US Pat. No. 10,657,336

MERCHANDISE READING APPARATUS AND MERCHANDISE INFORMATION PROCESSING APPARATUS

TOSHIBA TEC KABUSHIKI KAI...

1. A merchandise reading apparatus comprising:a storage chamber comprising a ceiling plate, a radio wave shielding member, and a light transmitting member that comprises a transparent conductive film laminated on a transparent material, wherein the light transmitting member is located at a position of the ceiling plate; and
a reading apparatus configured to read information of a radio tag attached to merchandise and stored in the storage chamber.

US Pat. No. 10,657,335

SYSTEM AND METHOD FOR PROGRAMMING PLUGGABLE TRANSCEIVERS

Les Systemes Fonex Data I...

1. A method for programming a network transceiver, the method comprising the steps of:a) receiving RFID data from an RFID device in proximity to the network transceiver, said RFID data being received via an RFID antenna in communication with an RFID reader or an RFID memory positioned inside an electromagnetically shielding housing of the network transceiver, said RFID data defining an operating configuration of the network transceiver; and
b) programming the network transceiver according to the operating configuration defined by the received RFID data;
wherein the RFID antenna is positioned inside the electromagnetically shielding housing of the network transceiver, further wherein the RFID data is received via an RFID signal passing through a dielectric interface in the electromagnetically shielding housing.

US Pat. No. 10,657,334

RFID DEVICES CONFIGURED FOR DIRECT INTERACTION

AVERY DENNISON CORPORATIO...

1. An RFID-based control system for controlling an electronic device, comprising:an RFID reader configured to transmit a control signal to the electronic device upon receiving an input signal; and
a plurality of transparent RFID tags, each of the plurality of transparent RFID tags comprising:
an RFID chip,
an antenna electrically connected to the RFID chip, and
a built-in indicator that responds to actuation of an interactive switch by generating motion or a change in texture; and
the interactive switch electrically connected to the RFID chip, wherein the antenna is configured to transmit a return input or modified signal to the RFID reader when a user physically interacts with the interactive switch after the RFID reader has polled the RFID tag such that the interactive switch is adapted to detect interaction with the user by detecting a high frequency or an ultrahigh frequency electromagnetic emission, and each RFID tag is configured to be removeably securable to the electronic device.

US Pat. No. 10,657,333

SYSTEMS AND METHODS FOR MULTI-USER MULTI-LINGUAL COMMUNICATIONS

MZ IP Holdings, LLC, Pal...

1. A method, comprising:retrieving, from a data store, a word or phrase associated with a failure to translate a first message from a first language to a second language;
selecting a user from a plurality of users from whom to solicit feedback for translating the word or phrase,
wherein the user is selected based on a language setting associated with a computing device of the user;
sending a query to the user to request the feedback,
wherein the query includes an incentive to the user, and
wherein the incentive is determined based on a complexity of the word or phrase or an importance of the word or phrase;
receiving the feedback from the user;
rewarding the user with the incentive when the feedback is approved; and
generating a machine translation of a second message comprising the word or phrase using the approved feedback.

US Pat. No. 10,657,332

LANGUAGE-AGNOSTIC UNDERSTANDING

FACEBOOK, INC., Menlo Pa...

1. A method comprising:accessing a code-switching corpus, wherein the code-switching corpus is built by machine-translating select words from a first language to a second language, the select words comprising words translatable with a confidence above a predetermined threshold;
generating a universal embedding for words in the code-switching corpus, the universal embedding mapping the words in the code-switching corpus to a corresponding language-agnostic semantic meaning of the words;
accessing content to be classified; and
classifying the content based on the universal embedding.

US Pat. No. 10,657,331

DYNAMIC CANDIDATE EXPECTATION PREDICTION

International Business Ma...

1. A computer search system comprising:a memory that stores one or more natural language processing modules;
a network interface; and
a processor circuit in communication with the memory and the network interface, wherein the processor circuit is configured to:
receive a first set of bundled job-related information (FSBJRI) via the network interface;
ingest, using the one or more natural language processing modules, the FSBJRI;
determine, based on the FSBJRI, to combine data from one or more disparate information sources, wherein the one or more disparate information sources include a first information source and a second information source associated with the FSBJRI, and wherein the first information source is disparate from the second information source;
generate an operational information category and a candidate information category;
segregate the FSBJRI into the operational information category and the candidate information category to produce and store, in the memory, operational information and candidate information respectively;
generate one or more models by adding the segregated and stored operational information category and the candidate information category to a bipartite graph;
update one or more models based on the FSBJRI;
receive a set of candidate input characteristics of a job candidate for use in a candidate query via the network interface;
predict one or more outcomes, wherein predicting the one or more outcomes includes generating one or more inferences from the combined information from the one or more disparate information sources;
determine one or more correlations between the operational information and the candidate information;
select a model based on the candidate input characteristics;
rank the one or more correlations using the selected model;
output a display of the one or more correlations on a graphical user interface (GUI), wherein outputting the display of the one or more correlations on the GUI comprises generating an indicator that indicates the strength of the one or more correlations as they relate to the candidate input characteristics;
determine a past acceptance correlation between past candidate acceptance and the one or more models that have resulted in acceptance;
responsive to receipt of the set of candidate input characteristics, generate a tailored job-related package for presentation to a selected candidate based on the past acceptance correlation, wherein the generation comprises combining information from the operational information category and candidate information category and outputting the combined information to a user accessible media for viewing;
provide the tailored job-related information to the selected candidate as an electronic transmission via the network interface;
receive, via the network interface and responsive to the provision of the tailored job-related information, a selected candidate response selected from the group consisting of acceptance and rejection of the job-related package; and
update a ranking based on the selected candidate response;wherein:the FSBJRI is unstructured, and wherein the processor circuit is further configured to, for the generation of the operational information category and the candidate information category:
structure the operational information and candidate information in a bipartite graph; and
the processor circuit is further configured to, for the generation of the one or more models:
identify, using the bipartite graph, the one or more correlations between the operational information category and the candidate information category; and
generate a first model that includes at least one of the one or more correlations.

US Pat. No. 10,657,330

INFORMATION EXTRACTION METHOD AND APPARATUS

BOE TECHNOLOGY GROUP CO.,...

1. An information extraction method, comprising:providing r semantic relationships,
acquiring entity pairs corresponding to the semantic relationships,
acquiring first instances based on the entity pairs, and
eliminating instances that do not have the semantic relationships from the first instances to obtain second instances,
wherein r is a positive integer, each of the entity pairs contains a pair of named entities, and the first instances are sentences containing the entity pairs;
wherein eliminating the instances that do not have the semantic relationships from the first instances to obtain the second instances comprises:
extracting first features from each of the first instances based on the entity pairs to construct a first instance-feature matrix Mnf, and
constructing a semantic relationship-first instance matrix Mm,
wherein the first features comprise lexical features and/or syntactic features, n is a number of the first instances, and f is a total number of all the first features; and
wherein eliminating the instances that do not have the semantic relationships from the first instances to obtain the second instances further comprises:
obtaining a semantic relationship-feature matrix Mrf, wherein Mrf=Mrn*Mnf,
decomposing the semantic relationship-feature matrix Mrf into Mrk*Mkf by a nonnegative matrix factorization method,
obtaining Mnk by multiplying Mnf by MkfT,
obtaining similarity between each of the first instances and all the semantic relationships respectively based on Mnk and MrkT, and
screening out the second instances from the first instances based on the similarity,
wherein Mrk is a representation matrix of the semantic relationships in a latent semantic space and Mnk is a representation matrix of the first instances in the latent semantic space.

US Pat. No. 10,657,329

SYSTEM AND METHOD FOR RECOMMENDING WORDS FOR INSERTION BASED ON TIMING FACTORS

Rakuten, Inc., Setagaya-...

1. An information processing device comprising:at least one memory configured to store computer program code; and
at least one processor configured to access said at least one memory and a database and to operate according to said computer program code, the database storing, for each category of a plurality of merchandise items and/or a plurality of service items, at least one recommended word, said computer program code including:
post page presentation control code configured to cause the at least one processor to perform control such that a review post page is presented on a display device of a user terminal in response to a request from the user terminal, wherein the review post page contains an input box to input body text of a review about a merchandise or service item specified by the request;
recommended word acquiring code configured to cause the at least one processor to acquire, in response to presentation of the review post page, at least one recommended word associated with at least one category of the specified merchandise or service item from the database;
assistance timing determining code configured to cause the at least one processor to determine whether a present time is an assistance timing or not based on an aspect of character input to the input box after the at least one recommended word is acquired; and
assistance presentation control code configured to cause the at least one processor to:
perform control such that the acquired at least one recommended word is presented in response to an acquisition, by the assistance timing determining code of a determination result indicating that the present time is the assistance timing.

US Pat. No. 10,657,328

MULTI-TASK RECURRENT NEURAL NETWORK ARCHITECTURE FOR EFFICIENT MORPHOLOGY HANDLING IN NEURAL LANGUAGE MODELING

Apple Inc., Cupertino, C...

1. An electronic device, comprising:one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for:
receiving a current word;
determining a context of the current word based on the current word and a context of a previous word;
determining, using a morpheme-based language model, a first representation indicating a likelihood of each prefix of a predetermined set of prefixes, wherein the likelihood of each prefix is determined based on the context of the current word;
determining, using the morpheme-based language model, a second representation indicating a likelihood of each stem of a predetermined set of stems, wherein the likelihood of each stem is determined based on the context of the current word;
determining, using the morpheme-based language model, a third representation indicating a likelihood of each suffix of a predetermined set of suffixes, wherein the likelihood of each suffix is determined based on the context of the current word;
determining a next word based on the first representation, the second representation, and the third representation; and
providing an output including the next word.

US Pat. No. 10,657,327

DYNAMIC HOMOPHONE/SYNONYM IDENTIFICATION AND REPLACEMENT FOR NATURAL LANGUAGE PROCESSING

International Business Ma...

1. A method, in a data processing system comprising a processor and a memory, the memory comprising instructions that are executed by the processor to specifically configure the processor to implement a homophone/synonym identification/replacement (HSIR) engine, the method comprising:analyzing, by the HSIR engine executing on the processor of the data processing system, natural language content to identify a homophone instance in the natural language content, the homophone instance being a first term having a first definition and a first pronunciation for which there is a second term having the first pronunciation and a second definition different from the first definition;
in response to identifying the homophone instance, analyzing, by the HSIR engine, the natural language content to identify a third term that is a synonym for the second term, wherein the third term has a third definition that is nearly the same as the second definition;
in response to the natural language content comprising the third term, performing, by the HSIR engine, a clarifying operation to modify the natural language content to clarify the homophone instance and generate a modified natural language content; and
performing, by a natural language processing computer system, a computer natural language processing operation on the modified natural language content, wherein the computer natural language processing operation comprises the natural language processing computer system parsing the modified natural language content to extract features of the modified natural language content and performing an operation based on one or more concepts associated with the clarified homophone specified in the modified natural language content, wherein the clarifying operation comprises:
identifying a fourth term that is a synonym for the first term, wherein the fourth term has a fourth definition that has a level of correspondence to the first definition; and
performing the clarifying operation based on the identified fourth term, and wherein the clarifying operation further comprises at least one of:
accentuating the first and second terms in an output of the natural language content,
outputting a notification of the fourth term in association with the first term as an alternative to the first term,
outputting a notification of a definition or meaning of the first term and indicating a potential incorrect usage of the first term,
automatically replacing the first term with the fourth term, associating metadata with the natural language content that identifies the first term and second term as homophones and providing the first and second definitions,
converting the natural language content to an audible output specifying the fourth term and one or more synonyms of the second term as alternatives for the first term, or
outputting audible output indicating examples of proper usage of the first term and second term in corresponding example natural language content.

US Pat. No. 10,657,326

REMOVABLE SPELL CHECKER DEVICE

International Business Ma...

1. A method for spell checking handwritten text, the method comprising:identifying, by a stroke detection module of a spell checker device including a bistable metal spring and a motion detecting sensor and encompassing, at least partially, a writing instrument, hand strokes made using a writing instrument, the spell checker device removably attached to the writing instrument, wherein the spell checker device is adaptable to removably attaching to a plurality of writing instruments of various sizes;
identifying, based on the one or more hand strokes, one or more characters;
identifying, based on the one or more characters, a word;
determining the word is misspelled, wherein determining the word is misspelled comprises:
comparing the word to a dynamic list of words, the dynamic list of words including at least one word added by a user;
receiving input indicating the word is a new word;
storing the new word in the dynamic list of words; and
in response to determining the word is misspelled, notifying the user.

US Pat. No. 10,657,325

METHOD FOR PARSING QUERY BASED ON ARTIFICIAL INTELLIGENCE AND COMPUTER DEVICE

BEIJING BAIDU NETCOM SCIE...

1. A method for parsing a query based on artificial intelligence, comprising:acquiring annotated data comprising an annotated search instance, an annotated template instance, a field of a search intent corresponding to the annotated search instance and a category in the field, an attribute of a term in the annotated search instance and a concrete term comprised in the attribute of the term;
performing a training on the annotated data so as to generate an instance dictionary, a template dictionary and an inverted index dictionary, wherein the instance dictionary comprises the annotated search instance and an annotation of the annotated search instance, the template dictionary comprises a combination of the field, the category and/or the attribute of the term, and the inverted index dictionary comprises a corresponding relation between a segmented term and the annotated search instance;
acquiring a target query to be identified; and
parsing the target query based on the instance dictionary, the template dictionary and the inverted index dictionary, so as to acquire a target parsing result corresponding to the target query;
wherein performing the training on the annotated data so as to generate the instance dictionary, the template dictionary and the inverted index dictionary comprises:
extracting the annotated search instance from the annotated data as instance data;
performing an abstraction on key information in the annotated search instance, acquiring an attribute of the key information in the annotated search instance and the field corresponding to the annotated search instance, and combining the attribute of the key information, the field corresponding to the annotated search instance and/or the category in the field to generate template data;
performing a structural processing on the instance data to generate the instance dictionary;
performing a structural processing on the template data to generate the template dictionary; and
performing an inverted index processing on the instance data and the template data to generate the inverted index dictionary.

