decode frame of image data using the global shutter mode of operation after applying the at least one parameter; and
attempting to decode one or more decodable indicia in the decode frame of image data.

US Pat. No. 10,691,906

BARCODE-READING SYSTEM THAT AUTOMATICALLY ADJUSTS CERTAIN OUTPUTS BASED ON AMBIENT CHARACTERISTICS

The Code Corporation, Mu...

1. A barcode-reading system, comprising:a barcode reader;
a detector that is configured to detect a characteristic of an environment in which the barcode-reading system is located; and
a controller that is configured to automatically adjust, based on the detected characteristic, at least one of a volume of sound output by the barcode-reading system, a type of targeting illumination used by the barcode-reading system, a color of illumination used by the barcode-reading system, a type or duration of feedback provided by the barcode-reading system, or a feature of an indicator light of the barcode-reading system, wherein the indicator light provides information about a charging status of the barcode reader.

US Pat. No. 10,691,905

FIELD-UPGRADABLE BARCODE READERS

Zebra Technologies Corpor...

1. A field-upgradeable barcode reader configured to be supported by a workstation, the field-upgradeable barcode reader comprising:a first housing portion supporting a generally horizontal platter having a generally horizontal window;
a second housing portion supporting a generally vertical window, the second housing portion having a first cover removably attached thereto; andan image capture arrangement having a first set of optical components and a second set of optical components,the first set of optical components positioned at least partially within the first housing portion, the first set of optical components configured to produce and direct a first field of view (FOV) through the generally horizontal window,
the second set of optical components including a first fold mirror and a second fold mirror, each of the first fold mirror and the second fold mirror positioned at least partially within the second housing portion, the second set of optical components configured to produce and direct a second FOV and a third FOV through the generally vertical window such that the first fold mirror redirects the second FOV through the generally vertical window and the second fold mirror redirects the third FOV through the generally vertical window;
wherein the second housing includes a receptacle configured to alternatively receive one of a second cover and a field-installable imaging assembly insert, the field-installable imaging assembly insert configured to receive an image acquisition assembly, and
wherein the receptacle is positioned between the first fold mirror and the second fold mirror.

US Pat. No. 10,691,904

HANDICAPPED PARKING PLACARD

IPS GROUP INC., San Dieg...

9. A platform comprising:a) an electronic handicapped parking plug-in device comprising: a processor, a memory, a power source, a biometric verification module, a passive RFID tag, and a wireless communications module communicating a unique identifier to an external application;
b) a parking user application comprising a software module receiving the unique identifier and using the identifier to query a central parking database to enter or edit handicapped parking plug-in device configuration data and renew or extend the validity of the plug-in device; and
c) a parking enforcement application comprising a software module receiving the unique identifier and using the identifier to query the central parking database for handicapped parking configuration data, the handicapped parking configuration data comprising the identity of an authorized parking user, and one or more of: verification of the authenticity of the electronic handicapped parking plug-in device, validation of the electronic handicapped parking plug-in device, and restrictions on handicapped parking privileges;
the biometric verification module receiving an input from a parking user, verifying the identity of the parking user as the authorized parking user based on the handicapped parking configuration data from the central parking database, and upon verification, activating the handicapped parking plug-in device for a parking period, and allowing interrogation of the passive RFID tag for the purposes of validation of the plug-in device.

US Pat. No. 10,691,903

READING DEVICE AND METHOD OF READING INFORMATION FROM RFID TAG ATTACHED TO COMMODITY BY THE SAME

TOSHIBA TEC KABUSHIKI KAI...

1. A reading device configured to read inherent information of a commodity from an RFID tag attached to the commodity, the reading device comprising:two or more antennas, arranged at different vertical locations with respect to a table having a placing region for receiving the commodity, the two or more antennas configured to transmit radio waves from the different vertical locations and receive a response with the inherent information from the RFID tag when the commodity is placed in the placing region;
a specifying unit configured to specify the commodity in the placing region based on the inherent information read through the two or more antennas;
a selection unit configured to select the commodity to be moved from the placing region among other commodities placed in the placing region based, at least partially, on a relationship between the commodities determined from which of the two or more antennas having received the response with the inherent information; and
a guide unit configured to provide guide information for instructing a movement of the commodity selected by the selection unit from the placing region.

US Pat. No. 10,691,902

DEVICE CONTROL USING ENTITY IDENTIFIERS

WHP Workflow Solutions, I...

1. A method, comprising:storing a relationship between an entity identifier of an entity and a first device identifier of a first electronic device;
storing a relationship between the entity identifier and a second device identifier of a second electronic device;
detecting an activation event associated with the entity identified by the entity identifier; and
in response to detecting the activation event, initiating an activation action on both the first electronic device and the second electronic device by reference to the stored relationship between the entity identifier and the first device identifier and the stored relationship between the entity identifier and the second device identifier using the entity identifier as a key.

US Pat. No. 10,691,901

SEQUENCE GENERATION USING NEURAL NETWORKS WITH CONTINUOUS OUTPUTS

Carnegie Mellon Universit...

1. A computer system for mapping an input string to an output string from a set of N strings, the computer system comprising:a processor; and
a memory storing:
a machine learning system comprising:
an encoder;
a decoder;
a continuous embedding output layer configured to map an output of the decoder to an m-dimensional vector space; and
an output embedding table storing a plurality of continuous vectors mapped to the m-dimensional vector space;
wherein m instructions that, when executed by the processor, cause the computer system to:
process the input string through the encoder and the decoder to produce an output vector;
determine which of the plurality of continuous vectors within the output embedding table the output vector corresponds to; and
output the output string corresponding to the determined continuous vector.

US Pat. No. 10,691,900

ADAPTABLE TEXT ANALYTICS PLATFORM

SRI International, Menlo...

1. A method for creating a machine-learned model that can be used to adapt a domain-independent automated text analytics process to a particular text scoring task, the method comprising:inputting, to a feature extraction process, texts and corresponding scores;
using the feature extraction process, extracting features from the texts;
inputting, into a machine learning process, the features and the scores;
using the machine learning process, creating a domain-independent scoring model;
wherein the domain-independent scoring model and a customized configuration are used to score unscored text with respect to a particular text scoring task;
wherein the customized configuration comprises operating instructions that tailor the domain-independent scoring model to a subset of the features and a scoring rubric;
wherein the subset of the features and the scoring rubric are associated with the particular text scoring task;
wherein the method is performed by one or more computing devices.

US Pat. No. 10,691,899

CAPTIONING A REGION OF AN IMAGE

DASSAULT SYSTEMES, Veliz...

1. A computer implemented method for learning a function configured for captioning a region of an image, the method comprising:obtaining a dataset of triplets each including a respective image, a respective region of the respective image, and a respective caption of the respective region; and
learning, with the dataset of triplets, a function that is configured to generate an output caption based on an input image and on an input region of the input image,
wherein the function includes:
a first component, the first component being configured to determine a signature of a combination of the input image and of the input region, and
a second component, the second component being configured to generate the output caption based on the signature of the combination,
wherein the second component is configured to generate the output caption further based on a word embedding space,
wherein the second component comprises a first recurrent neural network, a second recurrent neural network and a word embedding layer.
wherein the first recurrent neural network is configured to recurrently generate a respective output word embedding vector based on a respective input word embedding vector, the input word embedding vector respective to the first recurrent neural network being the output of the compound of the second recurrent neural network and then the word embedding layer,
wherein the second recurrent neural network is configured to recurrently generate a respective output word embedding vector based on a respective input word embedding vector and on the signature of the combination, the input word embedding vector respective to the second recurrent neural network being the output of the first recurrent neural network, and
wherein the word embedding layer is configured to generate a respective output word embedding vector based on a respective input word embedding vector, the generated word embedding vector respective to the word embedding layer being the word embedding vector corresponding to a word of a vocabulary represented in the word embedding space which is the word with highest probability.

US Pat. No. 10,691,898

SYNCHRONIZATION METHOD FOR VISUAL INFORMATION AND AUDITORY INFORMATION AND INFORMATION PROCESSING DEVICE

HITACHI, LTD., Tokyo (JP...

1. A method for synchronizing visual information and first auditory information, comprising:extracting the visual information included in an image, the visual information including a first gesture and a second gesture occurring after the first gesture;
recognizing first auditory information in a first language that is included in a speech in the first language;
associating the visual information with the first auditory information in the first language;
translating the first auditory information in the first language into second auditory information of a second language; and
editing the visual information and the second auditory information in the second language so as to associate the visual information with the second auditory information in the second language,
wherein the editing of the visual information includes editing the visual information so that the second gesture occurs before the first gesture.

US Pat. No. 10,691,897

ARTIFICIAL INTELLIGENCE BASED VIRTUAL AGENT TRAINER

ACCENTURE GLOBAL SOLUTION...

1. A system for computer-based virtual agent trainer, the system comprising:a memory storing instructions; and
a processor in communication with the memory, wherein, when the processor executes the instructions, the instructions are configured to cause the processor to:
obtain input data comprising a plurality of base utterances,
generate a preliminary set of utterances based on the input data by:
obtaining a plurality of industry keywords based on the input data,
generating a plurality of synonyms of the plurality of industry keywords, and
generating the preliminary set of utterances based on the input data and the plurality of synonyms according to at least one combination of the generated plurality of synonyms of the plurality of industry keywords,
process the preliminary set of utterances to generate a set of utterance training data,
generate a set of conversations based on the set of utterance training data,
simulate the set of conversations on a virtual agent to obtain a conversation result,
verify an intent and a response based on the conversation result,
verify a use case flow and flow hops based on the conversation result, and
generate recommendation information and a maturity report based on verification results.

US Pat. No. 10,691,896

CONVERSATIONAL SYSTEM USER BEHAVIOR IDENTIFICATION

Microsoft Technology Lice...

1. A system comprising:at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the system to perform a set of operations, the set of operations comprising:
receiving a message as part of a conversation session between a user and an electronic conversational agent;
analyzing the message using a historical factor associated with at least one other user of the electronic conversational agent to determine whether the user is exhibiting anomalous behavior;
when it is determined that the user is exhibiting anomalous behavior, automatically adapting the electronic conversational agent based on the determined anomalous behavior; and
continuing the conversation session based on the adapted electronic conversational agent.

US Pat. No. 10,691,895

DYNAMIC TEXT GENERATION FOR SOCIAL MEDIA POSTS

International Business Ma...

1. A method for sharing a social media post with automatically generated dynamic text in a social media service, the method comprising:receiving by a computing device a social media post;
monitoring by the computing device social media activities of a social media user computer;
accessing by the computing device one or more social media activities of social media follower computers;
comparing the one or more social media activities of the social media user computer with the one or more social media activities of social media follower computers;
aligning the received social media post to a preference model, wherein the preference model is based on the compared social media activities of the social media user computer compared with the one or more social media activities of social media follower computers;
generating by the computing device dynamic text in real time to accompany the received social media post; and
outputting by the computing device the generated dynamic text to the social media user computer to accompany the received social media post.

US Pat. No. 10,691,894

NATURAL POLITE LANGUAGE GENERATION SYSTEM

Disney Enterprises, Inc.,...

1. A computer program product comprising a non-transitory computer readable storage device having a computer readable program stored thereon, wherein the computer readable program when executed on a computer causes the computer to:receive, with a processor, a user input in a human-to-machine interaction;
generate, with a natural language generation engine, a plurality of response candidates;
measure, with the natural language generation engine, a semantic similarity of the plurality of response candidates to the user input;
select, with the natural language generation engine, a response candidate from the plurality of response candidates as a selected response candidate;
measure, with the natural language generation engine, an offensiveness measurement and a politeness measurement of the selected response candidate;
determine, with the natural language generation engine, whether the offensiveness measurement or the politeness measurement complies with one or more criteria;
responsive to a determination that the offensiveness measurement and the politeness measurement comply with the one or more criteria, output, with the natural language generation engine, the selected response candidate; and
responsive to a determination that the offensiveness measurement and the politeness measurement do not comply with the one or more criteria;
select, with the natural language generation engine, an additional response candidate from the plurality of response candidates, as a selected additional response candidate, the selected additional response candidate having a higher semantic similarity measurement than remaining response candidates from the plurality of response candidates;
measure, with the natural language generation engine, an additional offensiveness measurement and an additional politeness measurement of the selected additional response candidate;
determine, with the natural language generation engine, that the additional offensiveness measurement and the additional politeness measurement comply with the one or more criteria; and
output, with the natural language generation engine, the selected additional response candidate.

US Pat. No. 10,691,893

INTEREST HIGHLIGHT AND RECOMMENDATION BASED ON INTERACTION IN LONG TEXT READING

International Business Ma...

1. A method for recommending terms in a document based on a specified interaction with the document, the method comprising:displaying a document on a device of a computer system;
detecting, by a text identifier of the computer system, a specified interaction of a user with the document displayed on the device;
identifying, by the text identifier of the computer system, text associated with the specified interaction of the user with the document displayed on the device;
extracting objects from the identified test using natural language processing and an object recognizer of the computer system, including
extracting phrases from the identified text, and
forming objects from the extracted phrases using the natural language processing;
recognizing one or more interested objects, of a determined group of interested objects, from the identified text, including
filtering the formed objects with said determined group of interested objects, to form a filtered group of objects comprising said one or more interested objects from the identified text, including
displaying on the device a first group of interested objects,
the user using the display of the first group of interested objects to add one or more additional interested objects to the first group of interested objects, and to remove one or more of the interested objects of the first group of interested objects form said first group of interested objects to form said determined group of the interested objects, including
displaying a second group of interested objects on the device,
assigning a weight to each of the interested objects in the first and second group of interested objects,
in each of the first and second groups of interested objects, sorting the interested objects in said each group by the weights of the interested objects,
in each of the first and second groups of interestted objects, removing from said each group one or more of the interested objects of said each group based on the weights of the interested objects of said each group, and
the user interacting with the display of the second group of interested objects to move one or more of the interested objects from the second group of interested objects to the first group of interested objects; and
putting into said filtered group of objects ones of the formed objects that are present in the determined group of interested objects; and
recommending terms in the document based on the filtered group of the objects formed from the objects extracted from the identified text.

US Pat. No. 10,691,892

ONLINE CONTEXTUAL ADVERTISEMENT INTELLECTUALIZATION APPARATUS AND METHOD BASED ON LANGUAGE ANALYSIS FOR AUTOMATICALLY RECOGNIZING COINED WORD

ELECTRONICS AND TELECOMMU...

1. A language analysis apparatus for processing coined word recognition, the language analysis apparatus comprising at least one processor and at least one memory comprising a set of computer instructions that when executed by the processor implement the following:a document collector collecting an online document;
a coined word extractor performing coined word filtering on the collected document based on a predetermined coined word extraction pattern and a dictionary to extract a coined word candidate which corresponds to the coined word extraction pattern and is not registered in a coined stop word dictionary;
a coined word verifier performing morpheme analysis on the extracted coined word candidate to verify a coined word candidate which does not correspond to a predetermined part of speech and is not registered in a pre-stored morpheme dictionary;
a coined word extraction improver refining the coined word extraction pattern, based on a verification result of the coined word verifier and updating the verified coined word candidate in the coined stop word dictionary; and
a morpheme analysis improver updating the verified coined word candidate in the morpheme dictionary, based on the verification result of the coined word verifier,
wherein the coined word verifier is configured to:
extract a coined word candidate, which is not registered in the pre-stored morpheme dictionary, from among the coined word candidates extracted by the coined word extractor,
verify a part of speech of the coined word candidate, which is extracted as being unregistered in the morpheme dictionary, by using a morpheme analyzer, and
determine whether to perform improvement of morpheme analysis performance and improvement of coined word extractor performance on the coined word candidate, if said word candidate is not registered in the morpheme dictionary and is not a predetermined part of speech.

US Pat. No. 10,691,891

INFORMATION EXTRACTION FROM NATURAL LANGUAGE TEXTS

ABBYY Production LLC, Mo...

16. A computer-readable non-transitory storage medium comprising executable instructions that, when executed by a computer system, cause the computer system to:extract a first plurality of information objects from a natural language text;
extract, from the natural language text, a second plurality of information objects;
determine that a first textual annotation associated with a first information object of the first plurality of information objects is overlapping with a second textual annotation associated with a second information object of the second plurality of information objects; and
apply, to the first information object and the second information object, a conflict arbitration function represented by a machine learning classifier yielding a likelihood of the first information object and the second information object representing a same object.

US Pat. No. 10,691,890

WORD SEGMENTATION METHOD AND SYSTEM FOR LANGUAGE TEXT

HUAWEI TECHNOLOGIES CO., ...

1. A word segmentation method for a language text implemented by a computer device, comprising:obtaining a first language text to be processed and a confidence level threshold, wherein the confidence level threshold indicates a word segmentation precision, a word segmentation speed, or a word segmentation consistency of the first language text;
performing word segmentation on the first language text in a first word segmentation manner to obtain a first word boundary set;
dividing the first word boundary set into a trusted second word boundary set and an untrusted third word boundary set according to the confidence level threshold;
selecting a second language text from the first language text according to the untrusted third word boundary set, wherein the second language text comprises a word corresponding to each word boundary in the untrusted third word boundary set;
performing the word segmentation on the second language text in a second word segmentation manner to obtain a fourth word boundary set, wherein a word segmentation precision of the second word segmentation manner is higher than a word segmentation precision of the first word segmentation manner;
setting the trusted second word boundary set and the fourth word boundary set as a word segmentation result of the first language text; and
outputting the word segmentation result of the first language text to at least one of an information retrieval system, a machine translation system, or a question answering system.

US Pat. No. 10,691,889

EMAIL SUGGESTOR SYSTEM

Groupon, Inc., Chicago, ...

1. An email suggestor system for interfacing each of two or more affiliate merchant devices including at least a first merchant device and a second merchant device, with a contact, order, or payment application to reduce a transaction time for consumer-facing operations, the email suggestor system comprising an apparatus, the apparatus comprising at least one processor and at least one memory including program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to:receive, at the first merchant device, during a first transaction, from a consumer device, first identity information and an associated payment information;
store the first identity information and the associated payment information;
subsequent to the first transaction, receive, during a second transaction, at the second merchant device, second identity information;
perform, utilizing the second identify information, a one-to-one match to previously captured identity information;
identify a one-to-one match between at least a portion of the second identity information received during the second transaction to at least a portion of the first identity information received during the first transaction;
determine, during the second transaction at the second merchant device, the associated payment information based on identifying the one-to-one match;
identify an associated email address associated with the associated payment information;
provide, during the second transaction, an interface to a contact, order, or payment application; and
cause, during the second transaction, display of the associated email address associated with the associated payment information at the interface to the contact, order, or payment application.

US Pat. No. 10,691,888

METHOD, TERMINAL, APPARATUS AND COMPUTER-READABLE STORAGE MEDIUM FOR EXTRACTING A HEADWORD

PING AN TECHNOLOGY (SHENZ...

1. A method for extracting a headword, comprising:acquiring a text information input by a user, and the text information comprises one or more search terms;
determining an out-edge weight of each search term;
calculating a linkage-matrix for the each search term of the text information according to the out-edge weight;
calculating a priori score of the each search term according to a preset document library;
determining a random jumping vector for the each search term of the text information according to the priori score;
calculating a first preliminary score of the each search term according to the linkage-matrix and the random jumping vector;
determining a second preliminary score of the each search term according to a preset part-of-speech configuration rule;
determining a final degree score of the each search term according to the first preliminary score and the second preliminary score;
extracting the headword of the text information according to the final degree score.

US Pat. No. 10,691,887

TECHNIQUES FOR AUTOMATIC PROOFING OF TEXTUAL DATA

Microsoft Technology Lice...