US Pat. No. 10,657,324

SYSTEMS AND METHODS FOR GENERATING ELECTRONIC DOCUMENT TEMPLATES AND ELECTRONIC DOCUMENTS

Global Software Innovatio...

1. A computer implemented method of generating an electronic document template in a web based platform environment comprising the steps of:obtaining an electronic document template for generating an electronic document, and
inserting a start section identifier into the obtained template, wherein the start section identifier is inserted to create a defined section, wherein the start section identifier associates the defined section with a contextual relationship in an entity-relationship model in an object-relational database, and the contextual relationship identifies one or more entities associated with the contextual relationship.

US Pat. No. 10,657,323

METHOD OF PREPARING DOCUMENTS IN MARKUP LANGUAGES

1. A method of preparing documents written in markup languages during implementing a user interface for dealing with data of an information system, the method comprising:forming an entity class;
forming attributes and datasets for the formed entity class, wherein each of the formed entity class datasets includes at least dataset fields and dataset aggregate functions;
wherein at least one of the formed entity class datasets is represented at least partly as a table having at least two rows and at least five columns,
wherein each of the rows in the table includes logically related data items, and each of the columns in the table includes homogeneous data;
forming a template for presenting more than one instance of said formed entity class, the template including at least one document written in at least one markup language, wherein the formed template comprises template elements and is stored separately from data of said instances of said entity class, wherein the formed template is stored on a server in a database;
forming a link between the formed template and the formed entity class and storing the formed link between the formed template and the formed entity class in the database;
displaying, in the browser, the template, and forming in the browser links between the template elements and the entity class attributes, the datasets, the dataset fields, and the dataset aggregate functions, and storing links between template elements and the entity class attributes, the datasets, the dataset fields, and the dataset aggregate functions, comprising:
selecting, in the browser, at least one of the template elements;
automatically generating an identifier for the selected template element, allowing a program code executed by the browser to access the template element through the use of the generated identifier;
displaying, in the browser, the entity class attributes, the entity class datasets, the dataset fields and the dataset aggregate functions available for link forming;
selecting, in the browser, at least one of the entity class attributes, the entity class datasets, the dataset fields, and the dataset aggregate functions;
automatically forming, in the browser, a link comprising the generated identifier for the selected template element and a particular identifier for at least one of the selected entity class attributes, the entity class datasets, the dataset fields, and the dataset aggregate functions; and
storing the automatically formed link comprising the generated identifier for the selected template element and the particular identifier for the at least one of the selected entity class attributes, the entity class datasets, the dataset fields, and the dataset aggregate functions;
wherein the formed template further comprises a group of elements, the group for presenting data of one dataset row, and
the method further comprises forming a structural element in the formed template, wherein the structural element is a root element of a fragment of the template hierarchic structure, the root element including all elements of said group of elements, to allow copying in the browser the fragment of the template hierarchic structure and, thus, the group of elements in order to present elements of the remaining dataset rows when presenting an entity class instance,
wherein prior to presenting the entity class instance, the server identifies the entity class and, by using the formed link between the entity class and the template, retrieves the template from the database and inserts into the template the following elements: an element comprising an identifier of the entity class instance; and an element enabling a program code library or comprising the program code, the program code allowing the browser to receive from the database information comprising values of the entity class instance attributes, datasets, including the rows of the datasets and values of the dataset aggregate functions, and the automatically formed links between the template elements and entity class attributes, datasets, dataset fields and the dataset aggregate functions,
wherein said information received from the database is stored within an object in a memory of the browser,
wherein the program code of the element inserted into the template uses the object stored in the browser memory to place the information within the template elements to represent the entity class instance,
wherein the program code uses the automatically formed links between the template elements and entity class attributes to place the values of the entity class instance attributes within the template elements,
wherein the program code uses the automatically formed links between the dataset aggregate functions and the template elements to place the values of the dataset aggregate functions within the template elements,
wherein to place the datasets within the template elements the program code uses the automatically formed links between the datasets and the template elements which are said root elements for document hierarchic structure fragments comprising the groups of elements, the groups for presenting data of one dataset row, wherein the program code further copies the fragments of the document hierarchic structure for each presented dataset row and places, in the fragment copies, values of fields of the presented dataset row by using the automatically formed links between the dataset fields and the template elements.

US Pat. No. 10,657,322

SYSTEMS AND METHODS TO OPTIMIZE ACQUISITION OF TEMPLATES FOR CONTENT ITEMS IN NEWS FEED

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:receiving, at a computing system in communication with a social networking system, a plurality of templates that specify presentation of types of content items in a news feed of the social networking system from one or more publishers different from the social networking system, wherein the computer system is a client computing device;
maintaining, at the computing system, the plurality of templates, each template of the plurality of templates having a template identifier and a template version number;
receiving a content item to be presented in the news feed;
receiving from the social networking system, by the computing system, metadata associated with the content item, wherein the metadata includes a content identifier and a content version number for identifying a particular template to generate a layout for presenting the content item;
determining, by the computing system, that a template identifier of a template in the plurality of templates matches the content identifier of the content item and a template version number of the template matches the content version number provided in the metadata associated with the content item; and
presenting, by the computing system, the content item in a layout determined based at least in part on the determined template.

US Pat. No. 10,657,321

EXPLODED-RANGE REFERENCES

Apple Inc., Cupertino, C...

1. A tangible, non-transitory, machine-readable medium, comprising machine-readable instructions that, when executed by one or more processors, cause the one or more processors to:identify a first range of cells in a base table of a spreadsheet application, the first range of cells specified in a first formula in the base table;
receive a request to organize the base table into an organized table, organized table view, or a combination thereof, based upon commonalities within a particular row or column of the base table;
organize rows and columns of the base table into the organized table, organized table view, or a combination thereof, grouping the rows and columns based upon the commonalities;
convert, based on tracking via a coordinate system, a cell index system, or a combination of both, the first range of cells in the base table into a second range of cells of the organized table, such that the second range of cells of the organized table, organized table view, or a combination thereof, includes the same cells as the first range of cells in the base table, despite the organization of the rows and columns of the base table into the organized table, organized table view, or a combination thereof; and
generate the organized table, organized table view, or a combination thereof, in the spreadsheet application with the first formula, substituting the second range of cells for the first range of cells.

US Pat. No. 10,657,320

AUTOMATIC DYNAMIC GENERATION OF ELECTRONIC FORMS USING FORM DEFINITION, DOCUMENT METADATA AND SUPPLEMENTAL METADATA

Wells Fargo Bank, N.A., ...

1. A document system, comprising:a first memory device storing an electronic form (“eForm”) definition and document metadata;
a second memory device storing supplemental metadata;
a first processor programmed to:
receive a document generation request for dynamically generating one or more documents associated with a loan application;
retrieve from the first memory device the eForm definition and the document metadata for an eForm associated with the document generation request, the eForm definition and the document metadata defining a display structure of one or more user input fields of the one or more documents associated with the loan application, the display structure including one or more payment options for the loan application;
retrieve from the second memory device the supplemental metadata for the eForm associated with the document generation request, the supplemental metadata including one or more rules for generating the one or more documents associated with the loan application, the one or more rules defining participant permissions, wherein participant permissions define which users have access rights to complete specific fields of the one or more documents;
assemble the retrieved eForm definition, document metadata and supplemental metadata into the one or more documents, the eForm definition, document metadata and supplemental metadata defining, at assembly, content and the display structure including display characteristics of the one or more user input fields for the one or more documents;
generate a user interface;
receive a document display request via the user interface;
in response to the document display request, dynamically generate an eForm display including using the assembled eForm definition, document metadata, and supplemental metadata to form the one or more documents of the loan application, the one or more documents of the eForm display including the one or more payment options for the loan application, and one or more rules defining the participant permissions;
wherein the eForm display is dynamically generated based on one or more of: a product type of the loan application; product metadata of the loan application; and legal, compliance, or regulatory requirements for the loan application;
wherein one or more user input fields in the one or more documents of the eForm display are prefilled based on available information without requiring user input; and
wherein the document metadata or supplemental metadata includes a rule to control access rights of the prefilled user input field to prevent a user from changing the prefilled information.

US Pat. No. 10,657,319

SYSTEMS AND METHODS FOR STACKING MARGINAL ANNOTATIONS

Google LLC, Mountain Vie...

1. A method for combining a plurality of metadata regions associated with a plurality of edits of an electronic document, the method comprising:receiving, by a processor, a first suggested edit of the plurality of edits for first data in a first portion of the electronic document;
receiving a second suggested edit of the plurality of edits for second data in a second portion of the electronic document;
determining a first position of a first metadata region of the plurality of metadata regions of a margin of the electronic document and a second position of a second metadata region of the plurality of metadata regions of the margin of the electronic document, wherein the first metadata region is associated with the first suggested edit and the second metadata region is associated with the second suggested edit, wherein the margin of the electronic document is adjacent to a view of the electronic document;
providing a presentation of the first metadata region in the first position and the second metadata region in the second position of the margin of the electronic document;
detecting an event indicative of an overlap of two or more of the plurality of metadata regions;
responsive to detecting the event indicative of the overlap of the two or more of the plurality of metadata regions, combining at least the first metadata region and the second metadata region to form a stacked metadata region; and
providing a presentation of the stacked metadata region in the margin of the electronic document to save space in the margin, wherein the presentation of the stacked metadata region provides an abbreviated version of information in the first metadata region and the second metadata region.

US Pat. No. 10,657,318

COMMENT NOTIFICATIONS FOR ELECTRONIC CONTENT

1. A data processing device comprising:at least one processor; and
one or more computer readable media including instructions which, when executed by the at least one processor, cause the at least one processor to:
present, on a display, a graphical user interface including:
a first region configured to display at least a first portion of a first discrete segment of electronic content in a sequence of electronic content, the sequence of electronic content including a plurality of discrete segments, and
a second region configured to display a list comprising of one or more comment items;
identify an availability of a first comment associated with a second portion of a second discrete segment in the plurality of discrete segments, the second discrete segment being hidden from view while the first discrete segment is being displayed;
add, in response to identifying the availability of the first comment, a first actuatable comment indicator to the list of comment items;
display the first actuatable comment indicator in the second region, wherein the first actuatable comment indicator is initially in a low visibility mode; and
transition, in response to a first user input event associated with the first actuatable comment indicator, an appearance of the first actuatable comment indicator from low visibility mode to a high visibility mode during the first user input event.

US Pat. No. 10,657,317

DATA VISUALIZATION USING CLIENT-SERVER INDEPENDENT EXPRESSIONS

Elasticsearch B.V., Moun...

1. A computer-implemented method for data visualization comprising:receiving from a user via a graphical user interface a selection of a type of component, a data source from which data for the component is drawn, and style characteristics for the component, the style characteristics including at least size, location, and orientation of the component;
based on the selection, creating an expression describing the component including a description of at least the data source for the component and the style characteristics for the component;
evaluating at a client coupled to a server the expression describing the component, the evaluating including determining that certain data is needed from the server;
executing at the server a portion of the expression including determining input is needed from the client;
in response to the server determining that user input from the client is needed, executing at the client the expression including getting the user input and providing the user input from the client to the server;
in response to receiving the user input from the client, resuming execution at the server of the portion of the expression using the user input to produce particular data specified by the expression and providing the particular data from the server to the client;
executing at the client the expression using the particular data from the server to produce the component; and
displaying the component.

US Pat. No. 10,657,316

DIRECT RENDERING OF A WEB APPLICATION FROM A DATABASE TO A WEB BROWSER

BackOffice Associates, LL...

1. A method comprising:providing a first interface to facilitate user design of a web application for rendering a database absent user-supplied code, wherein designing the web application comprises using a graphical user interface included in the first interface to select the database and specify a style format from a plurality of previously stored style formats or a newly registered style format produced from user-prompted information provided into a set of fields, and using a graphical user interface included in the first interface to specify a validation rule previously stored or newly registered by the user; and
providing a second interface to facilitate user access to data, wherein the second interface uses the web application to render a dynamic webpage that displays data from the database.

US Pat. No. 10,657,315

GENERIC AND AUTOMATED CSS SCOPING

SAP SE, Walldorf (DE)

1. A computer-implemented method to specify multiple different presentations for a document, the method comprising:receiving a first file including a first description of a first document presentation for a first document, the first description being a specification of a first visual appearance, in a style sheet language, for the first document;
receiving a second file including a second description of a second document presentation for the first document, the second description being a specification of a second visual appearance, in the style sheet language, for the first document and the first description and the second description being distinct from and differing, in part, from each other such that the specified first and second visual appearances for the first document are different;
generating a third file including a description of both the first document presentation and the second document presentation for the first document in the style sheet language by combining the first and second files to specify multiple different presentations for the first document;
optimizing the third file to include both the first document presentation and the second document presentation for the first document with minimal repetition in the style sheet language; and
persisting the third file in a data store.

US Pat. No. 10,657,314

SYSTEM AND METHOD FOR DYNAMIC LINKING BETWEEN GRAPHIC DOCUMENTS AND COMMENT DATA BASES

E-PLAN, INC., Irvine, CA...