1. An apparatus, comprising:a logic circuit; and
logic operative on the logic circuit to access information comprising:
a set of n-grams, each n-gram in the set comprising a plurality of words,
a set of replacement n-grams, each replacement n-gram having a same number of words as the plurality of words,
at least one mapping between at least one replacement n-gram for a corresponding n-gram in the set of n-grams, and
a corresponding confidence score for each mapping being determined by user activity while producing text for various one or more applications, wherein a higher confidence score for a mapping for an n-gram corresponds to a higher number of users replacing the n-gram with a first replacement n-gram, and a lower confidence score for the mapping corresponds to a lower number of users replacing the n-gram with a second replacement n-gram;the logic further operative on the logic circuit to:process input to a productivity application comprising textual data:
identify a portion of the textual data to replace based upon the accessed information; and
automatically modify the portion of the textual data using at least one word from the replacement n-grams based upon a corresponding confidence score between the portion of the textual data and the at least one word.

US Pat. No. 10,691,886

ELECTRONIC APPARATUS FOR COMPRESSING LANGUAGE MODEL, ELECTRONIC APPARATUS FOR PROVIDING RECOMMENDATION WORD AND OPERATION METHODS THEREOF

Samsung Electronics Co., ...

1. An electronic apparatus configured to compress a language model, the electronic apparatus comprising:a storage configured to store a language model including an embedding matrix and a softmax matrix generated by a recurrent neural network (RNN) training based on basic data including a plurality of sentences; and
a processor configured to:
convert the embedding matrix into a product of a first projection matrix and a shared matrix, the product of the first projection matrix and the shared matrix having a same size as a size of the embedding matrix, and convert a transposed matrix of the softmax matrix into a product of a second projection matrix and the shared matrix, the product of the second projection matrix and the shared matrix having a same size as a size of the transposed matrix of the softmax matrix, and
update elements of the first projection matrix, the second projection matrix and the shared matrix by performing the RNN training with respect to the first projection matrix, the second projection matrix and the shared matrix based on the basic data.

US Pat. No. 10,691,885

EXTRACTING STRUCTURED DATA FROM HANDWRITTEN AND AUDIO NOTES

EVERNOTE CORPORATION, Re...

1. A computer-implemented method, comprising:at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors:
obtaining unstructured information collected from a handwritten or audio source;
identifying one or more terms from the unstructured information, the one or more terms including a first term that is ambiguous;
performing a recognition operation on the first term to derive a first plurality of candidate terms for the first term;
obtaining first contextual information from an information template associated with the unstructured information;
in accordance with the first contextual information, selecting a first answer term from the first plurality of candidate terms, such that the first term is recognized as the first answer term;
obtaining second contextual information from a parallel source that is independent from the handwritten or audio source and the information template; and
verifying that the first term has been properly recognized as the first answer term based on the second contextual information.

US Pat. No. 10,691,884

SYSTEM AND METHOD FOR CHEQUE IMAGE DATA MASKING USING DATA FILE AND TEMPLATE CHEQUE IMAGE

Tata Consultancy Services...

1. A processor-implemented method comprising:receiving, by one or more hardware processors, a cheque image and a data file, wherein the data file comprises data records with values corresponding to sensitive data fields in the cheque image;
obtaining, by the one or more hardware processors, a template cheque image matching to the cheque image and redacted information associated with the template cheque image, wherein the redaction information comprises metadata information and information about sensitive fields and wherein the metadata information comprises memory space required by the template cheque image, dimensions, an image file format type, a compression scheme used to compress the template cheque image, a type of the template cheque image and a bit depth of the template cheque image;
generating, by the one or more hardware processors, a blank image snippet for each of the sensitive data fields in the cheque image based on the metadata information and at least a part of the obtained information about sensitive fields, wherein the at least a part of the obtained information about sensitive fields comprise co-ordinate information of the sensitive fields;
writing, by the one or more hardware processors, values corresponding to each of the sensitive fields from the data file to the blank image snippet based on remaining information about sensitive fields, wherein the remaining information about the sensitive fields comprises information associated with color, font, content, font size, and overlapping foreground and background content and wherein the color of the sensitive field is represented by a mean of pixel values used to represent content in the sensitive field;
updating, by the one or more hardware processors, the template cheque image with the image snippet, wherein updating comprises updating pixel values in the template cheque image to pixel values in the image snippet; and
copying, by the one or more hardware processors, data of non-sensitive fields in the cheque image to the template cheque image, thereby facilitating cheque image data masking.

US Pat. No. 10,691,883

INFINITE CANVAS

APPLE INC., Cupertino, C...

1. A tangible, non-transitory, machine-readable-medium, comprising machine-readable instructions that, when executed by processing circuitry, cause the processing circuitry to:provide a workspace of a spreadsheet interface, wherein the workspace comprises a canvas extending in an x-direction or a y-direction beyond a visible portion of the workspace within the spreadsheet interface, wherein each time a boundary of the visible portion of the workspace is approached, the boundary is extended such that a portion of the canvas that was beyond the visible portion of the workspace is within the visible portion of the workspace; and
add a set of spreadsheet cells to the canvas.

US Pat. No. 10,691,882

TECHNIQUES FOR USING A SPREADSHEET AS A COMPUTE ENGINE IN AN ONLINE DATA MANAGEMENT SYSTEM

Mercatus, Inc., San Mate...

1. A method for using a spreadsheet as a compute engine in an online data management system, the method performed by a computing system comprising one or more processors and storage media storing one or more programs, the one or more programs comprising instructions executed by the one or more processors to perform the method, the method comprising:automatically making assignments of a first set of data items, of a first named range triad, to cells of a table representation of a first named range of a spreadsheet file, the first named range triad having a first shape and the table representation having a second shape, the second shape having a same shape as the first named range of the spreadsheet file;
wherein the first named range triad comprises a set of row headers, a set of column headers, and a set of row and column header mappings;
wherein the set of row and column header mappings of the first named range triad map each data item of the first set of data items to a respective row header of the set of row headers and a respective column header of the set of column headers;
wherein the first named range triad comprises a particular data item that is not included in the first set of data items;
in response to determining that the first shape is different than the second shape, not assigning the particular data item to a cell of the table representation;
based on the automatically making assignments of the first set of data items to cells of the table representation, automatically causing the first set of data items of the first named range triad to be set in the first named range of a spreadsheet file, the first named range triad stored external to the spreadsheet file;
after the first set of data items are set in the first named range, automatically causing a spreadsheet program to calculate a cell value of the spreadsheet file that is derived from one or more data items of the first set of data items as set in the first named range of the spreadsheet file; and
after the cell value is calculated, automatically obtaining a second set of data items from the first named range of the spreadsheet file, the second set of data items including the cell value calculated.

US Pat. No. 10,691,881

SPREADSHEET COMPILER FOR STREAM PROCESSING

International Business Ma...

1. A method of compiling a spreadsheet to execute stream processing in a computing system, the computing system receiving a stream of input data values, and the spreadsheet including a function encoded therein for processing at least some of said input data values, the method comprising:a compiler reading the spreadsheet and extracting the function from the spreadsheet;
the compiler generating a spreadsheet operator to execute said function in the computing system, including
said spreadsheet operator supporting data windows by recording said at least some of said input data values in one or more windows; for each of the data windows, computing a computed value from said recorded input data values, including using a window object for maintaining a buffer of the recorded values in the each data window; changing the input data values recorded in the data windows; incrementalizing computations of the values in the data windows by recomputing the computed values from the input values in the data windows when the input values recorded in the data windows change, and using an aggregate object for maintaining a data structure for the computed values for the data windows, and
the spreadsheet operator supporting stream partitioning partitioning the stream of input data values received by the computing system into a sub-stream of the input data values using a key specified in the function encoded in the spreadsheet; and
at specified times, the spreadsheet operator executing the function, using one or more of the input data values, to compute an output value, and storing the output value in an output cell of the spreadsheet.

US Pat. No. 10,691,880

INK IN AN ELECTRONIC DOCUMENT

Microsoft Technology Lice...

1. A method comprising:receiving, through a graphical user interface, a first user interface selection of a user interface element that is configured to toggle application of a smart ink mode, wherein the first user interface selection activates the smart ink mode;
in response to receiving the first user interface selection, transforming a 2-dimensional (2D) representation of an electronic document into a 3-dimensional (3D) representation of the electronic document that is configured to manage a digital ink input;
receiving, while the electronic document is in the smart ink mode, an ink input that overlaps a content portion of the electronic document;
analyzing, while the electronic document is in the smart ink mode, the ink input relative to an underlying structure of content of the electronic document including attributes of the content portion;
automatically manipulating characteristics of the ink input based on a result of the analyzing;
presenting, while the electronic document is in the smart ink mode, a modified version of the ink input based on a result of the automatically manipulating;
receiving, through the graphical user interface, a second user interface selection of the user interface element that results in de-activating the smart ink mode;
in response to receiving the second user interface selection, transforming the 3D representation of the electronic document into the 2D representation of the electronic document.

US Pat. No. 10,691,879

SMART MULTIMEDIA PROCESSING

EMC IP Holding Company LL...

1. A method for processing multimedia data into annotated multimedia partitions using a multimedia processing system including one or more processors and memory, the method comprising:obtaining a first multimedia partition of a first multimedia data stream;
obtaining a second multimedia partition of a second multimedia data stream, the second multimedia partition being different from the first multimedia partition;
generating a first annotation and a second annotation, the second annotation being different from the first annotation;
associating the first annotation with the first multimedia partition of the first multimedia data stream;
associating the second annotation with the second multimedia partition of the second multimedia data stream;
combining the first multimedia data stream and the second multimedia data stream to form a combined multimedia data stream that includes the first multimedia partition associated with the first annotation and the second multimedia partition associated with the second annotation, the first annotation including first annotation text, and the second annotation including second annotation text; and
performing a full-text search of at least the different first and second annotation texts associated with the different first and second multimedia partitions, respectively, for corresponding multimedia data, using the combined multimedia data stream.

US Pat. No. 10,691,878

PRESENTING ASSOCIATIONS OF STROKES WITH CONTENT

RICOH CO., LTD., Tokyo (...

1. A method comprising:receiving a first content for display on a display surface, the first content being a live image;
displaying the first content at a first area of the display surface, wherein the first area is an active area of the display surface upon which a user may add strokes;
capturing a stroke when written on the first area of the display surface over a first portion of the first content;
automatically creating a first page at a second area of the display surface, the second area being different than the first area and displaying the first page containing the first content with the captured stroke, the first area and the second area displaying simultaneously on the display surface, wherein automatically creating the first page at the second area of the display surface occurs if a page does not already exist with the first content;
selecting the first page containing the first content with the captured stroke being displayed at the second area when the first content with the captured stroke is no longer being displayed at the first area to cause the first area of the display surface to redisplay the first content with the captured stroke, wherein the second area comprises a second page comprising a second portion of the first content that overlaps with the first portion; and
adding the captured stroke to the second portion;
sending the first content to a matching service to determine if a first stroke context exists for the first content;
generating one or more first strokes for display on the display surface with the first content, if the matching service indicates the first stroke context exists for the first content, wherein the matching service is configured to associate the captured stroke with the first content to generate the first stroke context, if the first stroke context does not exist for the first content;
receiving a second content for display on the display surface;
receiving a third content after receiving the second content for display on the display surface;
determining whether to send the second content to the matching service;
sending the second content to the matching service to determine if a second stroke context exists, if the matching service indicates that the first stroke context exists for the first content prior to determining whether to send the second content to the matching service;
and
determining not to send the second content to the matching service if the third content is received prior to receiving the response from the matching service with respect to whether the first stroke context exists for the first content, wherein the second content is sent to the matching service if the third content is received after receiving the response from the matching service with respect to whether the first stroke context exists for the first content; and
sending the third content to the matching service to determine if a third stroke context exists for the third content.

US Pat. No. 10,691,877

HOMOGENOUS INSERTION OF INTERACTIONS INTO DOCUMENTS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving over a network, from a user, a selection of one or more annotations to be inserted into a document;
retrieving the document from a storage system and an overlay associated with the document from a database, where the overlay contains data corresponding to the one or more annotations and location information specifying location coordinates of one or more characters of an existing underlay of the document;
injecting the one or more annotations into the document, by at least:
determining an injection point in the document for injecting at least one of the one or more annotations based at least in part on the location information and a coordinate map associated with the document;
injecting the one or more annotations into the document based at least in part on the injection point;
generating a new underlay based at least in part on the one or more annotations injected into the document and the existing underlay;
determining new location coordinates for one or more characters of the new underlay based on the one or more annotations injected, the new underlay containing information corresponding to content in the document;
generating a new coordinate map based at least in part on the new location coordinates for one or more characters of the new underlay;
extracting at least a portion of content from the document; and
updating a search index associated with the document based at least in part on the portion of content extracted from the document; and
storing the document, and the new underlay in the storage system as a new version of the document such that the new version of the document and at least one other version of the document are accessible at a time.

US Pat. No. 10,691,876

NETWORKING IN A SOCIAL NETWORK

ADP, LLC, Roseland, NJ (...

1. A method comprising:a computer system:
identifying a social network profile for a person based on:
the social network profile having insufficient information for the person to establish contacts in a social network; and
the person being a newer member than other members of the social network; and
based on the social network profile being identified as having insufficient information:
obtaining an image from the person, wherein:
the image is obtained from a source external to the social network; and
the obtaining is related to purposes other than including the image in the social network profile;
performing an object recognition process that applies a set of object recognition algorithms to the image to identify a group of features for the person;
first identifying a characteristic for networking among a set of people in the social network from the group of features, wherein the characteristic corresponds to a feature of the group of features in common with people of the set of people, and wherein first identifying comprises:
applying a set of artificial intelligence processes to the group of features to identify a hypothesis for the characteristic, wherein the hypothesis is a probability that the characteristic is correctly identified; and
verifying the hypothesis for the characteristic by finding the person in a data source, wherein the data source comprises a group of people having the characteristic, and wherein the hypothesis is accepted for the person being found in the data source, or the hypothesis is rejected for the person not being found in the data source;
second identifying the set of people in the social network having the characteristic;
sending a suggestion to the set of people to establish a connection with the person, thereby enabling networking in the social network with respect to the person and the set of people in the social network having the characteristic;
connecting, based on acceptance of the suggestion, the person with other members of the social network that share the characteristic, wherein:
the social network profile does not comprise the characteristic; and
the insufficient information comprises the characteristic; and
after connecting, adding the characteristic to the social network profile based on the person indicating whether the characteristic is to be kept private or made available to the other members,
wherein the data source is external to the social network, and wherein verifying the hypothesis using the data source to identify the characteristic further comprises the computer system:
accessing the data source external to the social network, wherein the data source comprises at least one of an external database, an alumni database, a college database, a team roster, an online directory, or a website; and
verifying the hypothesis in response to identifying the person in the data source.

US Pat. No. 10,691,875

POPULATING VISUAL DESIGNS WITH WEB CONTENT

Adobe Inc., San Jose, CA...

1. In a digital media environment to facilitate creation of content using one or more computing devices, a method implemented by the one or more computing devices, the method comprising:generating, via a user interface for a digital media application on the one or more computing devices, a document design including a structured layout of object sets, each object set including multiple objects for containing data of different data types;
receiving, via the user interface, a data file including multiple elements, each of the multiple elements being one of the different data types;
receiving, via the user interface, an indication of a target element of the multiple elements in the data file;
determining matching elements of the multiple elements in the data file according to the different data types and based on positions of the matching elements in the data file relative to a position of the target element in the data file;
determining style types of the matching elements;
removing at least some of the matching elements based on the style types to form updated matching elements; and
auto-populating in the user interface at least one of the multiple objects of each of the object sets in the structured layout with content of a respective one of the updated matching elements.

US Pat. No. 10,691,874

HYPERLINK WITH GRAPHICAL CUE

Aloft Media, LLC, Longvi...

1. A method, comprising:providing a web page configured to:
display a plurality of user interface elements including a first user interface element and a second user interface element;
allow receipt of first user input that indicates a selection of the first user interface element;
in response to the receipt of the first user input that indicates the selection of the first user interface element, display a first user interface;
allow receipt of a first message utilizing the first user interface;
cause the first message to be sent, such that the first message is caused to be displayed with other messages on another web page of another website associated with a first on-line forum and the first message is caused to be displayed with the other messages on the another web page of the another website associated with the first on-line forum, in chronological order;
allow receipt of second user input that indicates a selection of the second user interface element;
in response to the receipt of the second user input that indicates the selection of the second user interface element, display a second user interface;
allow receipt of a second message utilizing the second user interface; and
cause the second message to be sent, such that the second message is caused to be displayed with yet other messages on yet another web page of yet another website associated with a second on-line forum that is separate from the first on-line forum, and the second message is caused to be displayed with the yet other messages on the yet another web page of the yet another website associated with the second on-line forum, in chronological order; and
causing storage of the web page.

US Pat. No. 10,691,873

SYSTEM AND METHOD FOR THE CREATION AND USE OF VISUALLY-DIVERSE HIGH-QUALITY DYNAMIC LAYOUTS

Wix.com Ltd., Tel Aviv (...

1. A website building system implementable on a computing device; the system comprising:a processor;
a memory unit;
a layout database to store at least one layout and an associated layout signature wherein said layout signature represents a hierarchical composition of the semantic types of the components of said at least one layout; and
a unit implemented on said processor for generating visually diverse alternative layouts for an incoming website page provided by a user and for replacing the layout of said incoming page with one of a selected diverse alternative layout, the unit comprising:
a page analyzer to at least analyze a user supplied page of a webpage having an existing layout and at least generate an associated component set signature for said user supplied page;
a signature comparer to perform a comparison of said component set signature with an associated layout signature of said at least one layout stored on said layout database based on semantic type equivalence between said at least one component set signature and said associated layout signatures;
a layout searcher and generator to at least acquire from at least said layout database a set of candidate layouts according to the results of said signature comparer and wherein a first candidate layout comprises semantically similar components having visual diversity from a second candidate layout and from said existing layout;
wherein said layout searcher and generator comprises:
a visual page comparer to determine the level of visual similarity between a first candidate layout, said existing layout and from a second candidate layout; and
a diversifier to determine an extent of visual diversity between said first candidate layout, existing layout and from said second candidate layout according to the output of said visual page comparer;
wherein said first candidate layout, existing layout and said second candidate layout have semantically similar components and are visually diverse;
a layout adapter and applier to replace said existing layout with a user-selected layout from said set of candidate layouts and to adapt said user supplied page to said user selected layout.

US Pat. No. 10,691,872

NORMALIZING MESSAGE STYLE WHILE PRESERVING INTENT

Microsoft Technology Lice...

1. A method of normalizing message style for a recipient while preserving intent of a sender, the method comprising:receiving a message having a sender style from a sender;
determining a discernable intent of the sender to emphasize a portion of content of the message, the determining of the discernable intent of the sender to emphasize the portion of content of the message comprising:
identifying a first content with appearance modifiers throughout the message that satisfy a first criteria for default appearance modifiers, the first criteria comprising instances of a particular appearance modifier that occur over a specified threshold of instances and/or the particular appearance modifier that is assigned to an amount of content that meets or exceeds a specified percentage of total content; and
from remaining content not satisfying the first criteria, identifying a second content satisfying a second criteria for sender-customized appearance modifiers, wherein identifying the second content comprises distinguishing between content in all caps and acronyms, wherein the second criteria is content with a discernable intent for indicating emphasis; and
applying a normalized recipient style to the first content and applying an intent-preserving recipient style to the second content to generate a message view of the message that is consistent with a recipient style and that preserves the discernable intent of the sender to emphasize the portion of content, the recipient style comprising the normalized recipient style and the intent-preserving recipient style such that the acronyms remain capitalized and the content in all caps that are not the acronyms are identified as satisfying the second criteria, and wherein for at least one sender, the recipient style and the sender style are not equivalent.

US Pat. No. 10,691,871

DEVICES, METHODS, AND SYSTEMS TO CONVERT STANDARD-TEXT TO ANIMATED-TEXT AND MULTIMEDIA

The Existence, Inc., San...

1. A non-transitory computer-readable storage medium including computer executable instructions, wherein the computer executable instructions, when executed by one or more processors of a computing device, cause the computing device to:obtain, using the one or more processors, digital content comprising text data via a smart text editor, the text data comprising a plurality of words and a set of individual characters, wherein at least a portion of the individual characters make up the words;
automatically parse, using the one or more processors, the text data into at least one paragraph, wherein the at least one paragraph comprises a set of words;
automatically tokenize, using the one or more processors, each word of the set of words, creating a stream of tokenized words comprising at least one tokenized word comprising a markup command, wherein the markup command dictates a behavior rule of the at least one tokenized word;
scan, using the one or more processors, the stream of tokenized words, wherein scanning the stream of tokenized words comprises the steps of:
(i) building HTML nodes for all subsequent tokenized words based on a pre-existing behavior rule when the pre-existing markup command is determined to be present,
(ii) at least one of replacing the pre-existing markup command with a new markup command and adding the new markup command to the pre-existing markup command when the new markup command is determined to be present,
(iii) building corresponding HTML nodes for all subsequent tokenized words based on the behavior rules when no new markup command is determined to be present, and
(iv) repeating (i) to (iii) with each remaining tokenized word of the inputted text data;
collect and build, using the one or more processors, an output tree based on the HTML nodes, wherein building the output tree comprises the steps of:
(i) assigning, using the one or more processors, the text data to a root node,
(ii) parsing, using the one or more processors, the root node into graph nodes, wherein a graph node is a paragraph, wherein a notation for a new paragraph is denoted by two consecutive newlines,
(iii) parsing, using the one or more processors, the graph nodes into text blocks, wherein a text block comprise sentences within a quotation mark,
(iv) parsing, using the one or more processors, the text blocks into token nodes, wherein each word is parsed into separate token nodes, and
(v) parsing, using the one or more processors, the token nodes into character nodes, wherein each character of the word is parsed into separate character nodes;
render, using the one or more processors, each HTML node as a slide; and
cause, using the one or more processors, a display of the computing device to display each slide, wherein each slide is triggered to be made visible and invisible and take on behavior in accordance with the behavior rules resulting in animated text, the animated text is rendered based on the separate token nodes corresponding to the words and the separate character nodes corresponding to the characters of the text data.

US Pat. No. 10,691,870

CHECKING WAFER-LEVEL INTEGRATED DESIGNS FOR RULE COMPLIANCE

INTERNATIONAL BUSINESS MA...

1. A method for checking a wafer-level design for compliance with a rule, comprising:determining a tile area, having a size that is based on the one or more layout design rules, that crosses a boundary between adjacent chip layouts and that leaves at least a portion of each chip layout uncovered;
determining that a portion of a first chip layout inside the tile area fails to comply with one or more layout design rules;
modifying the first chip layout, responsive to the determination that the first chip layout within the tile area fails to comply with the one or more layout design rules, to bring non-compliant periphery chip regions into compliance;
determining that the portion of the first chip layout within the tile area complies with the one or more design rules after modifying the first chip layout; and
fabricating a multi-chip wafer that includes the chip layouts.

US Pat. No. 10,691,869

PATTERN-BASED OPTICAL PROXIMITY CORRECTION

Mentor Graphics Corporati...

1. A method, executed by at least one processor of a computer, comprising:receiving a layout design;
partitioning surrounding areas for a plurality of geometric layout elements in the layout design into geometric space elements, the surrounding areas being layout areas having no geometric layout elements;
performing pattern classification to divide the plurality of geometric layout elements into geometric layout element groups and the geometric space elements into geometric space element groups based on layout patterns of which each comprises one of the plurality of the geometric layout elements and layout patterns of which each comprises one of the geometric space elements, respectively;
performing optical proximity correction on layout patterns of which each comprises one of one or more members in one of the geometric layout element groups and sub-resolution assist feature insertion on layout patterns of which each comprises one of one or more members in one of the geometric space element groups;
extracting a modified geometric layout element for each of the geometric layout element groups from results of the optical proximity correction and sub-resolution assist features for each of the geometric space element groups from results of the sub-resolution assist feature insertion;
generating a modified layout design, the generating comprising replacing the plurality of geometric layout elements with the corresponding modified layout elements and inserting into the geometric space elements the corresponding extracted sub-resolution assist features; and
storing information of the modified layout design.

US Pat. No. 10,691,868

PROCESS FOR ANALYZING PRINTED CIRCUIT BOARD AND PACKAGING MANUFACTURING DESIGN RULES

Cadence Design Systems, I...

1. A computer-implemented method comprising:providing an electronic computer aided design (“CAD”) system;
receiving one or more design rules associated with an electronic design at the electronic CAD system;
receiving one or more manufacturing rules associated with an electronic design at the electronic CAD system, wherein the one or more manufacturing rules include at least one of fabrication outline checks, fabrication mask checks, fabrication annular ring checks, fabrication hole checks, fabrication copper feature checks, fabrication copper spacing checks, fabrication silkscreen checks, assembly outline checks, assembly package checks, assembly package to package checks, assembly component lead checks, assembly spacing checks, assembly pastemask checks, assembly fiducial checks, and design for tests checks;
analyzing one or more design database objects from the electronic design with respect to the one or more manufacturing rules, wherein analyzing includes textual analysis;
generating a manufacturing output file, based upon, at least in part, the analyzing;
providing the manufacturing output file to a signoff computer aided manufacturing (“CAM”) station; and
attempting to validate the manufacturing output file, which is based upon, at least in part, the one or more manufacturing rules, at the signoff CAM station.

US Pat. No. 10,691,867

IDENTIFYING ROOT CAUSE OF LAYOUT VERSUS SCHEMATIC ERRORS

Synopsys, Inc., Mountain...

1. A method for identifying a root cause of a layout versus schematic (LVS) error in a layout of a circuit for manufacture, comprising:identifying a detected mismatch between a first graph representing a circuit layout and a second graph representing a circuit schematic, the detected mismatch comprising a first node in the first graph and a corresponding second node in the second graph, the mismatch detected based on a calculated value of the first node being different from a calculated value of the second node;
assigning a first value to the first node in the first graph and to the second node in the second graph;
iterating through nodes in the first graph and nodes in the second graph to assign values to the nodes based on the first value according to a graph coloring algorithm, until reaching a third node of the first graph and a corresponding fourth node of the second graph, the third node being assigned a second value, and the fourth node being assigned a third value different from the second value, each of the nodes representing one of a device or a net of the respective circuit layout or circuit schematic; and
generating an output identifying the third node of the first graph and the fourth node of the second graph as a root cause of the detected mismatch, wherein the root cause of the detected mismatch is corrected in the circuit layout prior to manufacture of the circuit.

US Pat. No. 10,691,866

DIE INTERFACE ENABLING 2.5D DEVICE-LEVEL STATIC TIMING ANALYSIS

Credo Technology Group Li...

1. A circuit design verification method that comprises:retrieving a design of a circuit that includes multiple integrated circuit dice connected via an interposer, each die having at least one contact for receiving or transmitting a digital signal conveyed by an interchip connection of the interposer, said circuit including an IO cell for each such contact, the circuit design including multiple serializer-deserializer dice coupled to an interface module die via parallel data buses formed of said interchip connections, the IO cells on said multiple serializer-deserializer dice excluding level shifters and the IO cells on the interface module die including level shifters;
obtaining a timing model for components of said circuit, the timing model accounting for propagation delays of said IO cells and propagation delays of said interchip connections;
performing a static timing analysis of the design using the timing model to determine data required times and data arrival times at each of said components;
comparing the data required times with the data arrival times to detect timing violations;
if such timing violations are found, reporting said timing violations for correction; and
if no such timing violations are found, providing the design for use in manufacturing the circuit.

US Pat. No. 10,691,865

MODIFYING LAYOUT BY REMOVING FILL CELL FROM FILL-DENSE REGIONS AND INSERTING DUPLICATE IN TARGET FILL REGION

GLOBALFOUNDRIES INC., Gr...

1. A method comprising:determining whether an integrated circuit (IC) layout having a plurality of fill cells includes a target fill region, the target fill region being a region of the IC layout without fill cells and exceeding a threshold surface area;
in response to determining that the IC layout includes the target fill region, determining whether the target fill region is positioned adjacent to a fill-dense region, the fill-dense region being a region of the IC layout including a subset of the plurality of fill cells, and having a feature density at least equal to an allowable feature density for the IC layout, wherein feature density is defined as the ratio of fill cell surface area within a region to a total surface area of the region;
in response to determining that the IC layout does not include the target fill region, or the target fill region not being positioned adjacent to the fill-dense region, providing instructions to manufacture an IC using the IC layout;
in response to determining that the target fill region is positioned adjacent to the fill-dense region, modifying the IC layout, wherein the modifying includes:
removing one of the plurality of fill cells from the fill-dense region, and
inserting a duplicate of the removed one of the plurality of fill cells within the target fill region;
determining whether the feature density of the fill-dense region is at least equal to the allowable feature density for the IC layout;
in response to determining that the feature density of the fill-dense region is at least equal to the allowable feature density for the IC layout, repeating the modifying of the IC layout; and
in response to determining that the feature density of the fill-dense region is less than the allowable feature density of the IC layout, providing instructions to manufacture an IC using the modified IC layout.

US Pat. No. 10,691,864

METHOD OF POST OPTICAL PROXIMITY CORRECTION (OPC) PRINTING VERIFICATION BY MACHINE LEARNING

TAIWAN SEMICONDUCTOR MANU...

1. A method of fabricating an integrated circuit (IC), comprising:receiving an IC design layout;
performing an optical proximity correction (OPC) process to the IC design layout to produce a corrected IC design layout;
verifying the corrected IC design layout using a machine learning algorithm, wherein verifying the corrected IC design layout comprises:
using the machine learning algorithm to identify one or more features of the corrected IC design layout,
comparing the one or more identified features to a database comprising a plurality of features, and
verifying the corrected IC design layout based on labels in the database associated with the plurality of features;
generating the database, wherein generating the database comprises:
generating a plurality of IC design layouts,
performing a printing simulation for each IC design layout to determine a probability of whether the corrected IC design will print-out successfully on a wafer or print with defects on the wafer, and
storing a label associated with each IC design layout in the database, wherein the label indicates the probability; and
verifying the corrected IC design layout using a compact OPC model by performing a plurality of printing simulations for each IC at a plurality of exposure doses to determine the probability.

US Pat. No. 10,691,863

METHOD AND APPARATUS TO CORRECT FOR PATTERNING PROCESS ERROR

ASML Netherlands B.V., V...

1. A method comprising:modelling, by a hardware computer system, high resolution patterning error information of a patterning process involving a patterning device in a patterning system using an error mathematical model;
modelling, by the computer system, a correction of the patterning error that can be made by a patterning device modification tool using a correction mathematical model, the correction mathematical model having substantially the same resolution as the error mathematical model;
determining, by the computer system, modification information for modifying the patterning device using the patterning device modification tool by applying the correction mathematical model to the patterning error information modeled by the error mathematical model, wherein modification of the patterning device using the patterning device modification tool comprises alteration of a property of a substrate of the patterning device with a radiation beam generated by the patterning device modification tool; and
outputting an electronic or optical signal representing the modification information, or representing data derived from the modification information, toward at least part of the patterning device modification tool for modifying the patterning device.

US Pat. No. 10,691,862

LAYOUTS FOR CONNECTING CONTACTS WITH METAL TABS OR VIAS

GLOBALFOUNDRIES INC., Gr...

1. A method implemented in a computer infrastructure comprising:assigning marker tabs for connecting contacts of semiconductor elements to a metal line to reserve space for future connections between the contacts and the metal line; and
reassigning the marker tabs to connections between the contacts and the metal line on different levels of a metal stack formed over the semiconductor elements, wherein the connections between the contacts and the metal line comprise a first group of connections comprised of metal tabs on a first level of the metal stack and a second group of connections comprised of vias to connect the contacts to the metal line on a second level of the metal stack which is at a different level than the first level of the metal stack, and the method assigns the first and second groups of connections to alternate the metal tabs and the vias with one another to separate adjacent metal tabs from one another by a via.

US Pat. No. 10,691,861

INTEGRATED CIRCUIT DESIGN

Arm Limited, Cambridge (...

1. An apparatus comprising:a first pair of signal lines and a second pair of signal lines, each pair of signal lines comprising a first line and a second line that collectively signal any one of: a logical zero, a logical one, and nothing;
a first cell occupying a first layer of the apparatus to receive the first line of the first pair of signal lines and the first line of the second pair of signal lines; and
a second cell occupying a second layer of the apparatus to receive the second line of the first pair of signal lines and the second line of the second pair of signal lines, wherein
the first cell is a dual of the second cell and at least partially overlaps the second cell.

US Pat. No. 10,691,860

SECURE LOGIC LOCKING AND CONFIGURATION WITH CAMOUFLAGED PROGRAMMABLE MICRO NETLISTS

RAMBUS INC., Sunnyvale, ...

1. A camouflaged application specific integrated circuit (ASIC), comprising:core logic having a first plurality of interconnected functional logic cells;
a programmable micro netlist (PMNL) comprising:
a second plurality of interconnected functional logic cells that together comprise a logical input, a don't care input and a programming input, the logical input and the don't care input coupled to a respective output of one or more of the first plurality of interconnected functional logic cells of the core logic, the PMNL performing a PMNL function, the programming input communicatively coupleable to a non-volatile memory to receive configuration programming data from the non-volatile memory to configure the PMNL to perform the PMNL function;
wherein the second plurality of interconnected functional logic cells comprise:
an uncamouflaged functional logic cell performing a first functional logic cell function and having a first physical layout; and
a camouflaged functional logic cell performing a second functional logic cell function and having a second physical layout substantially indistinguishable from the first physical layout;
wherein the combined first plurality of interconnected functional logic cells, the PMNL, and the configuration programming data perform one or more ASIC logical functions, and the PMNL function is a logic function.

US Pat. No. 10,691,859

INTEGRATED CIRCUIT AND METHOD OF DESIGNING LAYOUT OF INTEGRATED CIRCUIT

SAMSUNG ELECTRONICS CO., ...

1. A method of designing a layout of an integrated circuit (IC), comprising:placing a first cell in the layout, wherein the first cell comprises a plurality of first colorless patterns, each satisfying a first space condition, wherein the first space condition corresponds to a value of a smallest space between patterns to which a same color is assigned in a first zone adjacent to a first boundary, the first zone extending substantially parallel to the first boundary;
placing a second cell in the layout adjacent to the first cell at the first boundary between the first and second cells; and
generating a plurality of commands executable by a processor to form a semiconductor device based on the layout,
wherein the second cell comprises a plurality of third colorless patterns, each satisfying a second space condition, wherein the second space condition corresponds to a value of a smallest space between patterns to which a same color is assigned in a third zone adjacent to a third boundary, the third zone extending substantially parallel to the third boundary.

US Pat. No. 10,691,858

FILING VACANT AREAS OF AN INTEGRATED CIRCUIT DESIGN

Pulsic Limited, Bristol ...

1. A method comprising:using a computer, automatically creating a first shape comprising rectangles that is representative of free space on a first layer of an integrated circuit design;
finding a second shape and a third shape on a second layer of the integrated circuit design that both overlap the first shape, wherein the second layer is different from the first layer;
determining the second shape is coupled to a first power net and the third shape is coupled to a second power net, different from the first power net;
making a determination whether to couple the first shape to the second shape or the third shape based on target percentages specified for the first and second power nets;
if the determination is made to couple the first shape to the second shape, automatically creating a first via shape in a third layer, different from the first and second layers, that overlaps both the first and second shapes; and
if the determination is made to couple the first shape to the third shape, automatically creating a second via shape in the third layer that overlaps both the first and third shapes.

US Pat. No. 10,691,857

COMPUTER IMPLEMENTED SYSTEM AND METHOD OF IDENTIFICATION OF USEFUL UNTESTED STATES OF AN ELECTRONIC DESIGN

Zipalog, Inc., Plano, TX...

1. A computer program product embodied on a non-transitory computer usable medium, said non-transitory computer usable medium having stored thereon a sequence of instructions which, when executed by at least one processor causes said at least one processor to execute a method of identification of useful untested states of an electronic design over a plurality of simulations of the electronic design, comprising the steps of:receiving by a computer a computer readable representation of said electronic design having at least in one part of said electronic design, an analog portion;
generating at least one instrumented netlist based at least in part upon said computer readable representation of said electronic design;
receiving at least one specification of said electronic design;
generating at least one set of valid states based on said at least one specification;
simulating at a behavioral level of said computer readable representation of said electronic design said at least one instrumented netlist at a minimum number of at least one input vector for a plurality of simulations of the electronic design;
generating at least one verification coverage history of said electronic design based in part upon each of said plurality of simulations; and
identifying useful untested states based at least in part upon at least one of said at least one specification, said at least one instrumented netlist, said at least one set of valid states and said at least one verification coverage history based on said plurality of simulations.

US Pat. No. 10,691,856

SYSTEM DESIGN FLOW WITH RUNTIME CUSTOMIZABLE CIRCUITS

Xilinx, Inc., San Jose, ...

1. A method, comprising:within a circuit design for an integrated circuit, detecting, using computer hardware, a circuit structure of the circuit design that is a candidate for implementation as a runtime customizable circuit;
determining, using the computer hardware, implementation options for the runtime customizable circuit;
generating, using the computer hardware, a hardware description of the circuit design by replacing the circuit structure within the circuit design with the runtime customizable circuit; and
generating, using the computer hardware, program code for an embedded processor coupled to an implementation of the runtime customizable circuit within programmable circuitry of the integrated circuit created by loading a configuration bitstream in the integrated circuit, wherein the program code is usable by the embedded processor to parameterize the implementation of the runtime customizable circuit to implement a particular version of the circuit structure; and
wherein the implementation of the runtime customizable circuit is reprogrammable to implement a different version of the circuit structure by loading different parameterization data from the embedded processor.

US Pat. No. 10,691,855

DEVICE AND METHOD FOR DETECTING POINTS OF FAILURES

1. A device for detecting Points Of Failure in an integrated circuit, the integrated circuit device being described by a structural description of the integrated circuit comprising a plurality of elements, said elements representing cells and wires interconnecting the cells, the structural description of the integrated circuit further comprising portions representing a set of sensitive functional blocks, each sensitive functional block comprising one or more inputs, at least one sensitive output, and a set of elements interconnected such that the value of the sensitive output is a Boolean function of the input values of the sensitive functional block, wherein the device comprises:a selection unit configured to iteratively select a n-tuple of elements in at least the portions of the structural description of the integrated circuit corresponding to said sensitive functional blocks,
a testing unit configured to test each selected n-tuple of elements, the testing unit being configured to:
modify said selected n-tuple of elements from an initial state to a testing state;
determine if the derivative of the Boolean function associated with each sensitive functional block is equal to zero,the device being configured to detect that said n-tuple represents a Point Of Failure of order n in the integrated circuit device if the Boolean function associated with said sensitive functional block is equal to zero.

US Pat. No. 10,691,854

GRAPH-BASED TIMING ANALYSIS TIMING CALIBRATION

Avatar Integrated Systems...

1. A system, comprising:a processor configured to:
access a set of multi-corner multimode (MCMM) databases that correspond to a set of working scenarios;
apply a full timing update on the set of MCMM databases, for the set of working scenarios;
perform a graph based analysis (GBA) timing calibration on the databases, for the set of working scenarios to obtain a set of GBA-calibrated databases; and
iteratively perform multiphase optimizations on the set of GBA-calibrated databases to generate a set of optimized databases, including:
performing a phase-specific optimization on the set of GBA-calibrated databases to obtain an improved set of databases; and
recalibrating GBA timing on the set of improved databases prior to a next is phase-specific optimization; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,691,853

SUPERPOSITION OF CANONICAL TIMING VALUE REPRESENTATIONS IN STATISTICAL STATIC TIMING ANALYSIS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method of performing timing analysis in integrated circuit development, the method comprising:defining an integrated circuit design as nodes representing components of the integrated circuit design that are interconnected by edges representing wires, wherein each set of nodes that is sequentially connected by edges defines a path;
defining n statistical variables for a canonical delay model of each node and each edge of the integrated circuit design, wherein the n statistical variables define a first set of conditions;
defining a transformation matrix as an n by n matrix;
performing a statistical static timing analysis to obtain an arrival time at each node as a sum of the canonical delay models for one or more of the nodes and one or more of the edges that precede the node in the path that includes the node;
obtaining a projected arrival time at a second set of conditions, different than the first set of conditions defined by the n statistical variables, for one or more nodes by scaling the arrival time for the one or more nodes using scale factors that represent the second set of conditions and using the transformation matrix; and
providing the integrated circuit design for fabrication.