1. A system comprising:a data store configured to record a base graphic representation of a project;
a standard comments data store;
a computer processor;
a non-transitory computer readable storage medium which stores programmatic instructions that, when executed by the computer processor cause the system to perform operations comprising:
process a user supplied PDF format graphic to a web support format graphic for web access as a base graphic representation;
link a coordinate overlay grid to the base graphic representation;
enable a user to associate a coordinate position on the coordinate overlay grid with a graphic and text, including a graphic boundary box that encloses a portion of the base graphic representation;
enable a comment to be accessed from the standard comments data store;
record at least a text comment data record and a graphic comment data record;
link a same graphic comment data record to a plurality of graphic overlay representations;
enable the user to:
make a comment correction,
add a comment,
delete a comment, and
add an approval annotation;
enable differences between the base graphic representation of the project and at least one other graphic representation to be identified;
enable a base graphic thumbnail to be rendered; and
selectively search and access a plurality of database records and return database records;
interface with third party software;
provide access to a knowledge base data store;
enable a plurality of users to collaborate, view, and markup the base graphic representation via respective web interfaces;
transmit automatic email update notifications to project specific users; and
communicate text and/or graphic comment data records for display in a worldwide web format.

US Pat. No. 10,657,313

METHOD AND SYSTEM FOR EDITING VIRTUAL DOCUMENTS

Smartwork Solutions GmbH,...

1. A computer system for editing virtual documents, comprising:a storage component that stores, in a fragment database, a plurality of fragments associated with a virtual document, the plurality of fragments being positioned at a number of indenture levels in the virtual document,
the virtual document associated with logical structure rules associating respective fragments with the virtual document, wherein the logical structure rules include predefined consistency rules and define allowed relationships within the document for a self-consistency check of fragment dependencies with regard to the integrity of the virtual document structure in view of the predefined consistency rules, wherein each fragment is stored independently from other fragments as a separate database object in the fragment database, wherein each fragment is stored with positioning information that indicates where the fragment is to be positioned when the virtual document is assembled, the positioning information including reference to a predecessor of the fragment or a successor of the fragment, and wherein allowed fragment dependencies are stored with the respective fragments in the fragment database;
a processor that in conjunction with a memory assembles the virtual document by retrieving the plurality of associated fragments and by ordering the plurality of associated fragments according to the stored fragment dependencies and the logical structure rules, wherein the logical structure rules further define where a particular fragment is positioned in a visualization of the virtual document; and an editor component that:
presents the visualization of the virtual document to a user for editing; and
receives editing commands from the user,
wherein a specific editing command modifies a specific fragment of the virtual document in the fragment database,
wherein any dependency being defined between the modified specific fragment and a further fragment in the fragment database is automatically stored in the fragment database and is continuously administered by the editor component as a database object in the fragment database,
wherein the modification of the specific fragment is rejected if the self-consistency check fails, and
wherein the modification by the specific editing command includes insertion of corresponding version information into the specific fragment of the virtual document for tracking the modification, and wherein the insertion is under an exclusive control of the computer system.

US Pat. No. 10,657,312

DEPLOYING NEW FONT TECHNOLOGIES TO LEGACY OPERATING SYSTEMS

Adobe Inc., San Jose, CA...

1. A method for deploying a font on an operating system, the method comprising:receiving, at a client device executing an operating system, a font selection parameter identifying a selected font;
receiving, at the client device, from a networked server, manifest information wherein said manifest information further comprises a flag indicating whether said selected font comprises a new technology font, and wherein successful activation of the new technology font requires that the operating system provide certain baseline functionality;
making a first determination that the flag is set, and in response to making the first determination, (a) identifying a stub font that represents functionality provided by the new technology font and that is stored in a stub font repository hosted at the client device, and (b) causing the operating system to attempt to activate the identified stub font; and
making a second determination that said stub font is successfully activated, and in response to making the second determination, causing the operating system to (a) download the new technology font from the networked server and (b) activate the new technology font,
wherein the operating system attempts to activate the stub font before downloading the corresponding new technology font from the networked server.

US Pat. No. 10,657,311

METHOD FOR COMPRESSING, SLICING, AND TRANSMITTING IMAGE FILES FOR DISPLAY AND INTERPRETATION

1. A method for dividing each of large images of data into smaller slices for viewing comprising:a. establishing a number of the smaller slices that each of the large images of data will be divided into, represented by a whole number wherein the whole number is selected from the group consisting of division by a fixed height, division by a fixed width, division by a variable height, division by a variable width, and any combination thereof, of the large image of data;
b. storing with a repeatable pattern the smaller slices wherein, the smaller slices reference positions of the smaller slices in the large image of data;
c. recording a total of the number of the smaller slices for the large image of data along with a file name, wherein the file name represents the position of each of smaller slices in the large image of data;
d. identifying, by a user, a plurality of large images of data the user desires to view in the viewport;
e. transmitting the plurality of large images of data identified to a viewport; and
f. rebuilding, using a script, each of the identified large images of data that uses the repeatable pattern established during storing, and loading of each rebuilt large image synchronously for viewing in the viewport wherein the smaller slices being in the viewport are accessible faster than an entire large image.

US Pat. No. 10,657,310

ORDINAL POSITIONING OF CONTENT ITEMS BASED ON VIEWPORT

Google LLC, Mountain Vie...

1. A computer-implemented method performed by a data processing apparatus, comprising:processing a first content item request for a first presentation state of a resource in a viewport, wherein the first presentation state includes a plurality of content item slots that each define a location in the resource at which a content item responsive to the request is to be rendered, and each content item slot has a slot ordinal position relative to other content item slots in the first presentation state of the resource;
responding to the first content item request by updating a presentation of the first presentation state of the resource to include content items in the content item slots that are displayed in the first presentation state of the resource, wherein each of the content items has a respective ordinal ranking and each of the content items is presented in a corresponding slot having the slot ordinal position that matches the respective ordinal ranking of the content item;
after responding to the first content item request, receiving a second content item request generated by a user selecting a back command;
determining, by the data processing apparatus, that the resource is in a second state that omits a first content item slot with a highest slot ordinal position that is presented when the resource is displayed according to the first presentation state of the resource, and that a second content item slot with a lower slot ordinal position than the slot ordinal position of the first content item slot is within the viewport when the resource is displayed according to the second presentation state of the resource;
reassigning the second content item slot to the highest slot ordinal position of the first content item slot; and
responding to the second content item request by updating a presentation of the second presentation state to include the content item with the highest respective ordinal position in the second content item slot and within a viewport area while the resource is displayed according to the second state, position data defining the adjusted ordinal positions for the content item slots and the content items for presentation in the content item slots.

US Pat. No. 10,657,309

INFORMATION PROCESSING APPARATUS CAPABLE OF CORRECTING A WRITTEN OBJECT ON THE BASIS OF A DETECTED REFERENCE DIRECTION

Konica Minolta, Inc., Ch...

1. An information processing apparatus capable of displaying an image on a display, comprising:a hardware processor configured to:
receive a trace of a movement of an operation by a user on the display;
convert the trace to an input on an image that is previously displayed on the display;
generate a written object according to the input;
detect a character string included in the image previously displayed on the display;
detect a reference direction of the image previously displayed on the display on the basis of an arrangement direction of the detected character string;
detect an inclination direction of the written object added to the image previously displayed on the display;
determine whether to correct an orientation of the written object based on a difference between an angle of the detected inclination direction and an angle of the reference direction, the angle of the reference direction being an acute angle; and
when it is determined to correct the orientation of the written object, displaying the written object, with the inclination direction corrected to the reference direction, on the display along with the image previously displayed on the display.

US Pat. No. 10,657,308

SIGNAL VIA POSITIONING IN A MULTI-LAYER CIRCUIT BOARD

INTERNATIONAL BUSINESS MA...

1. A method comprising:identifying, by a via placement tool executing on a processor of a circuit design system, a substantially uniform distribution of a plurality of signal vias and ground vias having a same horizontal and vertical separation distributed substantially equally in a horizontal and vertical grid pattern across a plurality of via groups for a multi-layer circuit board based on a design file defining a layout of the multi-layer circuit board;
determining, by the via placement tool executing on the processor of the circuit design system, a signal via pitch as a center-to-center distance between a neighboring pair of the signal vias;
comparing, by the via placement tool executing on the processor of the circuit design system, the signal via pitch to a target minimum drilling distance to allow back-drilling of the neighboring pair of the signal vias, wherein the target minimum drilling distance is a minimum center-to-center separation distance between the signal vias of the neighboring pair to maintain electrical and mechanical properties of the multi-layer circuit board after performing back-drilling of the neighboring pair of the signal vias;
identifying, by the via placement tool executing on the processor of the circuit design system, a ground via proximate the neighboring pair of the signal vias;
based on the via placement tool determining that the signal via pitch of the neighboring pair of the signal vias is less than the target minimum drilling distance, positioning, by the via placement tool executing on the processor of the circuit design system, at least one of the signal vias of the neighboring pair of the signal vias closer to the ground via such that after the positioning, the signal via pitch of the neighboring pair of the signal vias meets or exceeds the target minimum drilling distance;
modifying, by the via placement tool executing on the processor of the circuit design system, the design file to include the positioning of the signal vias; and
transmitting the modified design file over a network to initiate circuit board manufacturing operations that fabricate the multi-layer circuit board based on the modified design file.

US Pat. No. 10,657,307

USING RUNTIME INFORMATION FROM SOLVERS TO MEASURE QUALITY OF FORMAL VERIFICATION

Synopsys, Inc., Mountain...

1. A non-transitory computer-readable storage medium storing instructions that, when executed by a computer, cause the computer to perform a method for using runtime information to identify a verification hole and/or compute a verification metric, the method comprising:attempting to prove a set of assertions for a design under verification (DUV) by executing multiple formal verification engines in parallel, wherein each assertion in the set of assertions is attempted to be proven by multiple formal verification engines in parallel, and wherein after a given formal verification engine proves a given assertion, formal verification engines other than the given formal verification engine are stopped from proving the given assertion;
for each proven assertion in a set of proven assertions, extracting runtime information (RI) for the proven assertion from a respective formal verification engine that proved the proven assertion, wherein each RI corresponding to each proven assertion includes registers, inputs, and constraints that were used by the respective formal verification engine to prove the proven assertion;
determining a set of registers, a set of inputs, and a set of constraints that are not present in a union of RI extracted from the respective formal verification engine for each proven assertion in the set of proven assertions; and
using the set of registers, the set of inputs, and/or the set of constraints to (1) identify a verification hole and/or (2) compute a verification metric.

US Pat. No. 10,657,306

DEEP LEARNING TESTABILITY ANALYSIS WITH GRAPH CONVOLUTIONAL NETWORKS

NVIDIA Corp., Santa Clar...

12. A system to direct the insertion of test logic into a circuit, the system comprising:at least one graphic processing unit; and
a memory configured with instructions that when applied to the at least one graphics processing unit, configure the at least one graphic processing unit to:
transform a netlist representation of the circuit into a node embedding using a series of aggregators and encoders;
generate predictions, based at least in part on characteristics of a local neighborhood of a node in the circuit represented in the node embedding, of whether the node corresponds to a difficult to test node or non-difficult to test node in the circuit; and
on condition that the node is predicted to be a difficult to test node, modify the circuit with test logic at the node.

US Pat. No. 10,657,305

TECHNIQUE FOR DESIGNING ACOUSTIC MICROWAVE FILTERS USING LCR-BASED RESONATOR MODELS

Resonant Inc., Santa Bar...

1. A non-transitory computer-readable medium having stored thereon instructions that, when executed by a processing device, enable the processing device to perform a method for designing a narrowband acoustic wave microwave filter to satisfy predetermined frequency response requirements, comprising the steps ofgenerating a modeled filter circuit design having a plurality of circuit elements comprising an acoustic resonant element defined by an electrical circuit model that comprises a parallel static branch, a parallel motional branch, and one or both of a parallel Bragg Band branch that models an upper Bragg Band discontinuity and a parallel bulk mode function that models an acoustic bulk mode loss; and
generating a final circuit design for construction into an actual acoustic microwave filter, wherein generating said final circuit design comprises:
optimizing the modeled filter circuit design to generate an optimized filter circuit design;
comparing a frequency response of the optimized filter circuit design to the frequency response requirements;
selecting the optimized filter circuit design for construction into the actual acoustic microwave filter based on the comparison; and
transforming the optimized filter circuit design to a design description file that serves as an input to a construction process.

US Pat. No. 10,657,304

MAPPING LOGICAL QUBITS ON A QUANTUM CIRCUIT

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:obtaining an operation sequence including a plurality of operations to be executed on a quantum computing device, the quantum computing device including a plurality of physical qubits and a plurality of couplings, each physical qubit storing a logical qubit, each coupling being a connection between a pair of physical qubits configured to facilitate execution of an operation on a pair of logical qubits stored in the pair of physical qubits;
finding a blocking set of operations including at least one leading unresolved operation in the operation sequence;
calculating a first coupling score for each coupling of the plurality of couplings based on total reduction of shortest path lengths of a plurality of unresolved operations of the plurality of operations, wherein a shortest path length of an unresolved operation represents a minimum distance through couplings on the quantum computing device between a pair of physical qubits storing a pair of logical qubits to be used by the corresponding unresolved operation, and wherein the total reduction of shortest path lengths is a total of the amounts by which each shortest path length would be reduced by swapping a pair of logical qubits stored in a pair of physical qubits connected by the corresponding coupling;
selecting a coupling based on the first coupling score of each coupling; and
updating the blocking set by removing any leading unresolved operations from the blocking set that can be performed after swapping a pair of logical qubits stored in a pair of physical qubits connected by the selected coupling.

US Pat. No. 10,657,302

ROUTE GENERATION AND BUFFER PLACEMENT FOR DISJOINTED POWER DOMAINS IN AN INTEGRATED CIRCUIT

Cadence Design Systems, I...

1. A method for generating a circuit, comprising:displaying a schematic of a circuit on a graphical user interface of a computing device, the schematic comprising:
a non-switchable power domain, and
a plurality of switchable power domains;
generating a graph including a plurality of points and a plurality of edges joining the plurality of points, the plurality of points located on the plurality of switchable power domains, wherein at least one point in the plurality of points is assigned as a start node and at least another point in the plurality of points is assigned as an end node;
selecting one route from a plurality of routes from the start node to the end node based on a distance value and a design violation value associated with each of the plurality of routes between the start node and the end node;
positioning one or more buffers in at least one of the plurality of switchable power domains on the selected route; and
placing wires connecting the start node, the one or more buffers, and the end node, according to the selected route.

US Pat. No. 10,657,301

SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR CONSTRUCTING COMPLEX GEOMETRIES USING LAYERED AND LINKED HEXAHEDRAL ELEMENT MESHES

1. A system for fabricating a body, comprising:a processor for executing programming;
a non-transitory computer readable storage medium encoded with the programming for creating a complex geometry, the non-transitory computer readable medium with programming configured to:
receive a mapping of a body;create a finite element mesh representation of the body by the steps comprising:dividing the body into slices; and
creating elements within the slices, wherein adjacent layers of elements are connected by common nodes;
a manufacturing system that receives the finite element mesh representation of the body and manufactures a part based on the created finite element mesh representation of the body.

US Pat. No. 10,657,300

PREDICTIVE DESIGN SPACE METRICS FOR MATERIALS DEVELOPMENT

CITRINE INFORMATICS, INC....

1. A method for determining material design space quality, the method comprising:receiving input, from a user, of a specified material property and a design space, the design space comprising a plurality of candidate materials;
identifying a best data point, from a set of training data that was used to train a first model, having a highest property value of the set for the specified material property;
for each respective candidate material of the design space:
inputting the respective candidate material into the first model;
receiving, as output from the first model, a respective property value for the specified material property;
determining whether the respective property value exceeds the property value of the best data point;
responsive to determining that the respective property value exceeds the property value of the best data point, adding the respective candidate material to a subset of candidate materials;
determining a Predicted Fraction of Improved Candidates (PFIC) score by dividing a total number of candidate materials in the subset of candidate materials by a total number of candidate materials in the design space;
generating, using a second model, a plurality of curves, each respective curve of the plurality of curves reflecting a respective probability distribution of property values for the specified material property that a respective candidate material will yield;
determining a Cumulative Maximum Likelihood of Improvement (CMLI) score that indicates the probability that the design space comprises at least one candidate material with a property value that exceeds the property value of the best data point based on a subset of the plurality of respective curves;
determining that the design space is of high quality responsive to determining that both the PFIC score exceeds a PFIC threshold score, and the CMLI score exceeds a CMLI threshold score;
determining that the design space is of unknown quality responsive to determining either that:
the PFIC score is above the PFIC threshold score and the CMLI score is below the CMLI threshold score, or
the PFIC score is below the PFIC threshold score and the CMLI score exceeds the CMLI threshold score;
responsive to determining that the design space is of high quality, outputting, to the user, a recommendation to proceed with the design space; and
responsive to determining that the design space is of unknown quality, outputting, to the user, a recommendation indicating that the design space is of unknown quality.

US Pat. No. 10,657,299

POSTERIOR ESTIMATION OF VARIABLES IN WATER DISTRIBUTION NETWORKS

International Business Ma...

1. A method for posterior estimation of variables in water distribution networks, the method comprising:determining, by the one or more processors, a first model of the water distribution network based on a set of data inputs from one or more sensors within a water distribution system and design parameters, wherein the design parameters comprise a rating associated with a distribution pump, a design output pressure associated with the distribution pump, a number of branches within the water distribution system, and a number of branch connections within the water distribution system;
determining, by the one or more processors, a second model of the water distribution network based on the set of data inputs, and the first model;
performing, by the one or more processors, a real-time recursive posterior estimation of the first model, wherein the recursive posterior estimation process continuously increases accuracy of a statistical distribution associated with the first model;
displaying, by the one or more processors, the recursive posterior estimation to a user; and
causing, by the one or more processors, a user to be notified of a malfunction of a piece of equipment within the water distribution system.

US Pat. No. 10,657,298

RELEASE CYCLE OPTIMIZATION BASED ON SIGNIFICANT FEATURES VALUES SIMULATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for release cycle optimization, the method comprising:accessing, by a processor, historical data relating to a plurality of software versions each having a plurality of attributes;
determining a subset of attributes from the plurality of attributes based on a feature vector, generated by a machine learning model, comprising a plurality of features extracted from the historical data, wherein the subset of attributes are determined based at least in part on a desired software release performance associated with a software release;
receiving a set of data values for each attribute in the subset of attributes from the plurality of attributes;
performing one or more simulations of a software development cycle utilizing the set of data values; and
obtaining a set of optimized results from the one or more simulations comprising a plurality of predicted field defects values corresponding to each of the set of data values, wherein the set of results comprise a project cost associated with each result in the set of optimized results;
determining one or more constraints associated with a business organization for implementation of the software release;
discarding one or more optimized results in the set of optimized results that conflict with at least one constraint of the one or more constraints to determine a second set of optimized results;
identifying, by the processor, a resource need for each of the plurality of attributes based on the second set of optimized results, wherein the resource need comprises an individual outside the business organization having a skill set associated with the set of optimized results; and
generating, for a user, a workflow to obtain the resource.

US Pat. No. 10,657,297

PART NUMBER CONSOLIDATION IN PRINTED CIRCUIT BOARD ASSEMBLY DESIGN

Mentor Graphics Corporati...

1. A method comprising:determining, by a computing system, part numbers available for assignment to components represented in a printed circuit board assembly design based, at least in part, on electrical characteristics associated with the components;
setting, by the computing system, compatibility ranges for the electrical characteristics associated with the components;
comparing, by the computing system, the available part numbers for the components to each other to identify overlap in the compatibility ranges in the available part numbers across a plurality of the components and to determine a commonality among the available part numbers for a plurality of the components; and
assigning, by the computing system, one or more of the available part numbers to the components based, at least in part, on the commonality among the available part numbers.

US Pat. No. 10,657,296

TECHNIQUES FOR USING CONTROLLED NATURAL LANGUAGE TO CAPTURE DESIGN INTENT FOR COMPUTER-AIDED DESIGN

Autodesk, Inc., San Rafa...

1. A computer-implemented method for generating design problem statements that are compliant with a controlled natural language (CNL), the method comprising:displaying one or more lists that include a plurality of selectable textual terms, wherein each textual term included in the plurality of selectable textual terms is a CNL-compliant lexicon and is stored in a lexicon database;
receiving one or more selections, wherein each selection corresponds to a selected textual term included in the plurality of selectable textual terms;
generating, by a processor, based on at least one selected textual term, a set of candidate problem statements, wherein each candidate problem statement included in the set of candidate problem statements:
includes at least one selected textual term, and
adheres to at least one syntax structure included in a plurality of syntax structures defined by the CNL and stored to a syntax database;
for each candidate problem statement included in the set of candidate problem statements:
estimating a relevance of the candidate problem statement to at least one selected textual term, and
determining, based on the estimated relevance, a probability score;
displaying a first portion of the set of candidate problem statements; and
receiving a selection of a first candidate problem statement that is included in the first portion of the set of candidate problem statements.

US Pat. No. 10,657,295

HARDWARE ENCRYPTION HOUSING AND PAYMENT DEVICE

PAX COMPUTER TECHNOLOGY (...

1. A hardware encryption housing, comprising a top shell and a bottom shell, wherein the top shell and the bottom shell are snapped together, and the top shell and the bottom shell form receiving space, wherein the hardware encryption housing further comprises a circuit board mounted on the top shell and a trigger switch configured to transmit a trigger signal when the top shell is separated from the bottom shell, a security chip is mounted on the circuit board, wherein the security chip is provided with a storage module configured to store key information; and the security chip is further provided with a detection module configured to clear the key information in the storage module and lock the security chip when the trigger signal is detected;wherein a display screen is further mounted on the top shell, and the display screen is provided with a flexible printed circuit (FPC), wherein the flexible printed circuit (FPC) is connected to the circuit board;
wherein the length of the flexible printed circuit (FPC) is equal to the length of the connection between the display screen and the circuit board, and the ratio of the width of the flexible printed circuit (FPC) to the length of the side of the display screen at which the flexible printed circuit (FPC) is located is in a range from ½ to 1.

US Pat. No. 10,657,294

NON-VOLATILE MEMORY WITH PHYSICAL UNCLONABLE FUNCTION

NXP B.V., Eindhoven (NL)...

1. A non-volatile memory, comprising:a plurality of storage elements;
a plurality of access transistors, said access transistors being connected to one or more of said storage elements;
a measurement unit, wherein said measurement unit is configured to measure a variation between electrical characteristics of said access transistors;
a processing unit configured to use said variation between electric characteristics as a physical unclonable function.

US Pat. No. 10,657,293

FIELD-PROGRAMMABLE GATE ARRAY BASED TRUSTED EXECUTION ENVIRONMENT FOR USE IN A BLOCKCHAIN NETWORK

Alibaba Group Holding Lim...

1. A computer-implemented method for configuring a field programmable gate array (FPGA) based trusted execution environment (TEE) for use in a blockchain network, comprising:storing, by a blockchain node in the blockchain network, a device identifier (ID), a first random number, and a first encryption key in an FPGA device associated with the blockchain node;
sending, by the blockchain node, an encrypted bitstream to the FPGA device, wherein the encrypted bitstream can be decrypted by the FPGA device using the first encryption key into a decrypted bitstream comprising a second random number;
receiving, by the blockchain node, an encrypted message from the FPGA device, wherein the encrypted message is encrypted by the FPGA device using a second key, and wherein the second key is generated by the FPGA device using the device ID, the first random number, and the second random number;
decrypting, by the blockchain node, the encrypted message from the FPGA device using a third key to produce a decrypted message, wherein the third key is pre-stored in a server; and
in response to decrypting the encrypted message using the third key:
determining, by the blockchain node, a third random number embedded in the decrypted message,
encrypting, by the blockchain node, one or more keys using the third random number, and
sending, by the blockchain node, the one or more keys to the FPGA device.

US Pat. No. 10,657,292

SECURITY FOR PROGRAMMABLE DEVICES IN A DATA CENTER

XILINX, INC., San Jose, ...

1. A method of configuring a programmable integrated circuit (IC) in a computer system, comprising:selecting a first region of a programmable fabric of the programmable IC for implementation of a shell circuit, the shell circuit configured to interface with a bus of the computer system;
selecting a second region of the programmable fabric for implementation of an application circuit, the application circuit configured to interface with the shell circuit;
providing a fence region disposed between the first region and the second region, the fence region including a set of un-configured tiles of the programmable fabric;
generating configuration data for a circuit design having the first region, the second region, and the fence region; and
loading the configuration data to the programmable IC.

US Pat. No. 10,657,291

TECHNIQUES FOR PROTECTING SECURITY FEATURES OF INTEGRATED CIRCUITS

Altera Corporation, San ...

1. A method for controlling access to an integrated circuit, the method comprising:attempting to access a mode of the integrated circuit after the integrated circuit powers up;
determining if a one-time programmable circuit is programmed in response to the attempt to access the mode using a control circuit, wherein the integrated circuit comprises the control circuit and the one-time programmable circuit;
generating a signal to indicate to a user of the integrated circuit that the mode has been previously accessed if the control circuit determines that the one-time programmable circuit has been programmed to indicate a previous access to the mode; and
preventing the integrated circuit from entering the mode if the user chooses not to program the one-time programmable circuit.

US Pat. No. 10,657,290

AUTHENTICATION USING OPTICALLY SENSED RELATIVE POSITION

International Business Ma...

1. A method of safeguarding digital data and hardware within a blade server rack, the method comprising:in an arrangement of a plurality of blade servers in the blade server rack, each blade server equipped with a respective optical sensor:
capturing a first optical image using a first optical sensor of a first blade server of the plurality of blade servers, wherein the optical image includes at least a portion of an adjacent second blade server of the plurality of blade servers;
performing image analysis and comparison comprising: comparing, using a processor of the first blade server, the first optical image with a stored second optical image captured by the first optical sensor at a time prior to capturing the first optical image, wherein the comparing examines a predefined positional relationship between the first blade server relative to the second blade server; and
initiating, based on a successful comparison between the first optical image and the second optical image, generation of a respective seed value by at least two blade servers of the plurality of blade servers, wherein each generated seed value is executed by the processor to generate a key used to authenticate access to sensitive data.

US Pat. No. 10,657,289

PROXIMITY-BASED USER AUTHENTICATION FOR PROVIDING A WEBPAGE OF AN ACCESS-CONTROLLED APPLICATION

FISERV, INC., Brookfield...

1. A method for providing access to a controlled-access application accessible by a secure Internet browser, the method comprising:initiating, by the secure Internet browser executing on a first computing device, periodic polling of a paired second computing device associated with a user for measurements of short range communication (SRC) protocol signal strength of the second computing device;
determining, by the secure Internet browser, that the second computing device is within an authentication distance of the first computing device, wherein the second computing device is determined to be within the authentication distance of the first computing device when a first predetermined number of received measurements of SRC protocol signal strength of the second computing device is greater than or equal to a first predetermined threshold;
transmitting, by the secure Internet browser to an authentication server, an authentication request comprising (a) a device identifier of the second computing device and (b) a user credential of a user associated with the second computing device;
responsive to transmitting the authentication request, receiving, by the secure Internet browser from the authentication server, an authentication response indicating that the second computing device has been authenticated, wherein the authentication response (a) indicates that a secure session has been initiated for the user and (b) comprises a session identifier; and
responsive to receiving the authentication response, providing, by the secure Internet browser, access to the controlled-access application by:
transmitting, by the secure Internet browser to a content server, a request for a presentation of the controlled-access application, wherein the request for the presentation comprises the session identifier,
receiving, by the secure Internet browser from the content server, the presentation, and
directing display of, by the secure Internet browser, the presentation.