US Pat. No. 10,691,852

MODEL BASED ANALYSIS AND CONTROL OF A REAL-WORLD SYSTEM

Stefanie Pulfer, Kirchse...

1. A computer-implemented method for model based analysis of a real-world system, comprising:providing a computer model, the computer model being a computer-based representation of the real-world system;
representing, in the computer model, entities of the real-world system by artefacts, an artefact being a software object, an artefact comprising attributes representing properties of the entities of the real-world system;
representing, in the computer model, risks of real-world events occurring by risk artefacts;
representing, in the computer model, actions within the real-world system, by action artefacts, an action artefact being associated with a task accomplished by an action, resources required to perform the action, and conditions that must be satisfied for the action to be performed;
at least one input apparatus receiving input data characterising properties the real-world system;
initialising or updating attributes of the artefacts according to the input data;
defining at least one system context, a system context comprising a subset of the artefacts of the computer model;
defining at least one target task to be accomplished within the real-world system;
determining, by means of a planning subsystem, a roadmap for accomplishing the target task, the roadmap defining a set of actions within the real world required to accomplish the target task and an allocation of resources to the actions, the planning subsystem taking into account planning parameters for guiding the planning;
computing, from the roadmap, a manageability index of the at least one system context, the manageability index representing an extent to which resources required for actions represented by the action artefacts of the at least one system context are available;
computing, from the roadmap, a feasibility index of the at least one system context, the feasibility index representing an extent to which actions required for action artefacts of the at least one system context are possible;
computing, from the risk artefacts of the at least one system context, an aggregated risk of the at least one system context for artefacts comprised by the at least one system context;
creating and displaying, on a display device, a visual representation of the aggregated risk, the manageability index and the feasibility index of the at least one system context;wherein computing the manageability index of the at least one system context is done bydetermining, from the actions that are defined in the roadmap and that are associated with the action artefacts comprised by the system context, a first set of actions for which not all resources that are required to perform the action are available,
associating each of the actions of the first set of actions with an action specific manageability index and
computing the manageability index as a function of the action specific manageability index indices of the actions of the first set of actions.

US Pat. No. 10,691,851

RECONFIGURABLE INTERCONNECT

STMICROELECTRONICS S.R.L....

1. A stream switch formed in a co-processor of a system on chip (SoC), the stream switch comprising:a plurality of N multibit input ports, wherein N is a first integer;
a plurality of M multibit output ports, wherein M is a second integer; and
a plurality of M multibit stream links, wherein each one of the M multibit stream links is dedicated to a different one of the M multibit output ports, wherein each one of the M multibit stream links is reconfigurably coupleable at run time to a selectable number of the N multibit input ports, wherein the selectable number is an integer between zero and N, wherein each multibit stream link of the plurality of M multibit stream links includes:
stream switch configuration logic arranged to direct a reconfigurable coupling of the dedicated output port according to control register information stored in at least one control register associated with the stream switch.

US Pat. No. 10,691,850

POWER PROJECTION USING MACHINE LEARNING

Amazon Technologies, Inc....

1. A method for power analysis of an integrated circuit device design using machine learning, the method implemented by a computing device and comprising:generating, by the computing device, a set of workloads for a power projection tool, wherein the set of workloads are generated from power analysis tests, wherein a power analysis test includes stimulus to input into the integrated circuit device design over a span of time, wherein the set of workloads includes less than all stimulus included in the power analysis tests;
executing, by the computing device, the power projection tool on the integrated circuit device design, wherein the power projection tool exercises functions of the integrated circuit device design by executing the set of workloads, each function including toggling of signals of the integrated circuit device design, and wherein the power projection tool outputs results, the results including estimated power consumption associated with the toggling of the signals, wherein the functions are implemented by logic cells;
obtaining, by the computing device, a machine learning data model trained to output the functions, a set of signals that trigger the functions, and a particular estimated power consumption associated with each of the functions by inputting the toggling of the signals and the estimated power consumption associated with the toggling of the signals into the machine learning data model;
inputting, by the computing device, the results into the machine learning data model so as to cause the machine learning data model to generate an output comprising the functions, the set of signals that trigger the functions, and the particular estimated power consumption associated with each of the functions;
generating, by the computing device, using the output of the machine learning data model, a configuration for a design testing tool, wherein the configuration includes the set of signals that trigger the functions, the set of signals being less than all signals in the integrated circuit device design;
executing, by the computing device, the design testing tool on the integrated circuit device design, wherein the design testing tool uses the configuration to monitor toggling of the set of signals; and
computing, by the computing device, an estimated overall power consumption of the integrated circuit device design using an output of the design testing tool and the particular estimated power consumption associated with each of the functions.

US Pat. No. 10,691,849

METAL CUT OPTIMIZATION FOR STANDARD CELLS

Taiwan Semiconductor Manu...

1. A method for optimizing metal cuts in standard cells, the method comprising:placing a standard cell in a layout area;
inserting a metal cut along a metal interconnect of the standard cell at a location away from a boundary of the standard cell; and
disconnecting, at the location, a metal portion of the metal interconnect from a remaining portion of the metal interconnect based on the metal cut, wherein at least one of the placing, inserting, and disconnecting is performed by a processor.

US Pat. No. 10,691,848

DETERMINING THE BALLISTIC THRESHOLD VELOCITY FOR A COMPOSITE STRUCTURE USING MULTIPLE FAILURE MODELS

The Boeing Company, Chic...

1. A computing device comprising:a communication interface circuit configured to communicate data with one or more devices over a communications network; and
one or more processing circuits operatively connected to the communication interface circuit and configured to:
generate a parametric model configured to aggregate predicted ballistic threshold velocities of a plurality of material failure models (MFMs) associated with a composite structure, wherein each predicted ballistic threshold velocity in the parametric model has a corresponding weighting coefficient to be applied to the predicted ballistic threshold velocity;
determine a value for each weighting coefficient in the parametric model;
generate a composite ballistic threshold velocity for the composite structure from the parametric model;
generate a structural design for the composite structure according to the composite ballistic threshold velocity; and
create the composite structure according to the structural design generated for the composite structure.

US Pat. No. 10,691,847

REAL-TIME DAMAGE DETERMINATION OF AN ASSET

SAP SE, Walldorf (DE)

1. A computing system for determining real-time damage of an asset, the computing system comprising:a processor configured to
receive a data stream acquired from a structure of the asset that is monitored, and
iteratively determine an accumulated damage amount to the asset using a sliding time window in which damage is incrementally calculated in time one stress cycle at a time within the received data stream,
wherein, for each iteration, the processor is configured to identify a start and a stop point of a new stress cycle in time corresponding to a respective minima and maxima of a new extrema in the received data stream, determine a current increment of damage to the asset within the new stress cycle that occurs between the minima and maxima of the new extrema, and determine an accumulated damage for the iteration based on the determined current increment of damage for the new stress cycle added to residual damage of the asset which is previously determined during one or more previous iterations corresponding to one or more previously received stress cycles; and
an output configured to output information concerning the accumulated damage for display on a display device.

US Pat. No. 10,691,846

CAPILLARY NETWORK SIMULATIONS BASED ON A LOW-DIMENSIONAL REPRESENTATION OF POROUS MEDIA

International Business Ma...

10. An apparatus, comprising at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least:receive data corresponding to a three-dimensional physical representation of a porous rock sample;
calculate a low-dimensional representation of a pore network in the porous rock sample based on the three-dimensional physical representation, wherein calculating the low-dimensional representation of the pore network comprises determining a shortest path from all inlet voxels to all outlet voxels of the low-dimensional representation;
extract at least one geometrical parameter from the low-dimension representation;
generate a capillary network model of the porous rock sample based at least on the at least one geometrical parameter for simulating fluid flow inside the porous rock sample; and
perform at least one simulation of a flow of fluid through the capillary network model of the porous rock sample with a fluid additive to provide a predicted enhanced fluid recovery efficiency.

US Pat. No. 10,691,845

DATA DRIVEN SHRINKAGE COMPENSATION

International Business Ma...

1. A method for using data driven shrinkage compensation to fabricate an object using an additive manufacturing process, the method comprising:generating a test artifact using an additive manufacturing device;
deriving a shape shrinkage model from the test artifact;
predicting one or more dimensional changes in one or more directional strands disposed between facets of one or more respective predetermined facet pairs as a result of the fabrication of an object using an additive manufacturing process based on the shape shrinkage model, the object being modeled from a file and including one or more dimensions calculated from the one or more directional strands; and
correcting coordinate data of at least one facet of the one or more predetermined facet pairs to compensate for the one or more predicted dimensional changes in the one or more directional strands.

US Pat. No. 10,691,844

MULTI-USER CLOUD PARAMETRIC FEATURE-BASED 3D CAD SYSTEM WITH BRANCH AND MERGE

PTC Inc., Boston, MA (US...

1. A system for executing three dimensional (3D) multi-user distributed parametric computer-aided design (CAD), the system comprising:one or more servers;
one or more client devices connected over a network to the one or more servers;
server software executed on one or more servers, the server software comprising code to:
perform CAD geometry calculations including shape analysis and optimization of 3D graphics data,
manage CAD editing workflow,
manage user accounts and secure access,
communicate with the one or more client devices,
manage documents and storage including storing multiple files grouped together as a single data structure, the multiple files comprising data representations of assemblies, parts, and non-CAD data of a project encompassing the 3D CAD design,
share the 3D CAD design between multiple users simultaneously accessible through multiple client devices,
store all changes to the 3D CAD design as sequential changes applied within a workspace,
store an immutable copy of the 3D CAD design at any particular change point as a version, and branch a separate workspace as newly ordered changes made from that version, and
in response to a request to merge a feature from one workspace into a different workspace, regenerate the different workspace incorporating the feature and track the merge as a new change within the different workspace;
client software executed on the one or more client devices, the client software comprising code to:
render a user interface for displaying 3D CAD graphics for design and project management,
display the multiple files of the project as tabbed document panes within the user interface,
interact with user input and output controls to manipulate a 3D CAD design,
communicate with the one or more servers,
display a version manager listing all changes in all workspaces of the 3D CAD design as a sequential list or graph for selection and creation of versions,
display a parametric history side-by-side for each of different workspaces of the 3D CAD design,
enable user selection of any feature within the side-by-side parametric history, and
when the selected feature is different between a selected workspace and a second workspace, and the user has selected to merge the feature, request the server software to merge the selected feature into the second workspace;
wherein the 3D CAD design includes one or more parts and one or more assemblies consisting of connections and configurations of the one or more parts and sub-assemblies, and the client software further comprises code to enable a user to manipulate the parts and assemblies of the 3D CAD design through ordered feature lists.

US Pat. No. 10,691,843

SYSTEM AND METHOD FOR CNC MACHINES AND SOFTWARE

OMC2 LLC, Berkeley, CA (...

1. A computer implemented method of rendering a machine state, the method comprising:receiving a first physical machine identifier at a user device from a first physical machine, the user device being separate from and different than the physical machine;
determining a machine profile associated with the received physical machine identifier, the determined machine profile selected from a plurality of machine profiles respectively associated with a different physical machine having a different physical configuration from the other physical machines and including rendering data for rendering the physical configuration of the respective physical machine;
presenting a first rendering of the physical configuration of the first physical machine based on the determined machine profile including rendering data for rendering the physical configuration of the first physical machine;
receiving editing data based on direct three dimensional editing of the rendered work-piece via an interface at the user device to indicate a desired final cutting state of a physical work-piece before cutting of the physical work-piece;
generating a work-piece cut path based on an edited work-piece rendering before cutting of the physical work-piece;
rendering the generated work-piece cut path on the rendered work-piece before cutting of the physical work-piece, the generated work-piece cut path imposed on the rendered work-piece via the interface and including a preview of cutting the work-piece via the work-piece cut path; and
initiating cutting the physical work-piece via the generated work-piece cut path.

US Pat. No. 10,691,842

ELECTRICALLY DETECTABLE SEPARABLE BAR ARRANGEMENT FOR PROTECTION OF SERVER RACK

Amazon Technologies, Inc....

1. A method for detecting tampering of a physical access restraint for a rack-mounted datacenter appliance, the method comprising:receiving, at a datacenter, a rack equipped with a detector and a barrier coupled with the detector, the barrier comprising a bar extending across the rack in an arrangement in which the bar blocks physical access to an appliance received in the rack; and
accessing the detector coupled with the barrier to obtain information indicating that the barrier has been tampered with between authorized installation of the barrier and receipt of the rack at the datacenter based on a change in an electrical characteristic of a component of the barrier relative to an initial state of the electrical characteristic of the component detected by the detector in association with the authorized installation of the barrier,
wherein the barrier further comprises:
an electrically conductive element extending at least partially between ends of the bar; and
a connector configured to electrically connect the electrically conductive element into a circuit that comprises the rack or an electrically conductive member distinct from the bar and mountable to the rack, wherein the connector comprises:
an adhesive configured to establish a bond for coupling the bar to the rack;
a conductive trace forming a portion of the circuit and arranged within the adhesive so as to break the circuit in response to breakage of the bond of the adhesive; and
contact points for electrically coupling the conductive trace to the electrically conductive element of the bar;
wherein the change in the electrical characteristic is caused by a break in the circuit.

US Pat. No. 10,691,841

ELECTRICAL DEVICE AND HOUSING FOR AN ELECTRICAL DEVICE

Fujitsu Client Computing ...

1. An electrical device comprising:a housing with a first and at least one second opening state,
an opening detector, and
a first installation position and at least one second installation position for the opening detector, wherein
the opening detector, if it is arranged on the first installation position, detects the first, as well as the at least one second opening state,
the opening detector, if it is arranged on the at least one second installation position, only detects the at least one second opening state,
the housing includes a first housing cover and a second housing cover arranged adjacent to the first housing cover,
in the first opening state, the first housing cover is at least partially opened and in the second opening state, the second housing cover is at least partially opened, and
the opening detector, at the first a don position, is arranged on the first lung cover such that the second housing cover acts upon the opening detector only if the first, as well as the second housing cover is closed, and
the electrical device further comprises a housing floor, wherein the opening detector, at the second installation position, is arranged on the housing floor such that the second housing cover acts upon the opening detector only if the second housing cover is closed.

US Pat. No. 10,691,840

SECURE ELECTRONIC CHIP

STMICROELECTRONICS (ROUSS...

18. A secure electronic chip comprising:a substrate of a first conductivity type; and
a doped buried layer of a second conductivity type covering the substrate, a plurality of semiconductor wells formed on the doped buried layer, wherein the plurality of semiconductor wells comprises first wells of the first conductivity type and second wells of the second conductivity type;
a well biasing current detection circuit configured to detect a bias current in the plurality of semiconductor wells; and
a power supply circuit configured to provide a bias potential for biasing said wells, the detection circuit being configured to detect a variation of a potential regulating the bias potential.

US Pat. No. 10,691,839

METHOD, APPARATUS, AND SYSTEM FOR MANAGEABILITY AND SECURE ROUTING AND ENDPOINT ACCESS

INTEL CORPORATION, Santa...

1. A method for managing a secure endpoint comprising:defining a first class and a second class of Management Component Transport Protocol (MCTP) endpoints;
assigning a Bus number, Device number, and Function number to the first class of MCTP endpoints;
verifying, in a device of the second class of MCTP endpoints, a request from a device of the first class of MCTP endpoints based at least in part on the BDF of the device of the first class of MCTP endpoints and an access control list maintained by the second class of MCTP endpoints, wherein the request is included in a Vendor Defined Message packet.

US Pat. No. 10,691,838

ENCRYPTION FOR XIP AND MMIO EXTERNAL MEMORIES

Cypress Semiconductor Cor...

1. An integrated circuit (IC) device comprising:a serial interface;
an interconnect bus; and
a controller coupled to the serial interface and configured to communicate with at least one external memory device over the serial interface, wherein the controller comprises:
a first execute-in-place (XIP) interface coupled to the interconnect bus, the first XIP interface including a first cache and configured to communicate at a first speed;
a second XIP interface coupled to the serial interface coupled to the interconnect bus, the second XIP interface including a second cache and configured to communicate at a second speed.

US Pat. No. 10,691,837

MULTI-USER STORAGE VOLUME ENCRYPTION VIA SECURE ENCLAVE

Apple Inc., Cupertino, C...

1. A computing device comprising:a first processor to execute a first operating system having one or more user accounts;
a second processor to execute a second operating system, the second processor including a secure enclave, the secure enclave to:
receive a first encrypted key from the first processor, the first encrypted key derived and encrypted via the secure enclave without user-provided entropy and transmitted to the first operating system on the first processor;
decrypt the first encrypted key into a decrypted first encryption key;
derive a key encryption key via the decrypted first encrypted key; and
decrypt a volume encryption key via the key encryption key; and
a non-volatile memory controller to access encrypted data within non-volatile memory using the volume encryption key.

US Pat. No. 10,691,836

SYSTEM AND METHOD FOR SWITCHED-CAPACITOR BASED SIDE-CHANNEL COUNTERMEASURES

University of South Flori...

1. A system for decorrelating a switched capacitor voltage converter input power and output power provided to a load, the system comprising:an N stage switched capacitor voltage converter that receives input power from a power supply and provides output power to a load;
a charging controller comprising:
a first N bit pseudorandom number generator, wherein each output of the first N bit pseudorandom number generator is coupled to a respective input of the N stage switched capacitor converter via one of N respective time delay components;
an electronic processor, and a memory comprising instructions that when executed by the electronic processor cause the charging controller to transmit signals to the N stage switched capacitor converter for gating charging of a first subset of stages of the N stage switched capacitor converter; and
a discharging controller comprising;
a second N bit pseudorandom number generator, wherein each output of the second N bit pseudorandom number generator is coupled to a respective one of a second N inputs of the N stage switched capacitor converter via a respective one of a second N time delay components;
an electronic processor, and a memory comprising instructions that when executed by the electronic processor cause the discharging controller to transmit signals to the second N inputs of the N stage switched capacitor converter for gating discharging of a second subset the stages of the N stage switched capacitor converter.

US Pat. No. 10,691,835

VERIFYING INTEGRITY OF DATA STORED IN A CONSORTIUM BLOCKCHAIN USING A PUBLIC SIDECHAIN

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:sending, to each of a plurality of verification nodes, a first data digest generated based on a data item initially stored in a consortium blockchain, the first data digest being cryptographically signed and stored in a public blockchain as a cryptographically signed first data digest;
receiving a request to retrieve the data item;
generating, based upon the request to retrieve the data item, a second data digest based on the data item;
sending the second data digest to the plurality of verification nodes that cryptographically sign the second data digest and return a cryptographically signed second data digest; and
based upon the stored cryptographically signed first data digest matching the returned cryptographically signed second data digest, sending a response to the request to retrieve the data item indicating that the data item has not changed since the data item was initially stored in the consortium blockchain.

US Pat. No. 10,691,834

SYSTEM AND METHOD OF A PRIVACY-PRESERVING SEMI-DISTRIBUTED LEDGER

1. A method of preserving the integrity and privacy of user data including the steps of:creating a centralized ledger, storing data saved to the centralized ledger data to a database, receiving updates to the centralized ledger from a user interface platform accessible over a network;
receiving a first visit from a first user using a first computer, a first visit from a second user using a second computer, and a first visit from a third user using a third computer;
receiving transactional or account information from the first user, creating a set of user data using the transactional or account information received from the first user, transforming the set of user data into a first string, determining a preliminary ID for the set of user data, and storing the preliminary ID in the database;
generating a securely randomized string, creating a second string by combining the securely randomized string with the first string, linking the second string to the preliminary ID, saving the second string and the preliminary ID in the database as related cells, creating an initial hash by hashing the second string, providing a preceding block hash creating a block hash by combining the preceding block hash and the initial hash, determining a block ID for the block hash, and adding the block ID and the block hash to the centralized ledger.