US Pat. No. 10,657,288

METHOD FOR OPERATING A MOTOR VEHICLE, AND SYSTEM FOR OPERATING A MOTOR VEHICLE

Audi AG, Ingolstadt (DE)...

1. A method for operating a motor vehicle, the method comprising:receiving, at a control device of the motor vehicle, a vehicle function list from a vehicle-external server device, wherein the vehicle function list is created at the vehicle-external server device and specifies which ones of vehicle-internal functions of the motor vehicle have a use authorization and which ones of the vehicle-internal functions of the motor vehicle have no use authorization;
controlling, using the control device of the motor vehicle, respective control units designed to operate the vehicle-internal functions of the motor vehicle according to the received vehicle function list such that one or more of the vehicle-internal functions of the motor vehicle having the use authorization and still being deactivated are activated and one or more of the vehicle-internal functions of the motor vehicle having the no use authorization and still being activated are deactivated,
wherein the vehicle function list is created when at least one deactivation specification with regard to at least one of the vehicle-internal functions is produced by the vehicle-external server device, granting the no use authorization for the at least one of the vehicle-internal functions,
wherein the deactivation specification is created when there is a malfunction of the at least one of the vehicle-internal functions or of a different vehicle-internal function, and
wherein vehicle-internal manipulation protection ensures that the received vehicle function list cannot be changed.

US Pat. No. 10,657,287

IDENTIFICATION OF PSEUDONYMIZED DATA WITHIN DATA SOURCES

International Business Ma...

1. A computer program product for identifying pseudonymized data within data sources, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for:selecting one or more data repositories within one or more of said data sources;
providing one or more privacy data models, each of said privacy data models comprising one or both of one or more patterns and one or more parameters;
selecting one or more of said one or more privacy data models;
analyzing data stored in said one or more selected data repositories using one or more parameters from said selected one or more privacy data models, wherein said analysis using said one or more parameters from said selected one or more privacy data models comprises identifying a meaning of each individual data value within said one or more selected data repositories, wherein said meaning of each individual data value within said one or more selected data repositories is determined by using cognitive semantics to identify an absolute frequency of specific data values within said one or more selected data repositories;
calculating a frequency distribution table containing frequency distribution values based on said identified absolute frequency of specific data values within said one or more selected data repositories;
comparing said frequency distribution values of said frequency distribution table to a predefined threshold value to determine a presence or absence of pseudonymized data; and
determining a data value within a data source to be pseudonymized in response to its associated frequency distribution value exceeding said predefined threshold value.

US Pat. No. 10,657,286

SYSTEM, APPARATUS AND METHOD FOR ANONYMIZING DATA PRIOR TO THREAT DETECTION ANALYSIS

Hewlett Packard Enterpris...

1. A computerized method for obfuscating, according to an obfuscation scheme, data that are part of a flow prior to analysis of the flow for malware, the method comprising:generating a flow identifier for the flow;
identifying one or more personally identifiable information (PII) segments of data in the flow;
generating a data identifier for each of the one or more PII segments of data;
substituting each data identifier for a corresponding PII segment of data as part of the flow;
associating each data identifier with the flow identifier;
determining whether recovery of the one or more PII segments of data is desired;
anonymizing the PII segments of data, comprising:
encrypting PII segments of data for which recovery is desired with a first keying material, and
hashing PII segments of data for which recovery is not desired;
maintaining the anonymized PII segments of data and the corresponding data identifiers separately from the flow; and
responsive to changing the obfuscation scheme, decrypting the encrypted PII segments of data with the first keying material and reencrypt the decrypted PII segments of data with a second keying material without altering the corresponding data identifier or the flow.

US Pat. No. 10,657,285

LIMITING EXPOSURE TO COMPLIANCE AND RISK IN A CLOUD ENVIRONMENT

International Business Ma...

1. A method of minimizing data security risks in a computing environment wherein a plurality of types of information are stored, the method comprising:measuring an amount of data stored for each type of information;
comparing each amount to a predetermined threshold for a corresponding type;
determining that a first amount of data for a first type of information exceeds a first predetermined threshold corresponding to the first type of information;
responsive to determining the first predetermined threshold is exceeded, preventing more entries of the first type of information into the computing environment by closing an access port in the computing environment to requests associated with new data of the first type of information.

US Pat. No. 10,657,284

SECURE HIGH SPEED DATA STORAGE, ACCESS, RECOVERY, AND TRANSMISSION

UBIQ SECURITY, INC., San...

1. A method for retrieving a data object, the method comprising:receiving a query comprising a field identifier and a field value related to the field identifier;
determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers;
in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator;
identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and
decrypting and forwarding the one or more encrypted values as a response to the query.

US Pat. No. 10,657,283

SECURE HIGH SPEED DATA STORAGE, ACCESS, RECOVERY, TRANSMISSION, AND RETRIEVAL FROM ONE OR MORE OF A PLURALITY OF PHYSICAL STORAGE LOCATIONS

Ubiq Security, Inc., San...

1. A method for retrieving a data object, the method comprising:retrieving a data map that includes at least a first portion of information required to retrieve and reconstruct the data object from one or more of a plurality of data storage locations;
performing one or more computations to dynamically derive at least a second portion of the information required to retrieve and reconstruct the data object from the one or more of the plurality of physical storage locations, wherein the one or more computations are performed to dynamically derive a portion of the information required to retrieve and reconstruct the data object that is not included in the data map; and
retrieving the data object from the one or more of the plurality of data storage locations and reconstructing the data object based on one or more of the first and second portions of the information included in the data map and the information dynamically derived through the one or more computations.

US Pat. No. 10,657,282

ACCESS CONTROLLED GRAPH QUERY SPANNING

Microsoft Technology Lice...

1. A method for controlling access to one or more nodes in a relational graph, comprising:receiving a graph query including a subject security context;
determining whether a node in the relational graph denies access to the node, the determining including determining at least one of (a) whether a deny Approximate Membership Query (AMQ) filter denies access to the node, or (b) whether a query deny list denies access to the node; and
denying access to the node if it is determined that the node denies the access.

US Pat. No. 10,657,281

INFORMATION PROCESSING APPARATUS AND METHOD FOR SPECIFYING LEARNING DATA

Canon Kabushiki Kaisha, ...

1. A information processing apparatus, comprising:one or more processors; and
at least one memory coupled to the one or more processors, the memory having stored thereon instructions which, when executed by the one or more processors, cause the apparatus to:
set a disclosure level of learning data used when a discriminator is generated;
specify, in accordance with the disclosure level, disclosure data to be disclosed to administrators other than a first administrator who manages the learning data in the learning data and association data which is associated with the learning data;
specify, in accordance with the disclosure level, reference data which is referred to by the first administrator in the learning data and the association data of the other administrators which are registered in a common storage apparatus;
obtain the specified reference data from the common storage apparatus; and
generate a discriminator using the obtained data.

US Pat. No. 10,657,280

MITIGATION OF INJECTION SECURITY ATTACKS AGAINST NON-RELATIONAL DATABASES

SAP SE, Walldorf (DE)

1. A computer-implemented method, comprising:integrating a database driver layer with a security layer;
setting a trigger associated with the security layer to implement a learning phase of the security layer;
in response to enabling the trigger, receiving a plurality of queries and query parameters associated with the respective queries;
for each query of at least a subset of the plurality of queries, identifying a previously-stored security pattern from a plurality of security patterns based on the query and the associated one or more query parameters;
resetting the trigger associated with the security layer to implement an execution of the security patterns;
in response to resetting the trigger, receiving an additional query and one or more additional query parameters associated with the additional query;
identifying a particular security pattern from the plurality of security patterns that is associated with the additional query and the additional one or more query parameters; and
determining that at least one of the additional query parameters does not match a corresponding query parameter of the particular security pattern.

US Pat. No. 10,657,279

METHOD FOR CONTROLLING SECURITY SYSTEM AND ELECTRONIC DEVICE THEREOF

Samsung Electronics Co., ...

1. A portable electronic device comprising:a display;
a communication interface configured to communicate with a wearable device using wireless short-range communication;
a processor; and
a memory storing instructions, which when executed by the processor, cause the portable electronic device to:
establish, via the communication interface, a connection between the portable electronic device and the wearable device,
identify a security status of the connected wearable device,
limit access to at least one predefined setting item among a plurality of setting items and control the display to display an indication of the identified security status if the identified security status corresponds to a lock status, wherein the at least one predefined setting item relates to a passcode, and
allow access to the at least one predefined setting item if the identified security status corresponds to an unlock status.

US Pat. No. 10,657,278

PRIORITIZED LINK ESTABLISHMENT FOR DATA TRANSFER USING TASK SCHEDULING

Live Nation Entertainment...

1. A primary load management system for allocating loads for resources based on secondary-system rules and load parameters, the primary load management system comprising:one or more network interfaces configured to provide access to one or more networks;
one or more processors coupled to the one or more network interfaces to facilitate communication exchanges for allocating loads; and
a non-transitory computer-readable storage medium containing instructions which when executed on the one or more processors, cause the one or more processors to perform actions including:
establishing, via the one or more network interfaces, a communication channel between the primary load management system and secondary load management system;
receiving, at the primary load management system and via the communication channel, one or more communications from the secondary load management system that identify:
a plurality of request parameters that identify parameters of a load requested for allocation, the plurality of request parameters including:
a specification of a size of the load;
a type of at least part of the load; and
a first allocation parameter;
a plurality of allocation parameters that identify parameters for allocating the load, the plurality of allocation parameters including:
one or more communication channels for transmitting information pertaining to at least part of the load to each of one or more devices; and
a second allocation parameter;
defining an allocation rule corresponding to the secondary load management system based on the plurality of request parameters and the plurality of allocation parameters;
accessing, for a resource, assignment data indicating which access rights for the resource remain unassigned;
generating a first load based on the assignment data, the first load corresponding to a plurality of unassigned access-right slots for the resource;
identifying a plurality of load parameters for the first load, the plurality of load parameters including:
a size of the first load;
a type of at least part of the first load; and
an allocation parameter;
determining that the plurality of load parameters corresponds to the plurality of request parameters;
in response to the determination, allocating the first load to the secondary load management system;
facilitating transmission of information over the one or more communication channels, the information identifying:
the resource; and
the second allocation parameter;
receiving a communication indicating that a portion of the first load is to be assigned to a user device in accordance with the second allocation parameter; and
updating the assignment data to associate one or more access-right slots corresponding to the portion with an identifier associated with the user device.

US Pat. No. 10,657,277

BEHAVIORAL-BASED CONTROL OF ACCESS TO ENCRYPTED CONTENT BY A PROCESS

Sophos Limited, Abingdon...

1. A computer program product for securing an endpoint against exposure to unsafe or unknown content, the computer program product comprising computer-executable code embodied in a non-transitory computer readable medium that, when executing on the endpoint performs the steps of:encrypting a plurality of files on the endpoint to prevent unauthorized access to the plurality of files;
monitoring an exposure state of a process on the endpoint to potentially unsafe content by applying a plurality of behavioral rules to determine whether the exposure state of the process is either exposed or secure, wherein the process is initially identified as secure, and the process is identified as exposed when the process accesses an object identified as exposed; and
restricting access by the process to the plurality of files when the process is exposed by controlling access to the plurality of files through a file system filter that conditionally decrypts one or more of the plurality of files for the process according to the exposure state of the process.

US Pat. No. 10,657,276

SYSTEM SHARING TYPES IN MULTI-TENANCY DATABASE SYSTEMS

SAP SE, Walldorf (DE)

1. A system comprising:at least one application;
a database interface;
a data dictionary;
a content deployment tool;
a table setup tool; and
at least one database system that is associated with a system sharing type configuration comprising standard, shared, tenant or simulated; and
wherein the data dictionary includes definitions of tables stored in the at least one database system, each table having defined a table sharing type that is one of read-only, read-write, or read-only-plus-local-write; and
wherein the system sharing type configuration is currently set to standard; and
wherein the at least one database system includes, when the system sharing type configuration is standard, a tenant database container for use by a first tenant; and
wherein the tenant database container includes at least one read-only table, at least one read-write table, and at least one read-only-plus-local-write table; and
wherein the table setup tool is configured to create tables in the at least one database system based on the system sharing type configuration and the table sharing type of each table, including creating, when the system sharing type configuration is standard, the at least one read-only table, the at least one read-write table, and at the least one read-only-plus-local-write table in the tenant database container; and
wherein the content deployment tool is configured to deploy content to created tables in the at least one database system based on the system sharing type configuration and the table sharing type of each table, including deploying, when the system sharing type configuration is standard, content to the at least one read-only table, the at least one read-write table, and at the least one read-only-plus-local-write table in the tenant database container; and
wherein the database interface is configured to:
provide access to the at least one application to the at least one database system based on the system sharing type configuration and the table sharing type of each table, including enabling, when the system sharing type configuration is standard, the at least one application to read from and write to the at least one read-only table, the at least one read-write table, and at the least one read-only-plus-local-write table in the tenant database container.

US Pat. No. 10,657,275

ENCRYPTION DIRECTED DATABASE MANAGEMENT SYSTEM AND METHOD

K2VIEW LTD, Nesher (IL)

1. A non-transitory computer-readable medium containing instructions that cause hardware logic to perform operations for controlling a database, comprising, by the hardware logic:generating a higher category key;
upon creation of a type within the database for administration of individual instances of the database, generating a type key by hashing the higher category key and a type identifier identifying the type; and
upon creation of an instance within the type for data storage, generating an instance key by hashing the type key and an instance identifier identifying the instance,
wherein the instance key is used to encrypt and decrypt data stored in the instance.

US Pat. No. 10,657,274

SEMICONDUCTOR DEVICE INCLUDING MEMORY PROTECTOR

Samsng Electronics Co., L...

1. A semiconductor device, comprising:a processor configured to perform an operation based on data stored in a memory; and
a memory protector configured to,
divide the memory into a contiguous first window area and a contiguous second window area, the first window area including a first memory area for memory allocation and de-allocation for a first data, the first memory area divided into a first fragment page of a first size, the second window area including a second memory area for memory allocation and de-allocation for a second data, the second memory area divided into a second fragment page of a second size, the second size being smaller than the first size, and
prevent the first fragment page and the second fragment page from being accessed by the processor if a request from the processor is not at least one of a security reading and a security writing,
wherein a size of the second data is smaller than a size of the first data.

US Pat. No. 10,657,273

SYSTEMS AND METHODS FOR AUTOMATIC AND CUSTOMIZABLE DATA MINIMIZATION OF ELECTRONIC DATA STORES

Palantir Technologies Inc...

1. A system comprising:a data store configured to store computer-executable instructions; and
a hardware processor in communication with the data store, wherein the computer-executable instructions, when executed, configure the hardware processor to:
receive, from a presentation server, a first request to access an item of protected information;
determine, based at least in part on at least one of the first request or an information type of the item of protected information, that the item of protected information is to be minimized;
obtain the item of protected information;
identify, based at least in part on the information type of the item of protected information, a transformation function from a plurality of transformation functions, wherein individual transformation functions are identified from the plurality of transformation functions on a per-request or per-item basis;
cause the transformation function to be applied to the item of protected information to produce an item of minimized information that preserves one or more characteristics of the item of protected information, wherein the item of minimized information reduces a determinable association between the item of minimized information and an identity associated with the item of protected information;
cause the presentation server to display a user interface to render the item of minimized information that preserves one or more characteristics of the item of protected information instead of the item of protected information;
receive, from the presentation server, a second request to access the item of protected information;
determine, based at least in part on a physical location associated with the second request or a security of a connection associated with the second request, that access to the item of protected information is to be allowed; and
cause the presentation server to display an updated user interface to replace the item of minimized information with the item of protected information.

US Pat. No. 10,657,272

SECURELY AND EFFICIENTLY SHARING DATA EXCHANGE RECORDS

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:managing a data exchange, by a data exchange platform, between a first party and a second party;
storing, by the data exchange platform, one or more data exchange records generated from the data exchange;
generating, by the data exchange platform, an encrypted data exchange record locator for locating the one or more data exchange records, wherein the encrypted data exchange record locator is encrypted using an encryption key;
sending, by the data exchange platform, the encrypted data exchange record locator and a decryption key to a third-party not participating in the data exchange, wherein the decryption key corresponds to the encryption key;
receiving, by the data exchange platform and from the third-party, a request for at least one of the one or more data exchange records, wherein the request is based on a decrypted data exchange record locator using the decryption key; and
sending, by the data exchange platform, the at least one of the one or more data exchange records to the third-party.

US Pat. No. 10,657,270

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC-CHAIN-BASED GROUP MEMBERSHIP CONTENT SHARING

TOPIA TECHNOLOGY, INC., ...

1. A system for decrypting a file, the system comprising:a computer system comprising one or more processors programmed with computer program instructions that, when executed by the one or more processors, cause the computer system to:
obtain encrypted file description data related to a file, the file comprising a plurality of file segments;
with respect to each file segment of the plurality of file segments, perform decryption on the encrypted file description data to extract from the encrypted file description data (i) a reference associated with the file segment and (ii) a key associated with the file segment, the associated key being configured for decrypting an encrypted version of the file segment and configured to be different from at least another key for decrypting an encrypted version of another file segment of the plurality of file segments;
with respect to each file segment of the plurality of file segments, subsequent to the extraction of the associated reference and the associated key, use the associated reference and the associated key to obtain the file segment; and
combine the file segments to reproduce the file.

US Pat. No. 10,657,269

MANAGEMENT APPARATUS AND DOCUMENT MANAGEMENT SYSTEM

FUJI XEROX CO., LTD., To...

1. A management apparatus comprising:an assignment unit that assigns issuance privilege information representing privilege to issue document IDs to one or more processing apparatuses, each of the one or more processing apparatuses being located on one of local networks and configured to execute a document ID generating process from a document according to the issuance privilege information; and
a receiver that receives document IDs from the one or more processing apparatuses which have been assigned the issuance privilege information and have issued the document IDs according to the issuance privilege information;
wherein each of the document IDs includes: the issuance privilege information assigned by the assignment unit to the one or more processing apparatuses, issuance certificate information, and information indicating identity of a document ID issued by one of the one or more processing apparatuses, and
wherein the issuance certificate information is used to prove that the one or more processing apparatuses have issued the document IDs according to the issuance privilege information.

US Pat. No. 10,657,268

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM TO VERIFY VALIDITY OF BACKUP DATA

Fuji Xerox Co., Ltd., To...

1. An information processing apparatus comprising:a trusted platform module (TPM) that is an internal storage unit that encrypts a data encryption key used for encryption of data to an encrypted data encryption key (EDEK) and stores the encrypted key;
a serial electrically erasable programmable read only memory (SEEPROM) that stores apparatus specific information used by the TPM to generate a TPM access key, the generated TPM access key being stored in the SEEPROM;
a ROM memory configured to store a program; and
a processor that is configured to execute, in response to being loaded with the program from the ROM memory:
a determination unit configured to determine a state of the TPM;
a first verification unit configured to verify validity of its own external storage unit, which is a SD card that stores backup data regarding the EDEK, on the basis of (a) identification information acquired from the SD card and (b) identification information of the SD card permanently stored in the ROM memory, by determining whether the identification information acquired from the SD card conforms to the identification information stored in the ROM memory, wherein in a case in which the identification information acquired from the SD card does not conform to the identification information stored in the ROM memory, subsequent operations of the information processing apparatus are stopped; and
another verification unit configured to verify validity of the backup data stored in the SD card, in a case in which the first verification unit verifies that the identification information acquired from the SD card conforms to the identification information stored in the ROM memory, the backup data including a backup TPM access key, a backup TPM internal key, and a backup EDEK, wherein:
the another verification unit includes a second verification unit configured to acquire the backup TPM access key included in the backup data from the SD card and configured to compare the backup TPM access key with the TPM access key stored in the SEEPROM, to thereby verify validity of the backup TPM access key when the first verification unit is capable of verifying validity of the SD card, and subsequent operations of the information processing apparatus are stopped when the second verification unit determines that the backup TPM access key is invalid;
the another verification unit includes a third verification unit configured to acquire the backup TPM internal key included in the backup data from the SD card to thereby verify validity of the backup TPM internal key in accordance with whether or not the state of the TPM is capable of being restored from the backup TPM internal key by using functions of the TPM, when the determination unit determines that the TPM is in a non-initialization state, and subsequent operations of the information processing apparatus are stopped when the third verification unit determines that the backup TPM internal key is invalid; and
the another verification unit includes a fourth verification unit configured to acquire the backup EDEK included in the backup data from the SD card to thereby verify validity of the backup EDEK in accordance with whether or not the data encryption key is capable of being restored from the backup EDEK by using functions of the TPM, when the determination unit determines that the TPM is in an initialization state, and subsequent operations of the information processing apparatus are stopped when the fourth verification unit determines that the backup EDEK is invalid.

US Pat. No. 10,657,267

SYMBOL STRING MATCHING MECHANISM

GEOLANG LTD., Cardiff (G...

1. A computer implemented system for comparing content between data sources comprising:a reference library constructor configured to generate a signature store and a characterization store from at least one reference data; and
a data evaluator configured to monitor data on or in transit through a computer or network, identify regions of interest in the data by comparing the data to the signature store for at least one of short exact matches, incomplete matches, or keyword recognition, and determine a probability of soft match by estimating similarity between the region of interest and the characterization store.

US Pat. No. 10,657,266

METHODS AND SYSTEMS FOR RENDERING HOLOGRAPHIC CONTENT IN A FIRST OR SECOND MODE BASED ON SECURITY CLEARANCE

INTERNATIONAL BUSINESS MA...

1. A method, by one or more processors, for rendering holographic content, comprising:determining a security level associated with holographic content;
determining a security clearance associated with a viewer within a proximity of a holographic display;
causing the holographic content to be rendered in a first mode or a second mode by the holographic display based on the determined security level associated with the holographic content and the determined security clearance associated with the viewer; wherein causing the holographic content to be rendered in the second mode by the holographic display includes causing a holographic object to be rendered between the holographic content and the viewer;
detecting movement of the viewer; and
causing movement of the holographic object based on the detected movement of the viewer such that, in the second mode, the holographic object is rendered at a position in three-dimensional space so as to be continually maintained between the holographic content and the viewer as the viewer moves.

US Pat. No. 10,657,265

OUTPUTTING INTERNAL STATES OF AN INTEGRATED CIRCUIT AFTER INITIATION OF A SECURE LOCKDOWN MODE

XILINX, INC., San Jose, ...

1. A method for an integrated circuit, comprising:initiating a secure lockdown mode for the integrated circuit;
obtaining system states of a system internal to the integrated circuit after initiation of the secure lockdown mode, the obtaining comprising:
reading out the system states from storage devices internal to the integrated circuit; and
loading the system states into temporary storage of the integrated circuit; and
outputting the system states via a port of the integrated circuit before closing the port responsive to the secure lockdown mode.

US Pat. No. 10,657,264

TECHNIQUES FOR CORRELATING VULNERABILITIES ACROSS AN EVOLVING CODEBASE

WHITEHAT SECURITY, INC., ...

1. A method of correlating vulnerabilities across an evolving codebase, comprising:obtaining a representation of source code of the evolving codebase;
scanning the representation to identity one or more potential vulnerabilities;
identifying one or more potential vulnerabilities;
generating a signature for each of the one or more potential vulnerabilities;
storing the signature in a repository, wherein the repository stores a plurality of signatures from previous scans of one or more versions of the source code of the evolving codebase;
comparing the signature with the plurality of signatures from previous scans;
in response to a match between the signature and the plurality of signatures, determining the signature as a duplicate; and
determining one or more characteristics of the one or more potential vulnerabilities.

US Pat. No. 10,657,263

MANAGEMENT OF ALERTS USING A BUDGET-DEPENDENT ADJUSTABLE WORKING THRESHOLD

International Business Ma...

1. A computer program product for managing cooperative computer software applications, the computer program product comprising:a non-transitory, computer-readable storage medium; and
computer-readable program code embodied in the storage medium, wherein the computer-readable program code is configured to
set a budget indicating a number of alerts for suspicious activity by setting the budget equal to a selected targeted average rate of alerts produced by the system over a pre-determined period of time,
adjust a working threshold risk score by defining an initial working threshold risk score, providing a history of recorded top risk scores within a budget sliding interval window, and adjusting the initial working threshold to an increased working threshold such that a number of the recorded top risk scores that exceed the initial working threshold is calculated to be less than or equal to the number of alerts indicated by the set budget,
use the adjusted working threshold to normalize incoming risk scores, and
determine whether an incoming risk score should receive an alert,
wherein the computer-readable program code is further configured to set the budget for multiple risk score types, wherein each of the multiple risk score types receives a portion of the budget.

US Pat. No. 10,657,262

METHOD AND APPARATUS FOR SECURING EMBEDDED DEVICE FIRMWARE

RED BALLOON SECURITY, INC...

1. A method of embedded device vulnerability identification and mitigation, comprising:injecting at least one security software component into a vulnerable firmware binary to create a monitored firmware binary, wherein the at least one security software component hooks into an exception handling code of the vulnerable firmware binary;
loading the monitored firmware binary into an embedded device;
collecting a plurality of live forensic information related to the monitored firmware binary via the at least one security software component of the monitored firmware binary, wherein the live forensic information comprises dynamically generated information related to the monitored firmware binary that is collected when the embedded device is in an online state;
aggregating the plurality of live forensic information and static analysis data generated by one or more static analysis techniques, wherein the static analysis data comprises data generated before operation of the vulnerable firmware binary;
detecting an unauthorized modification to the monitored firmware binary by the at least one security software component based on the aggregated live forensic information and static analysis data, the security software component is designed to detect an unauthorized modification of at least one in memory data item acted upon by one or more functions of the monitored firmware binary embodied in native firmware code of the vulnerable firmware binary;
identifying one or more areas within the monitored firmware binary to modify to address the detected unauthorized modification comprising mapping the detected unauthorized modification to one or more in-memory data items;
modifying the identified one or more areas within the monitored firmware binary while the monitored firmware binary is running to change firmware code of the vulnerable firmware binary to create a hardened firmware binary and to mitigate exploitation of the identified one or more areas within the monitored firmware binary; and
communicating the collected live forensic information to other embedded devices in a network where the embedded device is deployed,
wherein to mitigate exploitation comprises one or more of deactivating code strings in the identified one or more areas associated with the firmware binary, removing code strings in the identified one or more areas associated with the firmware binary, or obfuscating code strings in the identified one or more areas associated with the firmware binary,
wherein the hardened firmware binary is functionally equivalent to the vulnerable firmware binary and the monitored firmware binary.