US Pat. No. 10,691,833

METHOD AND AN APPARATUS FOR ACTIVATING A PREDETERMINED FUNCTION

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for activating a predetermined function in a device, the device having at least a touch-screen coupled to a processor, the device being operable in a data entry mode and a command mode, the data entry mode being one in which the processor is configured to receive inputs detected at the touch-screen and the command mode being one in which the processor is configured to activate a function, the method comprising:in the data entry mode,
receiving, at the processor, a first input that is detected at the touch-screen;
determining, at the processor, that a second input is received within a predetermined waiting time period, the predetermined waiting time period being a duration during which the second input is to be received, each of the first and second inputs having a first and second execution time periods and a position relative to the other input, the first and second execution time periods being the time taken to execute the first and second inputs, respectively;
determining, at the processor, in response to the determination that the second input is received within the predetermined waiting time period, that the first and second inputs correspond to a sequence of movements registered for the predetermined function based on the first and second execution time periods and the relative position between the first and second inputs; and
entering the command mode in response to the determination that the first and second inputs correspond to the sequence of movements registered for the predetermined function, wherein the predetermined function is activated in the command mode.

US Pat. No. 10,691,832

APPLICATION CONTROL SYSTEM AND APPLICATION CONTROL METHOD

Panasonic Intellectual Pr...

1. An application control system comprising:a terminal device; and
a management device that, in operation, manages control over an application for the terminal device,
the terminal device and the management device being connected with each other through a network,
wherein the management device, in operation,
generates a control key for controlling the application for the terminal device, and
transmits the control key, to the terminal device, and to a control device that retains the application for the terminal device and makes a control request for the application for the terminal device, and
wherein the terminal device, in operation,
receives and retains the control key from the management device,
receives the control key and the control request from the control device,
determines whether or not the retained control key and the control key from the control device match one another, and
in a case where the control keys match one another, controls the application for the terminal device corresponding to the control key, in response to the control request.

US Pat. No. 10,691,831

METHODS AND APPARATUS TO ASSIGN DEMOGRAPHIC INFORMATION TO PANELISTS

The Nielson Company (US),...

1. A method comprising:generating, by executing an instruction with a processor, decoy database proprietor identifiers to protect privacies of members of panelist households corresponding to panelist database proprietor identifiers, the decoy database proprietor identifiers to be determined based on a probability density function so that a quantity of the decoy database proprietor identifiers is less than would be used if the decoy database proprietor identifiers were selected by a random selection process;
querying, by executing an instruction with a processor, a server at a database proprietor using the panelist database proprietor identifiers and the decoy database proprietor identifiers, to obtain demographic information; and
assigning, by executing an instruction with a processor, the panelist database proprietor identifiers to panelists in the panelist households based on the demographic information obtained from the server at the database proprietor.

US Pat. No. 10,691,830

SYSTEMS AND METHODS FOR PRESERVING PRIVACY IN DISTRIBUTION OF DIGITAL CONTENT USING PRIVATE TOKENS

Verimatrix, Inc., San Di...

1. A method of anonymously tracking a piece of digital content and remediating unauthorized distribution, the method comprising:generating a private token using a playback device, where the private token comprises an identifier distinguishable from private tokens generated by other playback devices within a plurality of playback devices and the association with the playback device is not shared outside the playback device;
receiving at least a portion of a piece of content using the playback device;
embedding a digital watermark in the at least a portion of the piece of content using the playback device, where the digital watermark includes information including the private token;
detecting an unauthorized copy of the piece of content using the extraction server;
extracting the digital watermark including the private token from the unauthorized copy of the piece of content using an extraction server;
extracting the private token from the digital watermark using the extraction server;
sending the private token from the extraction server to the remediation server;
broadcasting, using a remediation server, an enforcement message containing the private token to the plurality of playback devices including the playback device;
receiving the broadcast enforcement message containing the private token using the playback device; and
performing an enforcement action on the playback device in response to the broadcast message when the private token contained in the broadcast message matches the private token on the playback device, where only a playback device that generated the private token within the plurality of playback devices responds to receiving the broadcast message containing the private token.

US Pat. No. 10,691,829

PRIVACY PRESERVATION

FUJITSU LIMITED, Kawasak...

1. An anonymization system comprising:one or more non-transitory computer-readable media configured to store one or more instructions; and
one or more processors coupled to the one or more computer-readable media, the one or more processors configured to execute the one or more instructions to cause or direct the anonymization system to perform operations comprising:
merging a public database and a private database to create a merged database, the merged database including a plurality of first entries that each include a null value and the merged database including a plurality of second entries that each include an initial value, wherein each blank entry and each initial entry is associated with one of a plurality of user identifiers, and wherein each corresponding blank entry is associated with an associated user and includes the null value in response to both the public database and the private database not including information specific to the corresponding blank entry that is associated with the associated user;
generating fill values for the first entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values, wherein the fill values replace the null values and each fill value of each corresponding blank entry is an estimation of the information associated with the corresponding blank entry for the associated user of the corresponding blank entry;
perturbing one or more of the initial values or the fill values of the filled database such that one or more of the granularity, precision, and accuracy of the one or more perturbed values is decreased to create a perturbed database;
replacing the plurality of user identifiers with a plurality of random supercookies; and
releasing at least a portion of the perturbed database.

US Pat. No. 10,691,828

METHOD FOR SECURING ACCESS TO A RELATION

COMPUGROUP MEDICAL SE, K...

1. A method for securing access to a first relation, the first relation comprising data items, the data items forming a partially ordered set in the first relation, wherein an insertion of a data item in the first relation is performed by a traversal method for traversing the first relation until reaching an insert position, the traversal method comprising at a currently traversed data item of the first relation: an order comparing step comprising comparing the data item to be inserted with the currently traversed data item resulting in a current comparison result, and a decision step comprising executing a decision logic for selecting one of a first and second sub-relations of the first relation based on the current comparison result in order to perform a next action, wherein the next action comprises a selection of a next data item to be traversed or to identify the insert position in the selected sub-relation, wherein each of the first and second sub-relations comprises zero or more data items succeeding and preceding the currently traversed data item respectively, the method comprising:predefining a reference data item;
creating a second relation and inserting a given data item of the first relation into the second relation;
inserting each data item of the first relation into the second relation using the traversal method, wherein the order comparing step comprises in case a comparison result of the currently traversed data item with the reference data item is different from a comparison result of the to be inserted data item with the reference data item inverting the decision logic, and using the inverted decision logic in the decision step;
providing the second relation.

US Pat. No. 10,691,827

COGNITIVE SYSTEMS FOR ALLOCATING MEDICAL DATA ACCESS PERMISSIONS USING HISTORICAL CORRELATIONS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for allocating medical data access permissions using historical correlations, the computer-implemented method comprising:receiving, by a computing system comprising one or more processors, a request for first medical research data from a first user;
executing, by the computing system, natural language processing to interpret the request;
generating, by the computing system, a database query based on a trained model to identify a first medical research data set that is responsive to the request, wherein the trained model takes into consideration (a) results of the natural language processing of the received request and (b) prior medical research data requests and responses that are stored in a historical database;
querying, by the computing system, one or more medical databases using the query to identify the first medical research data set that is responsive to the request, wherein the first medical research data set that is identified by the querying includes (a) the first medical research data and (b) second medical research data that is identified by the computing system as being relevant to the request based on the trained model, wherein the second medical research data was not requested by the first user in the request;
transmitting, by the computing system, the first medical research data set to the first user;
logging, by the computing system, the request and the first medical research data set into an audit log; and
repeating the receiving, the executing, the generating, the querying, and the transmitting in response to a second request from the first user for third medical research data to identify a second medical research data set that includes the third medical research data;
establishing a statistical correlation score between the first and second medical research data sets; and
upon the established correlation score exceeding a user-defined confidence interval, logging the established correlation score in the audit log and updating the trained model based on the established correlation score.

US Pat. No. 10,691,826

SECURING DATE DATA FIELDS

ALLSCRIPTS SOFTWARE, LLC,...

1. A processor-based method for searching of data containing protected date information representing protected health information, the method comprising:adding, via a processor, dateID and date values to a lookup table by
(i) adding a first dateID and date value pair to the lookup table for a start date, wherein adding the first dateID and date value pair comprises generating a first random number, adding the generated first random number to a minimum value to establish a first ID value, and inserting the established first ID value in association with the start date into the lookup table, and
(ii) adding an additional number of dateID and date value pairs for the start date based on an indication of a desired number of dateIDs to be assigned to a date by repeatedly generating a respective random number, adding the generated respective random number to the established first ID value to establish a respective ID value, and inserting the established respective ID value in association with the start date into the lookup table;
adding, via the processor, a number of dateID and date value pairs for each respective date between the start date and an end date, the number being based on an indication of a desired number of dateIDs to be assigned to a date, wherein adding the number of date ID and date value pairs comprises repeatedly generating a respective random number, adding the generated respective random number to the last established ID value to establish a current respective ID value, and inserting the established current respective ID value in association with the respective date into the lookup table;
receiving, via an input device, a query for records falling within a certain date range;
determining a minimum dateID value corresponding to a query start date associated with the certain date range by
(i) inserting, into a first dummy table, records from the lookup table that have a de-identified date value falling within a certain number of days of the query start date,
(ii) deleting, from the first dummy table, one or more records where a decrypted date value of the record does not correspond to the query start date, and
(iii) determining a minimum dateID value of the remaining records;
determining a maximum dateID value corresponding to a query end date associated with the certain date range by
(i) inserting, into a second dummy table, records from the lookup table that have a de-identified date value falling within a certain number of days of the query start date,
(ii) deleting, from the second dummy table, one or more records where a decrypted date value of the record does not correspond to the query end date, and
(iii) determining a maximum dateID value of the remaining records;
selecting, from a data source containing records corresponding to patient encounters, all encounters having a dateID value falling within a range corresponding to the determined minimum and maximum dateID values;
presenting, to the user via a display device, an indication of one or more of the records selected from the data source.

US Pat. No. 10,691,825

FACILITATING ENTITY RESOLUTION VIA SECURE ENTITY RESOLUTION DATABASE

EQUIFAX INC., Atlanta, G...

1. A method that includes one or more processing devices performing operations comprising:receiving, by an entity resolution computing device, a resolution request from a client computing device, the resolution request comprising a first encrypted index generated from a first identity data object and a second encrypted index generated from a second identity data object stored in a client identity database accessible by the client computing device;
identifying, by the entity resolution computing device and from an encrypted identity data repository, a first encrypted data object that matches the first encrypted index and a second encrypted data object that matches the second encrypted index, the encrypted identity data repository comprising encrypted data objects and associated common entity identifiers, each common entity identifier associated with two or more encrypted data objects that correspond to a common entity;
determining, by the entity resolution computing device, that the first encrypted data object and the second encrypted data object correspond to a common entity;
in response to determining that the first encrypted data object and the second encrypted data object correspond to the common entity,
retrieving, by the entity resolution computing device, a common entity identifier associated with the first encrypted data object and the second encrypted data object; and
transmitting, by the entity resolution computing device, the common entity identifier to the client computing device, the common entity identifier causing the client computing device to update the client identity database by linking the first identity data object and the second identity data object via the common entity identifier.

US Pat. No. 10,691,824

BEHAVIORAL-BASED CONTROL OF ACCESS TO ENCRYPTED CONTENT BY A PROCESS

Sophos Limited, Abingdon...

1. A computer program product for securing an endpoint against exposure to unsafe or unknown content, the computer program product comprising computer-executable code embodied in a non-transitory computer readable medium that, when executing on the endpoint performs the steps of:monitoring an exposure state of the endpoint to potentially unsafe content by applying a plurality of behavioral rules to determine whether the exposure state of the endpoint is either exposed or secure, the endpoint initially identified as secure, and the endpoint identified as exposed when a combination of two or more events associated with a process on the endpoint is determined to indicate an exposed state by one of the plurality of behavioral rules; and
when the exposure state of the endpoint is exposed, controlling access by the endpoint to a plurality of encrypted files stored on a storage resource remote from the endpoint through an extension to a file system filter that conditionally decrypts one or more of the plurality of encrypted files for the endpoint according to the exposure state of the endpoint.

US Pat. No. 10,691,823

METHOD AND SYSTEM TO PREVENT ULTRASOUND DATA LEAKS IN MOBILE DEVICES

International Business Ma...

1. An ultrasound security system that integrates with an operating system on a mobile computing device, and comprises:an app flow analysis system that analyzes runtime flow graphs for apps running on the mobile device to identify a set of apps having confidential data flow application programming interfaces (APIs) in their execution paths;
a detector that identifies a subset of vulnerable apps also having ultrasound emitting APIs; and
a runtime correlation system that flags a vulnerable app as a potential data leak when a microphone on the mobile computing device detects an ultrasound transmission coming from the vulnerable app.

US Pat. No. 10,691,822

POLICY VALIDATION MANAGEMENT

AMAZON TECHNOLOGIES, INC....

1. A computer-implemented method, comprising: receiving an access policy including one or more first claims to be applied to at least one resource in a multi-tenant resource environment; canonicalizing the access policy; evaluating the access policy using a policy validator; generating at least one second claim regarding a validity of the access policy as determined by the policy validator; generating a signature block including the at least one second claim, identifying information for the policy validator, data and time information for the at least one second claim, and authentication information for the access policy; causing the signature block to be associated with the access policy, wherein information regarding the second claim is available for subsequent analysis regarding use of the access policy; and granting access to the at least one resource based at least in part on a verification of the at least one second claim; canonicalizing the policy before performing the validation, wherein canonicalizing the access policy includes converting the policy into at least one approved policy format.

US Pat. No. 10,691,821

METHOD AND SYSTEM FOR MANAGING AND TRACKING CONTENT DISSEMINATION IN AN ENTERPRISE

Open Text Corporation, W...

1. A method for managing document dissemination, comprising:at a computer communicatively connected to a plurality of client devices, the computer having a processor and a non-transitory memory containing instructions to perform the method comprising:
obtaining a plurality of operation logs from the plurality of client devices, wherein each of the operation logs includes one or more operation entries, the one or more operation entries indicating corresponding document identifiers and corresponding operations performed on the identified documents, the operations including one or more of the group including requesting dissemination, accessing, opening, printing, modifying and emailing;
identifying a document stored on a first one of the client devices;
identifying an operation information entry included in the obtained plurality of operation logs from the plurality of client devices, the identified operation information entry indicating a request by an application running on the first one of the client devices to disseminate the document;
determining, using the obtained plurality of operation logs, a dissemination path of the document between the plurality of client devices, the determining including resolving information about one or more target entity IDs in the obtained plurality of operation logs to one or more target entities, the dissemination path specifying entities between which the document was communicated and a direction of communication;
determining a set of client devices that have a copy of the document using the determined dissemination path; and
issuing a request to each client device in the set of client devices determined using the dissemination path to perform an action with respect to the document.

US Pat. No. 10,691,820

REAL-TIME DISTRIBUTION OF MESSAGES VIA A NETWORK WITH MULTI-REGION REPLICATION IN A HOSTED SERVICE ENVIRONMENT

PubNub Inc., San Francis...

1. A method of distributing messages to subscribers via a cloud computing system, the method comprising:by a first data center of a cloud computing system:
receiving a plurality of messages from a publisher,
saving the plurality of messages in a data collection at the first data center,
for each of the plurality of messages, saving a time token to the data collection with the message, wherein the time token for each message includes an indicator of a time at which the message was received by the first data center, and
sending the messages and the time tokens for the messages in real time from the first data center to a plurality of additional data centers of the cloud computing system in multiple geographic locations so that the data collection is replicated among each of the data centers of the cloud computing system to enable low-latency delivery of the plurality of messages in the multiple geographic locations; and
by a second data center of the additional data centers:
receiving a credential and a subscriber time token from a subscriber when the second data center is more geographically proximate to a client device of the subscriber than the first data center is to the client device of the subscriber, wherein the subscriber time token is the assigned time token which is assigned to a previous message that the subscriber has received from the cloud computing system,
based on the credential, verifying that the subscriber is an authorized subscriber,
determining whether the second data center holds any messages which the authorized subscriber has not yet received and identifying messages from the data collection of the second data center that the authorized subscriber is eligible to receive and which have time tokens indicating that the messages were published after a time indicated by the subscriber time token, and
sending each identified message to the client device of the authorized subscriber.

US Pat. No. 10,691,819

METHOD AND APPARATUS FOR REMOTELY DELETING INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for remotely deleting information, comprising:storing account information of a user and terminal information of a terminal locally at the terminal, the account information of the user including an account number and a password;
acquiring permission for remotely deleting all information in the terminal when the user logs in to the terminal remotely via a server and requests to enable a remote deletion function;
uploading the account information of the user and the terminal information of the terminal to the server;
receiving a command for deleting all information sent by the server after the user logs in remotely, the command including the account information of the user;
determining that the account information as included in the command matches the account information and the terminal information stored at the terminal;
determining on whether the command for deleting all information in the terminal has failed based on system permission provided by the terminal;
in response to determining that the command for deleting all information has failed, initiating deleting a portion of information but not all information in the terminal, wherein the terminal is not resumed to factory settings; and
in response to determining that the terminal provides the system permission to delete all information and the command for deleting all information in the terminal is successful, initiating deleting all information in the terminal, wherein all information in the terminal includes applications, photos and application data stored in storage of the terminal and information stored in an external SD card in response to the command and based on the permission, such that the terminal is resumed to factory settings;
wherein the method is performed by a processor.

US Pat. No. 10,691,818

SECURE INTERFACE FOR DISPLAYING OF INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. An information processing method, comprising:acquiring, by a terminal equipment, communication data from a communication link;
analyzing, by the terminal equipment, the communication data, and acquiring attribute information of the communication data and first information carried by the communication data;
selecting, by the terminal equipment, a target information prompting manner from at least two information prompting manners including a first information prompting manner and a second information prompting manner, based on the attribute information;
prompting, by the terminal equipment, the first information carried by the communication data in the target information prompting manner;
when the target information prompting manner includes the first information prompting manner, presenting the first information and source information of the communication data on a first display interface; and
when the target information prompting manner includes the second information prompting manner, including:
presenting second information and the source information of the communication data on a second display interface, wherein the first information is information requiring prevention of leakage to unintended recipient, the second information is information not requiring prevention of leakage to unintended recipient, the first display interface is a display interface of the terminal equipment configured to display the first information, and the second display interface is a display interface of the terminal equipment configured to display the second information;
presenting the first information on the second display interface when the second display interface receives a particular operation, wherein the second information is different from the first information and configured to prompt receipt of the first information;
acquiring a second user information set, the second user information set including information of at least one user;
matching source user information of the communication data with the information of the at least one user in the second user information set; and
uploading an information record presented in the second display interface to an information storage server by taking the source user information of the communication data as an index in case of successful matching, wherein the information record is configured for the information storage server to respond to an information record acquisition request from the terminal equipment.

US Pat. No. 10,691,817

ENCRYPTION FOR DISTRIBUTED STORAGE AND PROCESSING

ZeroDB, Inc., Santa Clar...

1. A method of securing data in a distributed storage and processing application, the method comprising:obtaining a cluster of computing nodes in a distributed storage and processing application, each computing node corresponding to one of a plurality of network hosts executing on a plurality of computing devices and with which the distributed storage and processing application is executed, wherein:
the cluster stores a plurality of ciphertexts each redundantly stored on two or more of the plurality of computing devices,
the ciphertexts are obtained by the distributed storage and processing application encrypted with a data-owner encryption key of a data owner that caused data in the ciphertexts to be loaded to the distributed storage and processing application, and
the plurality of ciphertexts belong to at least part of a data set upon which a computing job is being performed by the distributed storage and processing application;
accessing a transformation key with a first computing node among the cluster of nodes in the distributed storage and processing application;
transforming the ciphertext with the first computing node based on the transformation key into a transformed ciphertext configured to be decrypted with a temporary access key, wherein transforming the ciphertext with the first computing node based on the transformation key into the transformed ciphertext configured to be decrypted with the temporary access key is performed by the first computing node without the first computing node having access to the given plaintext of the given ciphertext or decrypting the given ciphertext;
accessing the transformed ciphertext and the temporary access key with a second computing node among the cluster of nodes in the distributed storage and processing application;
decrypting, by the second computing node without the second computing node having access to the transformation key or a data-owner encryption key sufficient to decrypt the ciphertext, the transformed ciphertext with the second computing node based on the temporary access key to obtain plaintext data;
performing a task with the second computing node on the plaintext data; and
storing a result of the task in memory.

US Pat. No. 10,691,816

APPLYING HOST ACCESS CONTROL RULES FOR DATA USED IN APPLICATION CONTAINERS

INTERNATIONAL BUSINESS MA...

1. A method for applying host access control rules for application containers, by a processor device, comprising:instantiating and executing a first instance of an application inside a temporary container;
during execution of the first application instance, extracting a first set of user identifiers and permissions from the temporary container;
extracting a second set of user identifiers and permissions from a host on which a working container will reside;
combining the first set and the second set of user identifiers and permissions into an aggregate set of user identifiers and permissions;
injecting the aggregate set of user identifiers and permissions into the working container using a data volume mounted into the working container; wherein the data volume is shared with the host such that the aggregate set of user identifiers and permissions include file permissions and access control rules associated with the data volume as defined by the host; and
subsequent to the injection of the aggregate set of user identifiers and permissions into the working container, commencing execution of a second instance of the application within the working container; wherein the second application instance uses the aggregate set of user identifiers and permissions during the execution thereof.

US Pat. No. 10,691,815

ATTRIBUTE LINKAGE APPARATUS, TRANSFER SYSTEM, ATTRIBUTE LINKAGE METHOD AND COMPUTER READABLE MEDIUM

MITSUBISHI ELECTRIC CORPO...

1. An attribute linkage apparatus comprising:processing circuitry to:
transmit attribute information managed by each of a plurality of data management apparatuses to one of the plurality of data management apparatuses, and cause the one of the plurality of data management apparatuses to specify an access condition to data according to the transmitted attribute information and then store the data, and
transmit, to one of the plurality of data management apparatuses that manages the data, access information in which attribute information relating to a target user out of the attribute information managed by each of the plurality of data management apparatuses has been set, and cause whether the access condition is satisfied to be determined by the one of the plurality of data management apparatus that manages the data according to the access information and an access to the data to be controlled according to the determination,
wherein the processing circuitry causes a ciphertext in which the data has been encrypted by setting the access condition to be stored, and
wherein the processing circuitry uses a decryption key in which attribute information relating to the target user has been set as the access information, and causes the one of the plurality of the data management apparatuses that manages the data to control access to the data by decrypting the ciphertext with the decryption key.

US Pat. No. 10,691,814

METHOD AND SYSTEM FOR IMPROVING SECURITY AND RELIABILITY IN A NETWORKED APPLICATION ENVIRONMENT

NETFLIX, INC., Los Gatos...

1. One or more non-transitory computer-readable media including instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of:discovering a resource associated with a distributed application, wherein the distributed application executes on a plurality of compute nodes, and the resource is discovered and monitored within a distributed computing architecture;
determining, based on one or more classification criteria, a classification for the resource;
determining whether the classification corresponds to an existing record stored within a database, wherein the existing record includes an existing counter of a quantity of the resource deployed in the distributed computing architecture;
upon determining that the classification does not correspond to any existing record within the database, then:
initializing a first record that corresponds to the classification,
initializing a first counter that is included in first record,
incrementing the first counter, and
storing the first record in the database; and
when the counter indicates that a utilization associated with the classification exceeds a pre-determined limit, publishing a first notification.

US Pat. No. 10,691,813

TECHNIQUES FOR ENCLAVE CONFIDENTIALITY MANAGEMENT

INTEL CORPORATION, Santa...

1. An apparatus, comprising:logic, at least a portion of the logic implemented in circuitry, the logic to:
determine whether a memory access request targets data associated with an enclave, the memory access request associated with a set of physical address bits comprising a set of key identifier bits and a set of memory address bits;
identify an enclave key identifier based on the enclave associated with the memory access request when the memory access request targets data associated with the enclave; and
replace the set of key identifier bits with the enclave key identifier to produce a revised set of physical address bits when the memory access request targets data associated with the enclave.

US Pat. No. 10,691,812

SECURE DATA REPLICATION IN A STORAGE GRID

Pure Storage, Inc., Moun...

1. A method, comprising: twice-encrypting data, first by a first key that is generated from an external secret and a second key that is shared by a plurality of storage clusters of a storage grid to produce once encrypted data, and second by the second key to produce twice encrypted data; storing the twice-encrypted data in one of the plurality of storage clusters; replicating the twice-encrypted data from the once encrypted data; and storing the replicated twice-encrypted data at a further one of the plurality of storage clusters.

US Pat. No. 10,691,811

ENCRYPTION TRANSITION IN A DATABASE

Micro Focus LLC, Santa C...

1. A method for data encryption, comprising:in response to an indication of an encryption transition, initiating a transition mode in a database system comprising a database of data elements including first and second data elements;
during the transition mode, the database system receiving a first query to retrieve the first data element from the database;
in response to receiving the first query, the database system determining whether the first data element is already encrypted in the database;
in response to a determination during the transition mode that the first data element is already encrypted in the database:
the database system decrypting the first data element that is already encrypted in the database; and
the database system returning the decrypted first data element in a query result of the first query;
during the transition mode, the database system receiving a second query to retrieve the second data element from the database;
in response to receiving the second query, the database system determining whether the second data element is already encrypted in the database;
in response to a determination during the transition mode that the second data element is not already encrypted in the database:
the database system returning the second data element in a query result of the second query without decryption; and
the database system encrypting the second data element in the database; and
in response to a determination that a metric of the database system has reached a defined threshold, changing the database system from the transition mode to an encryption mode that includes performing queries without determining whether data elements in the queries are encrypted in the database.

US Pat. No. 10,691,810

DETECTING VULNERABILITIES ASSOCIATED WITH A SOFTWARE APPLICATION BUILD

FMR LLC, Boston, MA (US)...

1. A system for detecting vulnerabilities associated with a software application build, the system comprising:a server computing device with a memory for storing computer-executable instructions and a processor that executes the computer-executable instructions to:
generate a software application build based upon a source code repository, including determining one or more application dependencies of the software application build;
identify one or more vulnerabilities associated with the one or more application dependencies, including:
generating a vulnerability database comprised of an aggregation of a plurality of software vulnerabilities extracted from two or more different vulnerability data sources,
scanning source code in the software application build using the vulnerability database to detect one or more vulnerabilities,
determining characteristics of each detected vulnerability, the characteristics including a group identifier, an artifact identifier, a version number, a type, a severity level, a pointcut definition, and a location in the source code, and
updating the vulnerability database to include the determined characteristics for each detected vulnerability;
for each identified vulnerability, create an aspect class based upon a package file associated with the vulnerability, the aspect class comprising vulnerability logging code based upon the pointcut definition for the vulnerability;
integrate the created aspect classes into one or more libraries of the one or more application dependencies;
generate a new package file for each of at least one of the one or more application dependencies;
integrate the new package files into the software application build;
execute the software application build, including generating one or more log statements by calling one or more of the aspect classes in the new package files; and
analyze the one or more log statements generated by the one or more aspect classes to determine which of the identified vulnerabilities were invoked during execution of the software application build, including:
extracting vulnerability information from the one or more log statements,
parsing the extracted vulnerability information to determine a development entity that manages source code associated with the extracted vulnerability information,
generating one or more vulnerability warning messages based upon the extracted vulnerability information and the determined development entity, and
transmitting the vulnerability warning messages to a user device associated with the determined development entity.

US Pat. No. 10,691,808

VULNERABILITY ANALYSIS OF SOFTWARE COMPONENTS

SAP SE, Walldorf (DE)

1. A computer-implemented method for monitoring security of an application, the method being executed by one or more processors and comprising:receiving, by the one or more processors, the application developed by a first vendor;
processing, by the one or more processors, the application using an application analysis system that comprises a plurality of analysis sensors, processing comprising:
identifying a plurality of software components used by the application that were developed by vendors other than the first vendor using a first sensor of the application analysis system to provide first component information, and a second sensor of the application analysis system to provide second component information, the first sensor comprising a binary analysis sensor configured to de-compose and analyze the application to provide the first component information comprising post-compilation information corresponding to a first portion of the plurality of software components that are included in the application after compilation, the second sensor comprising a deployment sensor configured to monitor a test deployment of the application in an execution environment based on runtime dependencies of the application and to provide the second component information comprising deployment information, and
providing a list of third-party software components associated with the application at least partially by performing a correlation of the post-compilation information and the deployment information, the list comprising each of the identified software components and component information comprising origins of the identified software components, version information, and vulnerability information, wherein the correlation eliminates duplication of the identified software components and avoids missing application components that are visible for only one of the first sensor and the second sensor;
for each software component included in the list, processing, by the one or more processors, the component information to determine a vulnerability of the software component; and
correcting the vulnerability of the software component by selectively providing a code to a computing device configured to execute the application, in response to determining the vulnerability of the software component.

US Pat. No. 10,691,807

SECURE SYSTEM BOOT MONITOR

NUVOTON TECHNOLOGY CORPOR...

1. A security device, comprising:an interface for connecting to a bus that serves a host device and a non-volatile memory (NVM) device; and
a processor, which is connected to the bus in addition to the host device and the NVM device and is configured to:
detect on the bus a boot process, in which the host device retrieves boot code from the NVM device;
extract at least a portion of the boot code from the bus; and
ascertain a security of the boot process, based on an authentic copy of at least part of the boot code of the host device, by initiating a responsive action upon detecting, while the boot process is in progress, a mismatch between the at least portion of the boot code retrieved from the NVM and the authentic copy, the responsive action comprising disrupting the boot process by disrupting one or more lines of the bus between the host device and the NVM device.

US Pat. No. 10,691,806

SELF-MEASURING NONVOLATILE MEMORY DEVICE SYSTEMS AND METHODS

Micron Technology, Inc., ...

1. A boot device configured to facilitate initializing a computing system, comprising:memory configured to store startup routine instructions and a first pointer, wherein the first pointer identifies at least a portion of the startup routine instructions in the memory; and
control logic communicatively coupled to the memory, wherein the control logic is configured to:
retrieve the startup routine instructions from the memory based at least in part on the first pointer;
determine whether the startup routine instructions are expected to be corrupted before execution of the startup routine instructions by the computing system; and
communicate the startup routine instructions to a processor of the computing system when the startup routine instructions are not expected to be corrupted to facilitate initializing the computing system by executing the startup routine instructions.

US Pat. No. 10,691,805

RESIDENT MANUFACTURING TEST SOFTWARE BASED SYSTEM FOR MITIGATING RISKS ASSOCIATED WITH VEHICLE CONTROL MODULES

GM GLOBAL TECHNOLOGY OPER...

1. A vehicle control module comprising:a hybrid memory comprising
application memory configured to store application code,
boot memory configured to store a first resident manufacturing test software (RMTS) code and boot code, wherein the first RMTS code includes a first set of risk functions, and
ephemeral test memory configured to temporarily store a second RMTS code, wherein the second RMTS code includes a second set of risk functions accessible only via the first RMTS code; and
a processor configured to
based on at least an operating mode of the vehicle control module, execute the application code, the boot code, the first RMTS code and the second RMTS code,
erase the ephemeral test memory prior to at least one of installation of the vehicle control module in a vehicle or delivery of the vehicle to a customer, and
based on the first RMTS code,
permit execution of the first RMTS code prior to and subsequent to installation of the vehicle control module in the vehicle and subsequent to removal from the vehicle, and
permit execution of the second RMTS code prior to at least one of installation of the vehicle control module in the vehicle or delivery of the vehicle to a customer.

US Pat. No. 10,691,804

PASSWORD POWER SWITCH CIRCUIT AND ELECTRONIC DEVICE

Wistron Corporation, New...

1. A password power switch circuit for an electronic device, comprising:a thermal energy conversion circuit configured to generate a plurality of sensing temperatures; and
a programmable control chip coupled to the thermal energy conversion circuit, and configured to store a password and generate a power-on signal to a central processing device of the electronic device according to sensing positions corresponding to the plurality of sensing temperatures and positions corresponding to the password, wherein the central processing device determines an operation associated with the electronic device according to the power-on signal.

US Pat. No. 10,691,803

SECURE EXECUTION ENVIRONMENT ON A SERVER

Amazon Technologies, Inc....

23. A method for securing firmware in a non-volatile memory on a server, the method comprising:verifying, by an adapter device, the firmware in the non-volatile memory while a processor is held in power reset and a programmable security logic circuit is in an unprotected mode, wherein the programmable security logic circuit couples the adapter device to the non-volatile memory and couples the processor to the non-volatile memory, wherein the programmable security logic circuit is switchable between the unprotected mode and a protected mode, and wherein in the unprotected mode the programmable security logic circuit allows the adapter device to access the firmware through the programmable security logic circuit and also allows access to the non-volatile memory by at least some devices of the server;
after verifying the firmware, setting, by the adapter device, the programmable security logic circuit to the protected mode, wherein, in the protected mode, the programmable security logic circuit denies requests, from a baseboard management controller (BMC) coupled to the processor and the adapter device, to write to the non-volatile memory and disables a communication bus between the processor and the BMC; and
causing the processor to load a customer image after the processor is released from reset.

US Pat. No. 10,691,802

SYSTEM AND METHOD FOR PROTECTING SYSTEMS FROM MALICIOUS ATTACKS

Votiro Cybersec Ltd., Te...

1. A method of disarming malicious code in a computer system having a processor, the method comprising:automatically applying, by the processor, a data value alteration model to input content having a plurality of data units, the data value alteration model being applied without first detecting malicious code in the input content and without knowing a location of data units in the input content including malicious code, the data value alteration model including operations for:
determining, by the processor, at least a portion of the plurality of data units included in the input content, the portion being determined based on the data value alteration model determining that at least one of the data units of the portion is statistically likely to include any malicious code; and
altering respective data values of the determined portion of the plurality of data units included in the input content.

US Pat. No. 10,691,801

SYSTEM AND METHOD OF TERMINATION OF A FUNCTIONALLY-LIMITED APPLICATION INTERRELATED WITH A WEBSITE AND STARTED WITHOUT INSTALLATION

AO KASPERSKY LAB, Moscow...

14. A method for detecting malicious code for a functionally-restricted website-related application launched without installation on a mobile device, the method comprising:detecting launch of the functionally-restricted website-related application;
determining at least one parameter of the functionally-restricted website-related application launched without installation;
determining a corresponding fully-functional application requiring installation based on the at least one parameter of the functionally-restricted website-related application launched without installation;
checking for malicious code in the corresponding fully-functional application requiring installation; and
stopping the launch of the functionally-restricted website-related application.

US Pat. No. 10,691,800

SYSTEM AND METHOD FOR DETECTION OF MALICIOUS CODE IN THE ADDRESS SPACE OF PROCESSES

AO Kaspersky Lab, Moscow...

1. A method for detecting malicious code in an address space of a process comprising:detecting a launching of a trusted process from a trusted executable file executing on a computer system;
detecting access to a suspicious address within a suspicious memory area in an address space of the trusted process, wherein the suspicious memory area is a memory area that lies outside the boundaries of a trusted executable image representing the trusted executable file and is an executable memory area;
analyzing one or more memory areas within a vicinity of the suspicious address space in the computer system to determine whether another executable image representing another executable file is located in the one or more memory areas;
analyzing the another executable image to determine whether the another executable image contains malicious code;
concluding malicious code is contained in the address space of the trusted process when the another executable image contains malicious code; and
performing one of removing, halting or quarantining the malicious code from the address space of the trusted process.

US Pat. No. 10,691,799

RECURRENT NEURAL NETWORKS FOR MALWARE ANALYSIS

Cylance Inc., Irvine, CA...

1. A computer-implemented method comprising:receiving or accessing executable code comprising instructions;
disassembling the executable code to generate a trace of the instructions;
applying a recurrent neural network (RNN) to the trace to generate a hidden state corresponding to each instruction to form a feature vector;
generating a concatenation of the feature vector with hand-engineered features extracted from the executable code;
determining, using a classifier and the concatenation, a likelihood that the executable code comprises malicious code; and
disallowing, based on the determining, the code from executing;
wherein the classifier is different from the RNN.

US Pat. No. 10,691,798

ANALYSIS DEVICE, ANALYSIS METHOD, AND ANALYSIS PROGRAM

NIPPON TELEGRAPH AND TELE...

1. An analysis device comprising:processing circuitry configured to
specify an implementation portion of a first code, which is a first type of code, in a cooperation mechanism that sends and receives data between an application implemented by the first code and an application implemented by a second code which is a second type of code different from the first type of code and that specifies a method in which a return value that is configured to be called by the second code is set in the cooperation mechanism, wherein the first type of code is Java, the second type of code is JavaScript, and the cooperation mechanism is Javascriptinterface;
insert, into the first code, a call code of a simulation function in which the return value of the specified method is inserted into an argument; and
analyze a data flow by observing, by using the argument and the return value of the simulation function and the specified method, the data that is sent and received between the application implemented by the first code and the application implemented by the second code,
wherein the processing circuitry observes the data that is sent and received between the application implemented by the first code and the application implemented by the second code based on a static taint analysis.

US Pat. No. 10,691,797

SYSTEMS AND METHODS FOR COMPILER GUIDED SECURE RESOURCE SHARING

Big Stream Solutions, Inc...

1. A data processing system comprising:an Input/output (I/O) interface to receive incoming data; and
an in-line hardware accelerator coupled to the I/O interface, the in-line hardware accelerator is configured to receive the incoming data from the I/O interface and to automatically remove all timing channels that form through any shared resources, wherein the in-line accelerator is further configured based on a compiler to perform a generic bandwidth reservation based on latency insensitive design for automatically removing all timing channels that form through any shared resource.

US Pat. No. 10,691,796

PRIORITIZING SECURITY RISKS FOR A COMPUTER SYSTEM BASED ON HISTORICAL EVENTS COLLECTED FROM THE COMPUTER SYSTEM ENVIRONMENT

CA, Inc., San Jose, CA (...

1. A method of identifying security risks in a computer system comprising a plurality of computers executing a plurality of applications, the method comprising:receiving event data about threat events associated with a set of applications executing on a set of computers in the computer system;
for each event, comparing a set of parameters associated with the event with a set of historical parameters maintained for a similar event;
based on the comparisons, defining a normality characterization for each event to express a probability of occurrence for the event; and
based on the normality characterization, defining a prioritized display of security risks due to the threat events associated with the set of application,
wherein defining a prioritized display of security risks due to the threat events associated with the set of application comprises computing a residual risk of loss in the computer system due to the security risks as a function of (i) a risk due to a threat of an exploit of all applications, (ii) a probability of occurrence of a set of credential threat events, and (iii) a probability of occurrence of a set of application threat events.

US Pat. No. 10,691,795

QUANTITATIVE UNIFIED ANALYTIC NEURAL NETWORKS

Certis Cisco Security Pte...

1. A method for quantitative unified analysis of unstructured threat intelligence data, the method to be performed by a computer system comprising:receiving unstructured threat intelligence data from molecular level sources, wherein the unstructured threat intelligence data comprises security events generated from the molecular level sources; uniting the received unstructured threat intelligence data by translating the received threat intelligence data into a uniformed meta-format and storing the translated data in a database, wherein each translated data includes at least a time component;
determining isolated data points from the translated data stored in the database by grouping the translated data into groups, wherein the determining comprises:
determining a first group of translated data from the translated data where data in the first group has time components contained within a first time period into a first group,
determining at least one cluster of data from the translated data in the first group using unsupervised machine learning techniques,
identifying at least one sparse cluster from the at least one clusters having a total number of data points below a predefined threshold, and
categorizing the data in each of the at least one sparse clusters, identified as having the total number of data points below the predefined threshold, as isolated data points; determining data outliers from the isolated data points;
generating a learned function using the data outliers; and
providing the generated learned function to at least one of a plurality of upstream sources to update a security rule of the at least one of the plurality of upstream sources using the provided generated learned function, wherein the updated security rule set is used to filter threats to the at least one of the plurality of upstream sources.