US Pat. No. 10,657,261

SYSTEM AND METHOD FOR RECORDING DEVICE LIFECYCLE TRANSACTIONS AS VERSIONED BLOCKS IN A BLOCKCHAIN NETWORK USING A TRANSACTION CONNECTOR AND BROKER SERVICE

MOCANA CORPORATION, Sunn...

1. A method of updating a device, that has been authenticated with an immutable device unique identifier generated using device attributes discovered by an update client on the device, an update service in a supply chain network of providers and publishers, orchestration rules, a local ledger, and a blockchain broker service, the method comprising:authenticating, by the update service, the device using a device unique registration issued by the update service associated with the immutable device unique identifier;
sending, by the update client on the device, a device request for an update package for the device from the update service in the supply chain network, wherein the device request from the authenticated device includes a device manifest and discovered device attributes, and wherein the discovered device attributes comprises of static factory configured settings and dynamically configured properties;
receiving, by the update service, the device request;
processing, by the update service, the received device request using the orchestration rules to prepare update packages, initially signed and encrypted by providers in the supply chain, for the device based on the device manifest and device attributes;
preparing, by the update service, by re-signing and re-encrypting the update package, as the publisher in the supply chain, based on the orchestration rules established for a network service of the supply chain network;
sending, by the update service, the doubly signed and reencrypted update package to the device; and
recording, by the update service, a request log for the device as an entry in the local ledger, and distributing blocks of transaction records to the blockchain broker service to maintain a distributed ledger to reproduce history of update packages sent to a plurality of devices by a plurality of publishers in the supply chain.

US Pat. No. 10,657,260

ELECTRONIC DEVICES AND METHODS SUPPORTING UNSECURED SYSTEM-ON-CHIP SECURE BOOT FUNCTIONALITIES

SLING MEDIA PVT LTD, Ban...

1. An electronic device, comprising:a locked off-chip memory component that stores a second stage boot loader and a locked cryptographic data comprising a public key;
a first unlocked memory component in which a first software component and associated cryptographic data are stored;
a second unlocked memory component; and
a System-on-Chip (SoC) coupled to the locked off-chip memory and to the first and second unlocked memory components, wherein the SoC comprises a first on-chip memory area comprising a boot loader, the SoC configured to execute the instructions contained in the boot loader to:
determine whether the first software component can be verified as trustworthy based, at least in part, upon whether the associated cryptographic data is successfully decrypted by the public key of the locked cryptographic data that is stored in the locked off-chip memory;
follow instructions contained in the second stage boot loader of the locked off-chip memory to write an image of the first software component into the second unlocked memory component; and
boot the first software component from the second unlocked memory component if the first software component is verified as trustworthy, and otherwise not booting the first software component.

US Pat. No. 10,657,259

PROTECTING COGNITIVE SYSTEMS FROM GRADIENT BASED ATTACKS THROUGH THE USE OF DECEIVING GRADIENTS

International Business Ma...

20. An apparatus comprising:at least one processor; and
at least one memory coupled to the at least one processor, wherein the at least one memory comprises instructions which, when executed by the at least one processor, cause the at least one processor to:
configure a hardened neural network executing on the at least one processor to introduce noise in internal feature representations of the hardened neural network, wherein the noise introduced in the internal feature representations diverts gradient computations associated with a loss surface of the hardened neural network;
configure the hardened neural network executing on the at least one processor to implement a merge layer of nodes that combine outputs of adversarially trained output nodes of the hardened neural network with output nodes of the hardened neural network trained based on the introduced noise;
receive, by the hardened neural network, input data for classification by the hardened neural network;
process, by the hardened neural network, the input data to generate classification labels for the input data and thereby generate augmented input data; and
output, by the hardened neural network, the augmented input data to a computing system for processing of the augmented input data to perform a computing operation.

US Pat. No. 10,657,258

DEPLOYMENT OF MACHINE LEARNING MODELS FOR DISCERNMENT OF THREATS

Cylance Inc., Irvine, CA...

1. A method for implementation by one or more data processors forming part of at least one computing device, the method comprising:detecting, by at least one data processor, a mismatch between model-based classifications produced by a first version of a computer-implemented machine learning threat discernment model and a second version of a computer-implemented machine learning threat discernment model for a file, each of the first version of the machine learning threat discernment model and the second version of the machine learning threat discernment model for a file output a respective threat score based on a same set of features extracted from the file, wherein the mismatch is based on a difference between the respective threat scores; and
executing or accessing, by at least one data processor, the file if the difference between the respective threat scores is below a pre-defined threshold; or
analyzing, by at least one data processor, the mismatch to determine appropriate handling for the file if the difference between the respective threat scores is equal to or above a pre-defined threshold.

US Pat. No. 10,657,257

FEATURE VECTOR AGGREGATION FOR MALWARE DETECTION

International Business Ma...

1. A method comprising:obtaining a first set of measurements produced by a first dynamic analysis of an examined program, wherein the first dynamic analysis is performed with respect to the examined program executing a first execution path;
obtaining a second set of measurements produced by a second dynamic analysis of the examined program, wherein the second dynamic analysis is performed with respect to the examined program executing a second execution path, wherein the first and second execution paths are different;
generating an aggregated feature vector representing the examined program, wherein the aggregated feature vector comprises a set of aggregated features, wherein a value of each aggregated feature is based on an aggregation of corresponding measurements in the first set of measurements and in the second set of measurements; and
applying a predictive model on the aggregated feature vector to classify the examined program as malicious or benign.

US Pat. No. 10,657,256

INFORMATION PROCESSING SYSTEM CONTROLLING PERFORMANCE OF VIRUS DETECTION PROCESSING AT DEVICES INCLUDED IN THE SYSTEM, AND INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM

KONICA MINOLTA, INC., To...

1. An information processing system comprising:a plurality of image forming apparatuses,
one image forming apparatus among the plurality of image forming apparatuses including:
a first hardware processor; and
a first transmitter,
wherein:
the first hardware processor causes the one image forming apparatus to perform virus detection processing for detecting a computer virus, and
in response to a computer virus being detected by the one image forming apparatus performing the virus detection processing, the first hardware processor causes the first transmitter to transmit an execution request to perform the virus detection processing to another image forming apparatus different from the one image forming apparatus among the plurality of image forming apparatuses.

US Pat. No. 10,657,255

DETECTING MALICIOUS CODE BASED ON CONDITIONAL BRANCH ASYMMETRY

INTERNATIONAL BUSINESS MA...

1. A system for detecting malicious blocks based on detected asymmetric conditional branches, the system comprising:a hardware processor device configured to:
receive an application to be tested;
generate an interprocedural control-flow graph (ICFG) based on a static call graph for the application;
detect symbolic path conditions and executable operations along different paths of conditional branches in the ICFG;
detect asymmetric conditional branches based on the symbolic path conditions and the executable operations, wherein differing amounts of code detected in two or more respective conditional branches indicate an asymmetric conditional branch;
identify one or more malicious blocks based on the detected asymmetric conditional branches; and
modify the application based on the one or more detected malicious blocks.

US Pat. No. 10,657,254

IDENTIFYING MALICIOUS CREATIVES TO SUPPLY SIDE PLATFORMS (SSP)

CLEAN.IO, INC., McLean, ...

1. A method for feeding identification data of malicious creatives existing in internet advertisements to a supply side platform (SSP), the method comprising:receiving from client computing devices malicious code reports of attempted unwanted actions by malicious creatives of internet advertisements (ads) requested from the SSPs by webpages being displayed to users, the internet advertisements promoting goods and/or services,
wherein executing each malicious creative in a browser activates an unwanted action attempt by malicious code without user action;
each malicious code report including a malicious code creative identification, a malicious code chain of events, and at least one of a malicious code demand side platform (DSP) identification or a malicious code seat identification;
pre-processing each malicious code report to create pre-processed malicious code reports by:
classifying a type of the unwanted action attempt for each malicious code report based on the malicious code chain of events;
storing the pre-processed malicious code reports in a searchable database for a keep-alive period, wherein storing includes:
parsing each pre-processed malicious code report to extract the malicious code creative identification, a SSP identification for the malicious code, and the malicious code demand side platform (DSP) identification or the malicious code seat identification;
storing the parsed pre-processed malicious code reports in the searchable database, each parsed pre-processed malicious code report including the malicious code creative identification, the SSP identification, a timestamp of the unwanted action attempt and the classification of the type of the unwanted action attempt; and
feeding the stored parsed pre-processed malicious code reports to the SSPs based on the SSP identifications of the stored parsed pre-processed malicious code reports.

US Pat. No. 10,657,253

SYSTEM AND METHOD FOR DETERMINING CORRESPONDENCE AND ACCOUNTABILITY BETWEEN BINARY CODE AND SOURCE CODE

THE GOVERNING COUNCIL OF ...

1. A non-transitory computer readable storage medium having stored therein computer executable program code, which when executed by a processor, causes the processor to provide a code auditor to classify safe functions and suspicious functions in code, the code auditor comprising:an extractor configured to accept as input source code and extract source code features including source code functions, and to accept as input binary code and extract binary features, including binary functions;
a matching block configured to obtain an estimated correspondence between the source code functions and the binary code functions by comparing a comparison selection of the source code features to a comparison selection of the binary code features;
an accountability block configured to compare an accountability selection of features of the binary code features characterizing functions of the binary code functions with corresponding features of the source code features characterizing the corresponding functions of the source code functions to make a determination of the accountability of the binary code functions in terms of the source code functions; and
the source code auditor configured to output a classification file of safe functions and suspicious functions based on the accountability of the binary code functions in terms of the source code functions;
wherein the comparison selection, for each pair composed of a function of the source code functions and a function of the binary code functions, includes a computed value representing a measure of a difference between the comparison selection of the features characterizing the function of the pair from the source code functions and the comparison selection of the features characterizing the function of the pair from the binary code functions.

US Pat. No. 10,657,252

DETECTING MALICIOUS CODE EMBEDDED IN DOCUMENTS

Oracle International Corp...

1. A method for analyzing a document, comprising:obtaining, by a computer processor, a runtime model for an application used to process the document;
extracting, from the document, a set of code blocks each comprising a set of statements;
generating, using the runtime model, a result comprising a series of abstract states for each statement of a code block of the set of code blocks, wherein each abstract state of the series of abstract states comprises a series of abstract values each corresponding to a set of concrete values; and
determining, using the result and the runtime model, whether the document comprises potentially malicious code by determining whether a first series of abstract values of a first abstract state of the result comprises:
a previous abstract value corresponding to a first set of concrete values, and
a next abstract value corresponding to a second set of concrete values, wherein the next abstract value is equivalent to the previous abstract value.

US Pat. No. 10,657,251

MULTISTAGE SYSTEM AND METHOD FOR ANALYZING OBFUSCATED CONTENT FOR MALWARE

FireEye, Inc., Milpitas,...

1. A system for detecting malicious content, comprising:a hardware storage device;
a first component stored within the hardware storage device, the first component to receive content and determine whether native code of the content is accessible;
a de-constructor stored within the hardware storage device, the de-constructor to receive the content from the first component in response to the native code being inaccessible to the first component, the de-constructor to select an analysis technique that implements a de-compiler to access the native code and output a deconstructed representation of the received content; and
a post-processor stored within the hardware storage device, the post-processor to receive the deconstructed representation of the received content from the de-constructor, determine whether the native code represented by the deconstructed representation of the received content is suspicious thereby indicating that at least a portion of the native code includes attributes associated with malware, establish a secure communication with a cloud computing service when the native code is determined to be suspicious or remove the native code from further analysis when the native code is determined to be non-suspicious, and provide at least the suspicious native code to the cloud computing service to perform a dynamic analysis of the native code by processing the native code within one or more virtual machines configured with a software profile suitable for the processing of the native code and analysis of an observed behavior of the one or more virtual machines.

US Pat. No. 10,657,250

METHOD AND APPARATUS FOR DETECTING ANOMALY BASED ON BEHAVIOR-ANALYSIS

SAMSUNG SDS CO., LTD., S...

1. A method for detecting an anomaly based on behavior-analysis, the method comprising:creating, by an apparatus for detecting an anomalous behavior of a user, K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users;
designating, by the apparatus, a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster;
determining, by the apparatus, a past behavior pattern of a first user based on first past behavior counters associated with the first user and the each cluster of the K clusters;
obtaining, by the apparatus, first current behavior counters associated with the first user based on monitoring information from an agent software program, the agent software program being installed on a computing device of the first user and monitoring behaviors associated with the first user;
determining, by the apparatus, a current behavior pattern of the first user based on the first current behavior counters and the each cluster of the K clusters; and
detecting, by the apparatus, the anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user,
wherein the designating the cluster pattern comprises:
extracting a center vector of the each cluster of the K clusters by using values of the past behavior counters belonging to respective clusters;
calculating a mean value and a standard deviation of coordinates of the center vector for the each cluster of the K clusters;
setting a threshold value for the each cluster of the K clusters by using the mean value and the standard deviation; and
selecting a behavior corresponding to coordinates exceeding the threshold value among the coordinates of the center vector as the cluster pattern of the each cluster of the K clusters.

US Pat. No. 10,657,249

IDENTIFYING FRAUDULENT ACTIVITIES AND THE PERPETRATORS THEREOF

PAYPAL, INC., San Jose, ...