US Pat. No. 10,691,794

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR DETECTING MODEL SECURITY

Alibaba Group Holding Lim...

1. A method for detecting a model security, the method comprising:obtaining result data computed by using a model for current input data, wherein the result data comprises intermediate result data or output result data;
obtaining, in a trusted execution environment, second result data computed by using the model for a plurality of samples, wherein the second result data comprises second intermediate result data or second output result data;
obtaining a GAN through training by using the second result data, wherein the GAN comprises a generator and the discriminator, and wherein obtaining the GAN comprises:
obtaining, in the trusted execution environment, the discriminator through training based on a generative adversarial network (GAN) framework, the model, and the plurality of samples;
generating data to be input to the generator based on the second result data; and
obtaining the generator through training based on the second result data, the data to be input to the generator, and the GAN framework;
discriminating the result data by using the discriminator and based on comparing respective distributions of the result data and the second result data, to detect whether the model is currently secure; and
determining a security detection result of the model.

US Pat. No. 10,691,793

PERFORMANCE OF DISTRIBUTED SYSTEM FUNCTIONS USING A TRUSTED EXECUTION ENVIRONMENT

ALPHAPOINT, New York, NY...

1. A method for securely executing a function of a distributed system, the method comprising:responsive to processing a function request identifying a function of the distributed system by a node computing entity, accessing application program code corresponding to the function within a trusted execution environment, wherein the node computing entity comprises (a) a processor, a memory, and a communication interface and (b) one or more partitions defining the trusted execution environment;
based on data stored in a secured shared resource maintained by the distributed system, executing the application program code within the trusted execution environment to generate a result;
generating a new entry comprising the result and encrypting at least a portion of the new entry using an encryption key, within the trusted execution environment; and
posting the encrypted new entry to the secure ledger;
wherein the function request comprises user identifying information and the method further comprises:
validating the user identifying information and user permissions corresponding to a user identified by the user identifying information; and
responsive to validating the user identifying information and user permissions, identifying the trigger corresponding to the function;
wherein, responsive to determining that the user permissions do not permit a user requesting the function to perform the function, performing a modified function that is permitted by the user permissions to generate the result.

US Pat. No. 10,691,792

SYSTEM AND METHOD FOR PROCESS HOLLOWING DETECTION

Carbon Black, Inc., Walt...

1. A method for remediating a process hollowing intrusion on a user device, the method comprising:detecting, by a security agent executing in user space on the user device, a process starting on the user device;
preparing, by the security agent, the process to monitor Application Programming Interface (API) calls between the process and an operating system of the user device;
determining, by the security agent, whether the process is associated with a process hollowing intrusion by one or more of the API calls by comparing pages of memory pointed to by respective entry point addresses of a child process prior to and post modification by the one or more of the API calls; and
executing, by the security agent, security policies against the process associated with the process hollowing intrusion.

US Pat. No. 10,691,791

AUTOMATIC UNPACKING OF EXECUTABLES

PayPal, Inc., San Jose, ...

1. A method, comprising:executing a malicious executable to create an unpacked version of the malicious executable in a physical memory;
dumping at least a portion of the physical memory, containing the unpacked version of the malicious executable, to a storage device;
determining an initial entry point for the malicious executable, wherein the initial entry point does not point to an unpacking function for the malicious executable; and
performing one or more post-processing operations to generate a new version of the malicious executable, wherein the new version of the malicious executable includes the initial entry point.

US Pat. No. 10,691,790

AUTONOMOUS SECRETS MANAGEMENT FOR A TEMPORARY SHARED ACCESS SIGNATURE SERVICE

Microsoft Technology Lice...

1. A method for managing temporary shared access signature (“SAS”) services, the method comprising:receiving, at a secrets management service (“SMS”), from a temporary SAS service, a validation request to validate a temporary access request for an account resource;
determining that an account associated with the validation request is further associated with a corresponding storage location of a SAS key for authenticating temporary access to account resources for the account;
communicating the storage location for the SAS key as validation of the temporary access request;
receiving, from the temporary SAS service, a SAS key request for the SAS key; and
communicating the SAS key to the temporary SAS service.

US Pat. No. 10,691,789

AUTHENTICATION/SECURITY USING USER ACTIVITY MINING BASED LIVE QUESTION-ANSWERING

International Business Ma...

1. A processor-implemented method comprising:data mining, by one or more processors, past activities of a particular user, wherein the past activities are detected by physical monitoring devices that monitor the particular user;
creating, by one or more processors, a first authentication question and answer for the particular user based on the past activities of the particular user that the one or more processors have data mined, wherein the first authentication question can be answered by a second user who is not permitted to use the electronic device used by the particular user;
receiving, by one or more processors, a request to use an electronic device used by the particular user;
in response to receiving the request to use the electronic device used by the particular user, transmitting, by one or more processors, the first authentication question to the electronic device used by the particular user;
receiving, by one or more processors, an authentication answer to the first authentication question from the electronic device used by the particular user;
determining, by one or more processors, whether the authentication answer from the electronic device matches the answer for the first authentication question;
in response to determining that the authentication answer from the electronic device matches the answer for the first authentication question, remotely enabling, by one or more processors, the electronic device for the particular user;
detecting, by one or more processors, that the second user is presently proximate to the electronic device used by the particular user;
in response to detecting that the second user is presently proximate to the electronic device used by the particular user, blocking, by one or more processors, the first authentication question from being further transmitted to the electronic device used by the particular user and generating, by one or more processors, a second authentication question that cannot be answered by the second user; and
transmitting, by one or more processors, the second authentication question to the electronic device used by the particular user.

US Pat. No. 10,691,788

SYSTEMS AND METHODS FOR PROVISIONING A CAMERA WITH A DYNAMIC QR CODE AND A BLE CONNECTION

ADEMCO INC., Golden Vall...

17. A system comprising:a user device; and
a camera connected to the user device via a Bluetooth connection;
wherein the camera generates and transmits a camera PIN to the user device via the Bluetooth connection,
wherein the user device generates a device PIN,
wherein the user device generates a QR code including the camera PIN received from the camera and the device PIN generated by the user device and displays the QR code on a screen of the user device,
wherein the camera captures an image of the QR code and decodes the QR code,
wherein the camera determines whether the QR code includes the camera PIN transmitted to the user device,
wherein the camera decodes the device PIN in the QR code and transmits the device PIN decoded from the QR code to the user device via the Bluetooth connection, and
wherein the user device determines whether the device PIN received from the camera via the Bluetooth connection matches the device PIN generated by the user device.

US Pat. No. 10,691,787

METHOD OF AUTHENTICATING INTEGRATED CIRCUITS USING OPTICAL CHARACTERISTICS OF PHYSICALLY UNCLONABLE FUNCTIONS

1. A method of authenticating an integrated circuit, the method comprising:stimulating a defect area on the integrated circuit, the defect area comprising high energy ions implanted into crystal lattices of semiconductor material of the integrated circuit to form a PUF;
sensing with an optical sensor an optical characteristic of light emitted from the PUF when stimulated; and
comparing, via a controller, a value associated with the optical characteristic of the PUF with a stored value in a circuit database, wherein the stored value is associated with a previously-logged optical characteristic of a PUF of a known authentic circuit.

US Pat. No. 10,691,786

USER INTERFACE METHOD CAPABLE OF SURVEY

GOODWILLHUNTING, INC., S...

1. A user interface method capable of survey, when a lock screen mode is switched to a main screen mode in a mobile device in which an unlock mobile application software capable of survey is installed, the user interface method capable of survey comprises:a step of entering the main screen mode, when an input means of the mobile device generates a gesture event corresponding to a directional pattern on a second split screen,
wherein the lock screen mode comprises a first split screen and a second split screen separately divided from the first split screen, survey content is displayed on the first split screen, and two or more answer screens, each of which comprises answer content matched with the survey content, and the directional pattern corresponding to the answer screens is defined and visualized on the second split screen,
wherein before entering the main screen mode, the mobile device is characterized by displaying a cumulative answer result during a preset time, when generating the gesture event.

US Pat. No. 10,691,785

AUTHENTICATION OF A USER DEVICE COMPRISING SPATIAL TRIGGER CHALLENGES

1. A user device, comprising:a data storage device; and
a processor that:
selects, from the data storage device, an authentication challenge comprising a first spatial challenge, wherein the first spatial challenge comprises an action to be performed at least one of a specific physical location or a specific physical orientation;
causes the first spatial challenge to be presented by the user device;
receives a first sensor output indicating a first spatial action of the user device and wherein the first spatial challenge further comprises a validity period and the received first sensor output, in order to be considered in compliance with the first spatial challenge, must be received within the validity period;
determines whether the authentication challenge is successful, further comprising determining the first sensor output indicates compliance with the first spatial challenge; and
upon the determination that the authentication challenge is successful, grants the user device access to a secured asset; and
wherein, at a time outside of the validity period, the first spatial challenge is displayed on the user device as a first augmented reality object indicating that no virtual interaction with the first augmented reality object is possible that would be determined as compliant with the first spatial challenge.

US Pat. No. 10,691,784

AUTHENTICATION INTEGRITY PROTECTION

PEARSON EDUCATION, INC., ...

1. An adaptive authentication system to adaptively secure a set of access operations with respect to one or more electronic resources, the adaptive authentication system comprising:one or more adaptive processing devices; and
one or more non-transitory, computer-readable storage media storing instructions which, when executed by the one or more adaptive processing devices, cause the one or more adaptive processing devices to perform actions including:
detecting a plurality of endpoint subsystems communicatively coupled to the one or more adaptive processing devices;
detecting a request received via an endpoint device of an endpoint subsystem of the plurality of endpoint subsystems;
initiating adaptive authentication with respect to the endpoint device, the adaptive authentication comprising:
initiating a first stage of authentication of the endpoint device, the first stage of authentication comprising activation one or both of a first set of one or more sensors at the endpoint device and a second set of one or more sensors at the endpoint device to capture phenomena at the endpoint device;
detecting that the endpoint device is colocated with at least one other endpoint device of the plurality of endpoint subsystems;
initiating a second stage of authentication of the endpoint device, and receiving additional sensor-based data detected at the endpoint device consequent to the second stage of authentication;
based at least in part on the additional sensor-based data detected at the endpoint device consequent to the second stage of authentication, initiating a third stage of authentication of a set of colocated endpoint devices, the set of colocated endpoint devices comprising the endpoint device and the at least one other endpoint device of the plurality of endpoint subsystems; and
controlling access of the set of colocated endpoint devices to resources based at least in part on further sensor-based data received consequent to the third stage of authentication.

US Pat. No. 10,691,783

AUTHENTICATION INTEGRITY PROTECTION

PEARSON EDUCATION, INC., ...

1. An adaptive authentication system to adaptively secure a set of access operations with respect to one or more electronic resources, the adaptive authentication system comprising:one or more adaptive processing devices; and
one or more non-transitory, computer-readable storage media storing instructions which, when executed by the one or more adaptive processing devices, cause the one or more adaptive processing devices to perform actions including:
detecting initiation of set of one or more access events initiated by the endpoint device;
causing adaptive authentication with respect to the endpoint device, the adaptive authentication comprising:
initiating a stage of authentication of the endpoint device, the stage of authentication comprising activation one or both of a first set of one or more sensors at the endpoint device and a second set of one or more sensors at the endpoint device to capture phenomena at the endpoint device, where:
one or both of the first set of one or more sensors and the second set of one or more sensors is communicatively connected to the one or more adaptive processing devices;
the first set of one or more sensors correspond to a first sensor type; and
the second set of one or more sensors correspond to a second sensor type that is different from the first sensor type;
receiving sensor-based data that is based at least in part on one or both the first set of one or more sensors and/or the second set of one or more sensors first set of one or more sensors activated with the first stage of authentication;
receiving additional sensor-based data detected at the endpoint device and detecting a deviation of at least part of the additional data with respect to the sensor-based data previously received;
generating an authentication score with respect to the endpoint device that is based at least in part on the additional sensor-based data and the sensor-based data previously received;
initiating one or more additional stages of authentication of the endpoint device at least in part by transferring a command to cause an activation adjustment that is a function of the authentication score, where the activation adjustment adjusts operation of one or more of the first set of one or more sensors, the second set of one or more sensors, and/or a third set of one or more sensors; and
consequent to the one or more additional stages of authentication, receiving further sensor-based data detected at the endpoint device, and controlling access of the endpoint device to resources based at least in part on the further sensor-based data.

US Pat. No. 10,691,782

METHOD OF ACQUIRING BIOMETRIC DATA AND ELECTRONIC DEVICE THEREFOR

Samsung Electronics Co., ...

1. An electronic device comprising:a display;
a fingerprint sensor configured to acquire fingerprint data through a display region, the display region being at least a partial region of the display;
a memory configured to store an out-of-box experience (OOBE) application and a fingerprint registration application; and
a processor configured to:
upon an initial use of the electronic device, execute the OOBE application to display a screen unrelated to fingerprint registration, the screen including a first graphical object displayed at a region of the display corresponding to the display region of the fingerprint sensor;
acquire at least one first fingerprint data from a first user input on the first graphical object using the fingerprint sensor;
execute the fingerprint registration application, wherein the execution thereof includes acquiring second fingerprint data from a second user input on the display region; and
generate fingerprint information about a user using the at least one first fingerprint data and the second fingerprint data.

US Pat. No. 10,691,781

APPARATUS AND METHOD FOR DEVICE SECURITY

QUALCOMM Incorporated, S...

1. A method for authenticating, the method comprising:acquiring a first fingerprint image at an area proximate a first location of contact on a touch-sensitive surface;
performing a first authentication process based on the first fingerprint image;
acquiring a second fingerprint image at an area proximate a second location of contact on the touch-sensitive surface;
determining a difference between a characteristic of the second fingerprint image and a characteristic of the first fingerprint image; and
performing a second authentication process based upon whether the difference between the characteristic of the second fingerprint image and the characteristic of the first fingerprint image is greater than a threshold.

US Pat. No. 10,691,780

METHODS AND APPARATUS FOR AUTHENTICATION IN AN ELECTRONIC DEVICE

Cirrus Logic, Inc., Aust...

1. An electronic device, comprising:one or more input devices, for receiving biometric input from a user and generating one or more biometric input signals;
an applications processor;
a mixer configurable by the applications processor to provide a first signal path between one or more of the input devices and the applications processor; and
a biometric authentication module coupled to the one or more input devices via a second signal path that does not include the mixer, for performing authentication of at least one of the one or more biometric input signals.

US Pat. No. 10,691,779

SERVICE TOOL CREDENTIAL MANAGEMENT

OTIS ELEVATOR COMPANY, F...

9. A method of service tool credential management comprising:sending a credential request from a service tool to a networked server via a first communication pathway to access an equipment controller with the service tool via a second communication pathway, wherein the equipment controller is configured to control and monitor one or more elevator or escalator components;
receiving an access credential at the service tool responsive to the credential request; and
utilizing, by the service tool, one or more fields of the access credential during interactions with the equipment controller via the second communication pathway to enable a level of access for the service tool to the equipment controller corresponding to the access credential based on the equipment controller verifying at least a portion of the access credential with the networked server via a third communication pathway,
wherein the level of access for the service tool is set based on a location of a system controlled by the equipment controller, and wherein the one or more fields of the access credential comprise at least one key associated with the location, the system, and the level of access.

US Pat. No. 10,691,778

METHOD AND SYSTEM FOR PROVIDING SECURE CODECS

GOOGLE LLC, Mountain Vie...

1. An apparatus for securely providing digital content, comprising:a processor configured to execute executable components; and
a non-transitory computer readable medium storing executable components comprising:
an interface component configured to receive digital content;
a client side security component configured to perform actions comprising:
receiving a secure timing signal representative of a periodic pulse from a secure clock;
receiving a system timing signal representative of another periodic pulse from a system clock; and
determining if the digital content has been tampered with based on a comparison of the system timing signal and the secure timing signal; and
an authentication component in communication with the interface component and the client side security component, and configured to perform actions comprising:
receiving the digital content tamper determination from the client side security component; and
enabling access to the digital content responsive to the digital content tamper determination indicating that the digital content has not been tampered with.

US Pat. No. 10,691,777

CARE PLAN ADMINISTRATION: PATIENT FEEDBACK

Preventice Solutions, Inc...

1. A method for providing feedback for a care plan for a patient, the method comprising:receiving, at a care plan management system, a care plan specifying a plurality of assigned tasks for the patient to perform, timing information specifying when each of the plurality of assigned tasks should be performed, and a plurality of observation metrics that each indicate a type of biometric data to monitor;
selecting, based on the care plan, at least one monitoring device to use in administering the care plan;
configuring, at the care plan management system based on the care plan, the at least one monitoring device to collect biometric data corresponding to the plurality of observation metrics;
receiving the biometric data collected using the at least one monitoring device, wherein the biometric data comprises a plurality of detected events relating to the biometric data, wherein a first event of the plurality of events is initially classified as a first type of event using the at least one monitoring device, and wherein the at least one monitoring device has fewer computational resources relative to the care plan management system;
selecting the first event, from among the plurality of detected events, for reclassification, based on the initial classification, and in response reclassifying the first event as a second type of event using the care plan management system;
monitoring adherence of the patient to completing the plurality of assigned tasks according to the timing information specified in the care plan;
dynamically determining a treatment plan for the patient, based on a patient demographic to which the patient is determined to belong, patient attributes and at least one of patient preferences and capabilities; and
treating the patient, based on the treatment plan, the reclassified first event, and the monitored adherence.

US Pat. No. 10,691,776

METHODS AND SYSTEMS FOR PREDICTING ADHERENCE TO MULTIPLE SCLEROSIS TREATMENT

Express Scripts Strategic...

1. A method comprising:receiving, on a processor of a benefit manager server, a plurality of claims from at least one pharmacy device over the Internet;
identifying, on the processor of the benefit manager server, a population of members undergoing a Multiple Sclerosis treatment based on claims data received from the at least one pharmacy device over the Internet;
selecting, on the processor of the benefit manager server, a training population including a subset of the members undergoing the Multiple Sclerosis treatment;
transmitting a request from the benefit manager server to a database over the Internet for member data associated with the subset of the members undergoing Multiple Sclerosis treatment;
receiving, on the processor of the benefit manager server, member data for the training population, the member data including adherence data, prescription data, and demographic data associated with the subset of the members undergoing the Multiple Sclerosis treatment from the database over the Internet;
generating, on the processor of the benefit manager server, a predictive model comprising a plurality of variables;
determining, on the processor of the benefit manager server, one or more principal components from the plurality of variables included within the member data, the one or more principal components having an eigenvalue greater than or equal to about 1;
associating, on the processor of the benefit manager server, each of the plurality of variables with one of the one or more principal components based on a statistical significance between each of the plurality of variables and the one or more principal components;
determining, on the processor of the benefit manager server, a rank order statistic associated with the plurality of variables relative to adherence to the Multiple Sclerosis treatment;
discarding, on the processor of the benefit manager server, one or more of the plurality of variables found to be statistically insignificant to a target variable based on the one or more principal components and the rank order statistic;
selecting, on the processor of the benefit manager server, a modeling subset of the plurality of variables based on the rank order statistic associated with each of the plurality of variables, the modeling subset excluding any discarded variables;
adjusting, on the processor of the benefit manager server, the predictive model such that the predictive model only includes variables included in the modeling subset; and
evaluating, on the processor of the benefit manager server, the predictive model for statistical significance to adherence to the Multiple Sclerosis treatment,
wherein the population of members undergoing Multiple Sclerosis treatment comprises more than one thousand members.

US Pat. No. 10,691,774

SYSTEMS AND METHODS FOR A COMPREHENSIVE ONLINE HEALTH CARE PLATFORM

CAMBIA HEALTH SOLUTIONS, ...

1. A method, comprising:providing, for a user, remote access to a server over a network via a remote user device communicably coupled to the network, wherein the server includes a logic subsystem;
providing, for one or more health care providers, remote access to the server over the network via one or more remote servers communicably coupled to the network;
responsive to a query from the user via the remote user device, the server executing machine readable instructions stored on the logic subsystem for:
querying a first database of a non-transitory remote storage device communicably coupled to the network for user information including one or more characteristics of the user;
querying a second database of the non-transitory remote storage device for a list of medications and medication information about each medication in the list of medications, based on the query from the user;
retrieving the queried user information from the first database;
retrieving the queried list of medications and the medication information for each medication in the list of medications from the second database, wherein the medication information includes an indication of a clinical effectiveness of each medication, prescription experience data characterizing experiences of patients with each medication in the list of medications, cost factor, insurance coverage, and technical secondary effects;
correlating the user information retrieved from the first database with the medication information retrieved from the second database;
calculating a user personalized grade for each medication in the list of medications based on the correlated medication information and user information;
transmitting the user personalized grade and the medication information to the remote user device over the network;
transmitting the user information and the medication information to the one or more health care providers on the one or more remote servers over the network;
receiving one or more health risk notifications from the one or more health care providers via the one or more remote servers;
displaying to the user, on a display of the remote user device, a compare selection that presents a compare display screen, the compare display screen displaying a first selection of a subset of medications from the list of medications, and further displaying display information including displaying the cost factor simultaneously with each of the user personalized grade, the prescription experience data, and the technical secondary effects for each identified medication in the list of medications, where the display information for each identified medication is directly adjacent to the display information for at least one other identified medication, where the display information for at least one identified medication is horizontally aligned with the display information for at least one other identified medication, and where the user personalized grade is displayed in a larger font size than a font size of other displayed text; and thereafter
receiving the first selection from the user via the remote user device of the selected subset for comparison;
displaying to the user, on the display, the compare display screen;
receiving a second selection from the user via the remote user device of a medication from the selected subset as a selected medication;
receiving a purchase request from the user via the remote user device for the selected medication;
determining whether the selected medication poses more than a threshold amount of risk to the user based on one of the received health risk notifications; and
responsive to the selected medication posing more than the threshold amount of risk to the user:
immediately displaying to the user, on the display of the remote user device, an intervention program based on the one of the received health risk notifications; and
preventing the user from purchasing the selected medication posing more than the threshold amount of risk to the user by not fulfilling the purchase request.

US Pat. No. 10,691,773

CELL PROCESSING TECHNIQUES

GENERAL ELECTRIC COMPANY,...

1. A cell therapy manufacturing system to achieve a targeted cell count of expanded cells in a given time, comprising:a sample container configured to hold a cell therapy sample;
a tracking device coupled to the sample container;
a bioreactor configured to process the cell therapy sample;
a reader co-located with the bioreactor or a sample processing station, and configured to receive an identification signal from the tracking device; and
a controller operatively coupled to the reader and configured to:
receive the identification signal from the tracking device at a time using the reader;
automatically access a sample processing timeline of a processing protocol associated with the identification signal, wherein the sample processing timeline is estimated using a discrete-event simulation providing a forecasted probabilistic duration for a cell expansion in the bioreactor to arrive at a targeted cell count of expanded cells in the cell therapy sample, during the computed processing protocol duration;
automatically determine a real-time cell count of expanded cells in the cell therapy sample using the bioreactor at the time the identification signal is received;
determine if variations from the processing protocol have occurred that alter the sample processing timeline based at least in part on the time of receipt of the identification signal and the real-time cell count;
determine one or more estimated updated completion times of the processing protocol using the discrete-event simulation by updating a set of assumptions used in the discrete-event simulation with at least the real-time cell count of expanded cells in the cell therapy sample of the bioreactor, quality state information of the cells in the cell therapy sample of the bioreactor, and availability of a next sample processing device in a workflow of the cell therapy sample; and
automatically send the one or more updated completion times of the sample processing timeline to sample processing devices when the one or more updated completion times are different from a previous completion time of the sample processing timeline, wherein the updated completion times are used to allocate sample processing assignments and change flow patterns of the cell therapy sample within the sample processing devices, and wherein the flow patterns of the cell therapy sample are a function of optimal machine assignment and machine availability, reliability, or comparative effectiveness on a given cell sample.

US Pat. No. 10,691,772

HIGH-PERFORMANCE SPARSE TRIANGULAR SOLVE ON GRAPHICS PROCESSING UNITS

Advanced Micro Devices, I...

1. A method, comprising:in a memory device, storing a sparse triangular matrix as a compressed sparse row (CSR) dataset;
in a processing unit comprising a plurality of processing cores, calculating a value for each of a subset of factors in a first vector by, for each factor in the subset of factors in the first vector, calculating the value of the factor by:
identifying for the factor a set of one or more antecedent factors in the first vector, wherein the value of the factor is dependent on each of the one or more antecedent factors;
in response to a completion array indicating that all of the one or more antecedent factor values are solved, initiating a thread in one of the plurality of processing cores for calculating the value of the factor, wherein the thread is executed in the one of the plurality of processing cores based on
one or more elements in a row of the matrix, and
a product value corresponding to the one or more antecedent factor values, the value of the factor, and the one or more elements in the row; and
in the completion array, asserting a completion flag for the factor indicating that the factor is solved.

US Pat. No. 10,691,771

SYSTEM AND METHOD TO HARDCODE INTERGER LINEAR OPTIMIZATION PROBLEMS ON PHYSICAL IMPLEMENTATIONS OF THE ISING MODEL

UNIVERSITIES SPACE RESEAR...

1. A method for generating an embedding pattern used for solving an Integer Linear Programming problem using a Physical Ising Machine characterized by an hardware graph architecture comprising a plurality of blocks, each block comprising a plurality of spins, the method comprising: use of a processing device for: obtaining an indication of an ILP problem to solve using the Physical Ising Machine; wherein the ILP problem is defined using an integer encoding to binary variables, with a linear objective function and a set of inequality or equality constraints; decomposing the ILP into an ordered sequence of clusters representative of the ILP problem; selecting an ordered sequence of adjacent blocks in the hardware graph collectively mapping a subset of the spins in the selected blocks in 1-to-1 correspondence to the ILP binary variables; determining a set of auxiliary spins in each block that are associated to the variables that keep track of the total or partial weighted sum of the one or more constraints in the ILP; further wherein the determined blocks comprises a set of terminals for providing a coupling between the blocks that could be put into 1-to-1 correspondence with the duplicated auxiliary variables in each set of adjacent cluster, two-by-two; and providing an indication of the how to hard-code the embedded Ising Hamiltonian on the selected block structure;wherein the “decomposing of the ILP problem into an ordered sequence of clusters representative of the ILP problem” comprises determining a first cluster K1 and a second cluster K2 such that the variables in each ILP inequality or equality constraints are associated either to K1 or K2, and for each ILP constraint: a new sub-constraint is created where the weighted sum of variables obtained by changing the original constraint formulation by setting all the variables not in K1 to zero, is required to sum to a value equal to an arbitrary weighted sum of newly introduced auxiliary variables, G(1); a new sub-constraint is created where the weighted sum of variables obtained by changing the original constraint formulation by setting all the variables not in K2 to zero, is required to sum to a value equal to a second arbitrary weighted sum of newly introduced auxiliary variables G(2), minus the sum defined by G?(1): a copy of the weighted sum G(1); a new sub-constraint is created where the weighted sum G(2) is copied to G?(2), another set of variables required to be subject to the original ILP constraint defined over all the variables.

US Pat. No. 10,691,770

REAL-TIME CLASSIFICATION OF EVOLVING DICTIONARIES

Colossio, Inc., Chicago,...

1. A computer-implemented method, comprising:identifying an emotion identifier from a network message using an emotion identifier table;
separating the emotion identifier from the network message, and splitting a remaining portion of the network message into multiple tokens, each of the multiple tokens delimited by a space or a punctuation mark;
determining a message sentiment score for the network message based on an emotion identifier sentiment score associated with the emotion identifier in the emotion identifier table, and on at least one of the multiple tokens;
adding a first token from the multiple tokens to the emotion identifier table based on a contribution from the first token to the message sentiment score;
associating a sentiment score for the first token in the emotion identifier table based on the contribution of the first token to the message sentiment score; and
modifying an emotion identifier sentiment score of the first token when the first token is already included in the emotion identifier table based on the contribution of the first token to the message sentiment score;
wherein adding the first token from the multiple tokens to the emotion identifier table comprises selecting the first token such that the contribution from the first token to the message sentiment score is at least two standard deviations above an average contribution of the multiple tokens to the message sentiment score.

US Pat. No. 10,691,769

METHODS AND APPARATUS FOR REMOVING A DUPLICATED WEB PAGE

ALIBABA GROUP HOLDING LIM...

1. A method for removing a duplicated web page, the method comprising:acquiring a plurality of web pages of a predetermined type;
extracting a feature code of a current web page and a number of text characters contained in the current web page;
looking up a data table to determine whether the feature code is contained in the data table; and
in response to the feature code being contained in the data table:
reading a number of text characters of the web page referred to in the data table corresponding to the feature code, and
discarding the current web page when a difference between the read number of text characters and the extracted number of text characters is within a range.

US Pat. No. 10,691,768

METHOD AND APPARATUS FOR PROVIDING INFORMATION BASED ON WEBPAGE

SAMSUNG ELECTRONICS CO., ...

10. A method by which an apparatus comprising a display provides information, the method comprising:obtaining web resources of a web page;
parsing the obtained web resources of the web page;
laying out each component included in the web page by using a parsed result;
obtaining position information and size information regarding each component included in the web page;
detecting at least one blank area included in the web page according to layout information regarding each component included in the web page;
based on the detected at least one blank area not having a size for providing device-executable function data, combining a plurality of blank areas with one another by rearranging valid components or block areas included in the web page or enlarge one of the at least one detected blank area;
identifying whether target data has a size that matches size information regarding the one of the at least one blank area; and
based on identifying that the target data has the size that matches the size information regarding the one of the at least one blank area:
identifying whether the target data is appropriate for the one of the at least one blank area based on a similarity between a keyword regarding the target data and a keyword adjacent to the at least one blank area; and
based on identifying that the target data is appropriate for the one of the at least one blank area, pushing the target data to the one of the at least one blank area.

US Pat. No. 10,691,767

SYSTEM AND METHOD FOR CODED PATTERN COMMUNICATION

Samsung Electronics Co., ...

1. An apparatus comprising:at least one image sensor configured to capture a plurality of images;
at least one communication interface;
at least one display; and
at least one processor coupled to the at least one image sensor, the at least one communication interface, and the at least one display, the at least one processor configured to:
identify a network address encoded into a first optical pattern within one or more first images of the plurality of captured images;
transmit a first request to the network address;
identify a unique identifier encoded into a second optical pattern within one or more second images of the plurality of captured images;
transmit a second request containing the unique identifier;
receive session information; and
output, to the at least one display, extended reality-related content obtained during a session associated with the session information.

US Pat. No. 10,691,766

ANALYZING CONCEPTS OVER TIME

International Business Ma...

1. A method, in an information handling system comprising a processor and a memory, for analyzing concept vectors over time to detect changes in a corpus, the method comprising:generating, by the system, at least a first concept vector set V1, . . . , Vk derived from a first set of concept sequences over k concepts that are extracted from the corpus and applied to a vector learning component;
generating, by the system, at least a second concept vector set V1, . . . , V?k+b derived from a concatenation of the first set of concept sequences and a second set of concept sequences over k old and b new concepts that are extracted from the corpus and applied to the vector learning component, where the second set of concept sequences is effectively collected after collection of the first set of concept sequences;
identifying, by the system, a field vector VF for a specified field of interest represented by one or more concept vectors in the first concept vector set relating to a technology area of interest;
identifying, by the system, a field vector V?F for the specified field of interest represented by one or more concept vectors relating to a technology area of interest in the second concept vector set; and
performing, by the system, a natural language processing (NLP) analysis of the first concept vector set and second concept vector set to identify one or more concept vectors V?j, 1?j?k+b with a specified affinity to one or more concepts that are central to the technology area of interest such that:
a number of occurrences of a concept Cj of V?j in the second set of concept sequences exceeds a first threshold value;
a computed first cosine distance value Aj=cos(V?j,V?F) between each vector pair V?j, V?F exceeds a second threshold value; and
either j>k or a computed second cosine distance value Bj=cos(Vj,VF) is less than the computed first cosine distance value Aj by a third threshold value.

US Pat. No. 10,691,765

PERSONALIZED SEARCH RESULTS

GOOGLE LLC, Mountain Vie...

1. A method performed by one or more processors, the method comprising:constructing a probability model from information regarding computer based search result interactions of a user, to estimate a probability that the user will select a certain type of specialized search result,
wherein constructing the probability model from information regarding the computer based search result interactions of the user comprises constructing the probability model based on a quantity of past selections by the user of search results that are members of the certain type of specialized search result, the search results being past search results responsive to past search queries;
in response to receiving a search query from the user, the search query being submitted by the user via a computing device of the user:
searching sources of information, based on the search query, to determine a set of search results that match the search query;
using the estimated probability, determined using the constructed probability model, to select, from the set of search results, one or more search results that are of the certain type of specialized search result, the selected one or more search results that are of the certain type of specialized search result including at least a given document that is of the certain type of specialized search result; and
outputting, for presentation to the user via the computing device of the user, the selected one or more search results that are of the certain type of specialized search result.

US Pat. No. 10,691,764

SEARCH ENGINE OPTIMIZATION TECHNIQUES

International Business Ma...

1. A computer-implemented method comprising:cataloging one or more functionalities of one or more automated conversation exchange programs via a set of hypertext markup language pages, wherein the automated conversation exchange programs comprise one or more computer programs capable of carrying out one or more conversational exchanges with a user;
semantically interlinking the set of hypertext markup language pages by adding, to each of the hypertext markup language pages, one or more hyperlinks to one or more of the other hypertext markup language pages based on semantic similarity of hypertext markup language page content;
facilitating discoverability, via one or more search engines, of the set of hypertext markup language pages based on the semantic interlinking; and
redirecting a user search visit to one of the discoverable hypertext markup language pages, via one of the one or more search engines, to one of the automated conversation exchange programs, wherein redirecting the user search visit to the automated conversation exchange program comprises providing the automated conversation exchange program with context information pertaining to the user search visit via one or more deep conversational links;
wherein the method is carried out by at least one computing device.

US Pat. No. 10,691,763

TRUSTABLE WEB SEARCHING VERIFICATION IN A BLOCKCHAIN

International Business Ma...

1. A method, comprising:performing a plurality of web page interactions by a plurality of network node devices operating on a network, wherein the plurality of network node devices include peer nodes each having a blockchain ledger to store and maintain information identifying web page referral relationships, and wherein the plurality of network node devices further include at least one query node providing access, by a user, to the peer nodes;
validating web pages based on a consensus reached by peer nodes using information contained in the blockchain ledger;
storing a valid web page package with the valid web pages in the blockchain ledger of the peer nodes;
calculating a page value for each of the valid web pages based on a number of web pages that refer to each of the valid web pages;
consolidating, via the at least one query node, information regarding the valid page package contained in the blockchain ledger by merging the identified web page referral relationships and the calculated page values into a single database of the query node; and
saving the consolidated information to the single database of the query node wherein the single database is not part of the blockchain ledger, and wherein the single database is different than the blockchain ledger.

US Pat. No. 10,691,762

METHOD OF OUTPUTTING RECOMMENDED ITEM AND RECOMMENDED ITEM OUTPUT DEVICE

FUJITSU LIMITED, Kawasak...

1. A method of outputting a recommended item implemented by a computer, the method comprising:obtaining information on a search item selected, from among a plurality of search items, by a first user when the first user searches for an item on an item search screen in which the first user sets a search criteria that is a combination of a search item and a search value set to the search item;
using a Self-Organizing Map algorithm or a Support Vector Machine to identify, from a plurality of second users, a third user having a trend in selection of a search item similar to a trend in selection of a search item of the first user, based on a number of times the first user has selected each of the plurality of search items when the search is executed and a number of times each of the plurality of second users has selected each of the plurality of search items in a past regardless of the search value set to the search item selected by the first user, the number of times the first user has selected each of the plurality of search items and the number of times each of the plurality of second users has selected each of the plurality of search items in the past being stored in a storage unit;
obtaining information on an item accessed in the past by the third user; and
outputting information on an item narrowed down, with use of the search value set to the search item selected by the first user, from the information on the item accessed in the past by the third user to the first user as information on a recommended item.

US Pat. No. 10,691,761

SCENARIO-BASED INTERACTIVE BEHAVIOR MODIFICATION SYSTEMS AND METHODS

1. A computer-implemented method for operating a behavior modification software, the method comprising:identifying, with the one or more processors, a user profile comprising a behavioral score;
presenting, with the one or more processors and to a user interface, an illustration associated with a scenario, the scenario associated with at least one question, each question correlated to a behavioral or sociological topic and associated with at least two answers, wherein each answer is associated with a behavior score modifier, wherein the behavior score modifier comprises a positive value and a magnitude associated with each answer, wherein the magnitude is a higher value when associated with a correct answer as compared to an incorrect answer;
receiving, with the one or more processors and via the user interface, selection of a selected question within the scenario;
presenting, with the one or more processors and to the user interface, the selected question to a user in response to the selection and at least a subset of the answers associated with the selected question;
receiving, with the one or more processors and via the user interface, a selected answer from the user in response to presenting the question;
evaluating, with the one or more processors, input from the user based on the behavior score modifier associated with the received selected answer;
adjusting, with the one or more processors, the behavioral score in the user profile based on the behavior score modifier;
determining, with the one or more processors, a path based on the user's adjusted behavioral score, wherein the path comprises an ordered sequence of at least two scenarios and check points, wherein the check points are configured to identify a next operation based on the user's behavioral score within the behavioral modification software, wherein the determining the path dynamically adjusts a level of difficulty or subject matter associated with the selected question based on the user's performance;
presenting, with the one or more processors and via the user interface, a map labeled with visual illustrations showing the path and multiple path locations, wherein a path location visually represents a scenario and three path locations, wherein the three path locations comprise a current path location, a past path location, and a future path location; and
displaying visual information that provides to the user an indication of user's level of performance, wherein the visual information comprises a user selected avatar, wherein the avatar changes its appearance depending on the user's behavioral score or path location, wherein the avatar is visually presented at one of the path locations on the map to show the user their current location, wherein the appearance of the avatar changes from a first visual representation of the avatar to a second visual representation of the avatar to indicate that the user's behavioral score is increasing, wherein the first visual representation of the avatar is a different visual depiction than the second visual representation of the avatar.

US Pat. No. 10,691,760

GUIDED SEARCH

Microsoft Technology Lice...

1. A method comprising:generating, in response to a user search query submitted by a user, a set of search results;
accessing a list of candidate facet-value pairs for inclusion in a suggestion facet user interface element, the suggestion facet user interface element configured to filter the set of search results based on the corresponding facet-value pair;
accessing win rate information indicative of user interaction with each of the candidate facet-value pairs, the win rate information for a candidate facet-value pair from the list of candidate facet-value pairs indicates how often the suggestion facet user interface element that includes the candidate facet-value pair was selected relative to selection of any search results displayed below the suggestion facet user interface element;
selecting, using one or more processors, a specific one of the candidate facet-value pairs having the highest win rate;
including the specific one of the candidate facet-value pairs having the highest win rate in the suggestion facet user interface element;
before the set of search results is provided to the user, including, into a user interface, the suggestion facet user interface element as an item in a list, where the other items in the list each represent a search result from the set of search results; and
causing the set of search results to be displayed via the user interface,wherein each win rate indicates a number of clicks received by at least one previously displayed suggestion facet user interface element including the corresponding candidate facet-value pair, divided by the number of clicks received by the previously displayed suggestion facet user interface element and search results that were displayed below the previously displayed suggestion facet user interface element in a search results page.