1. A method for fighting online fraud attempts, comprising:determining, by a computer system, a plurality of metadata information from a plurality of electronic communications originally transmitted by one or more client devices, wherein the metadata information corresponds to transmissions made using one or more standardized Internet communication protocols;
analyzing the plurality of metadata information to determine a particular identifying pattern in the metadata information that occurs in different ones of the electronic communications;
identifying, using the particular identifying pattern, a particular user account that is associated with the particular identifying pattern;
determining that the particular user account is associated with fraudulent activity;
comparing particular metadata for a particular electronic communication originally transmitted by a particular client device to the determined particular identifying pattern in the metadata information;
based on the comparing, determining that at least a portion of the particular identifying pattern appears in the particular metadata; and
responsive to determining that at least the portion of the particular identifying pattern appears in the particular metadata and based on the particular identifying pattern being associated with the particular user account and responsive to determining that the particular user account is associated with fraudulent activity, classifying the particular electronic communication as relating to a potential fraudulent activity.

US Pat. No. 10,657,248

SYSTEMS AND METHODS FOR USING ATTRIBUTE DATA FOR SYSTEM PROTECTION AND SECURITY AWARENESS TRAINING

KnowBe4, Inc., Clearwate...

1. A method for creating attribute data for a file of an application, the method comprising:(a) registering, by a service executing on a device, a driver into an operating system of the device to monitor processes, the driver configured to receive notifications from the operating system of processes started or terminated on the device;
(b) executing, an attribute data writer on the device, the attribute data writer in communication with the driver to receive notifications from the driver of processes started on the device;
(c) receiving, by the attribute data writer, a process id from the driver for a process of an application detected by the driver as starting on the device;
(d) injecting, by an injector program launched by the attribute data writer, an attribute data writer library into the process of the application corresponding to the process id;
(e) classifying, by the attribute data writer library, the application into a class of a plurality of classes; and
(f) causing, by the attribute data writer library, the application to create attribute data corresponding to the class responsive to a file being one of created or opened by the application.

US Pat. No. 10,657,247

ERROR CORRECTION CIRCUIT FOR PHYSICAL UNCLONABLE FUNCTION (PUF) CIRCUIT

NXL B.V., Eindhoven (NL)...

1. An error indicating circuit connected to a physical unclonable function (PUF) circuit, wherein the PUF circuit receives a challenge as a set of input bits and generates a response as a set of output bits, and wherein the set of input bits is encoded to provide access to a set of redundant bits stored in a redundant bits memory, the error indicating circuit comprising:an output rectifier circuit connected to the PUF circuit and the redundant bits memory for receiving the set of output bits and the set of redundant bits, respectively, and generating a set of rectified output bits;
an error comparator connected to the PUF circuit and the output rectifier circuit for receiving the set of output bits and the set of rectified output bits, respectively, and generating a first set of error bits based on a bitwise comparison of the set of output bits with the set of rectified output bits;
a first error counter connected to the error comparator for receiving the first set of error bits and generating an error count value based on the first set of error bits;
a flag comparator connected to the first error counter for receiving the error count value and setting a flag when the error count value is greater than a first threshold value;
a second error counter connected to the error comparator for receiving a second set of error bits and generating a set of count values that indicates, for each of the error bits, a number of operation cycles of the PUF circuit for which each said bit has not changed state; and
an error update comparator connected to the second error counter for receiving the set of count values, identifying count values that are greater than a second threshold value, and generating a corresponding set of flag bits, wherein a flag bit is set when the corresponding count value is greater than the second threshold value, and wherein the flag bits, when set, indicate that the corresponding error bit comprises a permanent error.

US Pat. No. 10,657,246

AUTHENTICATED DISCOVERABILITY OF UNIVERSAL WINDOWS APPLICATIONS TO WIN32 DESKTOP APPLICATIONS

McAfee, LLC, Santa Clara...

1. A computer system, comprising:one or more processors; and
a memory including instructions that, when executed, cause the one or more processors to at least:
execute a first executable application designed for execution using a first application programming interface (API);
access a first registration request from a second executable application designed for execution using a second API different from the first API, the first API and the second API executed within a same operating system environment, wherein the second executable application includes:
one or more components specific to the second API; and
one or more components that have a digital certification;
validate the digital certification of the one or more components; and
in response to the validating of the digital certification of the one or more components, save information from the first registration request into a registration store, wherein the information saved from the first registration request includes a unique identifier including (1) an identification of one or more types of events that the second executable application is to receive from the first executable application, and (2) a package family name for the second executable application;
raise, by the first executable application, an event having an event type and event information; and
send, to the second executable application, in response to determining that the event type of the raised event is saved in the registration store, the raised event without requiring further authentication from the second executable application.

US Pat. No. 10,657,245

DYNAMICALLY CONTROLLING ACCESS TO DEVICES

Wyse Technology L.L.C., ...

1. A method, performed by a device control driver that is loaded on a computing device as an upper filter driver on a device driver stack of a device, for dynamically controlling access to the device, the method comprising:in response to the device being connected to the computing device and in conjunction with the device driver stack of the device being loaded on the computing device, loading, by the device control driver, as an upper filter driver on the device driver stack;
identifying, by the device control driver, information about the device;
sending, by the device control driver, the information about the device to a device control server to request that the device control server provide an indication of whether applications executing on the computing device should be allowed to access the device;
receiving, by the device control driver and from the device control server, the indication of whether the applications executing on the computing device should be allowed to access the device;
when the indication defines that the applications executing on the computing device should be allowed to access the device and in response to intercepting I/O requests that are generated by the applications and that target the device, allowing, by the device control driver, the I/O requests by passing the I/O requests down the device driver stack; and
when the indication defines that the applications executing on the computing device should not be allowed to access the device and in response to intercepting I/O requests that are generated by the applications and that target the device, blocking, by the device control driver, the I/O requests by preventing the I/O requests from being passed down the device driver stack.

US Pat. No. 10,657,244

IDENTITY AUTHENTICATION METHOD AND APPARATUS

Tencent Technology (Shenz...

1. An identity authentication method performed at a computing device having one or more processors, memory storing one or more programs to be executed by the one or more processors and a touchpad, the method comprising:receiving an identity authentication request from a user, the identity authentication request carrying authentication information;
generating a verification code according to the authentication information;
obtaining a sequence of finger gestures on the touchpad from the user, wherein each finger gesture has an associated pressure type on the touchpad;
generating a corresponding character string according to the sequence of finger gestures;
comparing the character string with the verification code of a user account associated with an application program;
in accordance with a determination that the character string matches the verification code, granting the user access to the user account associated with the application program; and
in accordance with a determination that the character string does not match the verification code, denying the user access to the user account associated with the application program.

US Pat. No. 10,657,243

VARIATION ANALYSIS-BASED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART

1. A gesture verification method, comprising the following steps:S1, providing an image containing a randomly generated reference trajectory through a system and presetting a minimal match degree;
S2, displaying the image to a user;
S3, the user drawing a resemblant trajectory to match the randomly generated reference trajectory;
S4, scaling the resemblant trajectory to adapt to a size of the randomly generated reference trajectory to obtain a scaled resemblant trajectory;
S5, matching the scaled resemblant trajectory with the randomly generated reference trajectory to obtain a match degree, if the match degree is lower than the minimal match degree, the verification fails; if the match degree is equal to or higher than the minimal match degree, the verification succeeds; and
the gesture verification method further comprising:
defining a first feature point and a second feature point;
wherein the first feature point is defined by drawing a straight line joining a start point and an end point of the resemblant trajectory, the point on the resemblant trajectory, farthest from the line, is defined as the first feature point of the resemblant trajectory;
the second feature point is defined by drawing a straight line joining the start point of the resemblant trajectory and the first feature point and drawing another line joining the first feature point and the end point of the resemblant trajectory, the point on the resemblant trajectory, farthest from both lines, is defined as the second feature point of the resemblant trajectory;
wherein the step S4 comprises the following steps:
S41, finding out the first feature point and the second feature point of the randomly generated reference trajectory, and calculating a distance L between the first feature point and the second feature point;
S42, finding out the first feature point and the second feature point of the resemblant trajectory, and calculating a distance L? between the first feature point and the second feature point;
S43, scaling the resemblant trajectory or the randomly generated reference trajectory to the proportion of L?: L.

US Pat. No. 10,657,242

PROXIMITY-BASED ACCESS

MicroStrategy Incorporate...

1. A method performed by a computing device, the method comprising:detecting, by the computing device, an attempt to access the computing device while the computing device is in a secured state;
in response to detecting the attempt to access the computing device, sending, by the computing device, a first message to a server system over a network;
after sending the first message, receiving, by the computing device, a second message from the server system over the network, the second message comprising authentication data transmitted to the server system by a mobile device that was previously designated as an authentication factor for accessing the computing device, wherein the authentication data is transmitted by the mobile device after the computing device sent the first message to the server system, and wherein the authentication data demonstrates authorization to access the computing device;
determining, by the computing device, that the mobile device that was previously designated as an authentication factor for accessing the computing device is located within a predetermined level of proximity of the computing device; and
in response to determining that the computing device is located within the predetermined level of proximity of the computing device, and based on the received authentication data, granting, by the computing device, access to the computing device.

US Pat. No. 10,657,241

MOBILE AUTHENTICATION USING A WEARABLE DEVICE

EBAY INC., San Jose, CA ...

9. A method comprising:determining a first security token value based on a property of a first security token system, the property of the first security token system including a reliability of the first security token system to be used as a physical security token, a determining of the reliability of the first security token system being based on a likelihood of possession of the first security token system by a user, a determining of the likelihood of possession of the first security token system being based on a type of the first security token system, an increased likelihood of possession of the first security token system by the user based on the type of the first security token system resulting in an increased value for the first security token value:
determining a second security token value based on a property of a second security token system, the property of the second security token system including a reliability of the second security token system to be used as an additional physical security token, a determining of the reliability of the second security token system being based on a likelihood of possession of the second security token system by the user, a determining of the likelihood of possession of the second security token system being based on a type of the second security token system;
associating the first security token value with the first security token system;
associating the second security token value with the second security token system;
detecting an attempt by the user to access a protected system; and
providing the user with an option to access the protected system by satisfying a reduced security measure, the option being provided based on a determination that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the threshold security token value selected based on a sensitivity of data that is to be accessed by the user, the providing of the user with the option is performed by one or more computer processors.

US Pat. No. 10,657,240

INFORMATION DISPLAY DEVICE

Universal Entertainment C...

1. An information display control method using:a card-reading device, which is configured to read user identification information from a card;
an information-accessing device, which is configured to access a plurality of information that is associated with the user and that is stored in an upper level device, the plurality of information being distinguished between information not requiring authentication in order to be displayed and information requiring authentication in order to be displayed; and
a display, which is configured to display the plurality of information associated with the user,
the method comprising the steps of, when the card-reading device reads the card;
1) acquiring the information not requiring authentication in order to be displayed from the upper level device according to the user identification information, and
2) causing the acquired information not requiring authentication to be displayed directly in the display without being authenticated by the user.

US Pat. No. 10,657,239

LIMITING ACCESS TO APPLICATION FEATURES IN CLOUD APPLICATIONS

ORACLE INTERNATIONAL CORP...

1. A method for providing access to an application feature, the method comprising:receiving, by an integration cloud service system of a cloud environment, a request to access an access controlled feature in an application in the cloud environment, wherein the access controlled feature is configured to be accessed by using an access key that is generated based on user information;
dynamically generating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information, wherein the user information comprises at least one from a group consisting of a user role, a user permission, user environment information, user system version information, and feature information;
validating, by the integration cloud service system, the access key for the access controlled feature in the application based on the user information; and
in response to the access key being valid, executing, by the integration cloud service system the access controlled feature in the application.

US Pat. No. 10,657,238

SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE

Apple Inc., Cupertino, C...

1. A method for identifying an unauthorized user of an electronic device, the method comprising, at the electronic device, and in response to identifying that at least one condition is satisfied:collecting a first set of data associated with a current usage identity, wherein the first set of data includes at least one image of a current user of the electronic device;
obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes information that is associated with at least one image of an authorized user of the electronic device; and
determining, based on comparing the first and second sets of data, that a potential unauthorized usage of the electronic device is occurring; and
in response to determining that the electronic device is communicably coupled to a host device:
gathering information associated with the host device, and
communicating, to at least one computing device associated with the authorized usage entity, a notification that indicates an unauthorized usage of the electronic device, wherein the notification at least includes the information associated with the host device.

US Pat. No. 10,657,237

METHODS AND SYSTEMS FOR ELECTRONIC DEVICE CONCEALED MONITORING

Motorola Mobility LLC, C...

1. A method in an electronic device, the method comprising:identifying, with one or more sensors of the electronic device, an unauthorized user providing a command, received at a user interface of the electronic device, to power OFF the electronic device;
disabling, with one or more processors of the electronic device, user interface output devices of the electronic device while keeping one or more input devices of the electronic device operational;
emulating, with the user interface, a powered OFF state of the electronic device; and
increasing a number of authorized user identification factors required to cease emulating the powered OFF state.

US Pat. No. 10,657,236

WEARABLE-TYPE ELECTRONIC DEVICE MOUNTED WITH FINGERPRINT RECOGNITION SENSOR

Samsung Electronics Co., ...

1. A wearable-type electronic device comprising:a housing including:
a first face facing a first direction,
a second face facing a second direction that is opposite the first direction, and
a third face facing a third direction that is perpendicular to each of the first and second directions and enclosing at least a portion of a space between the first and second faces;
a support structure disposed between the first and second faces;
a display disposed on the first face to be exposed, and including:
a window having a first flange,
a second flange disposed to be opposite the first flange, and
a display module coupled to the window to face the second direction,
the display being disposed on a face of the support structure;
a first printed circuit board disposed on another face of the support structure;
at least one light emitter mounted adjacent to the first flange, and configured to emit light to a first region of the window; and
at least one light receptor mounted adjacent to the second flange, and configured to receive light reflected from the first region.

US Pat. No. 10,657,235

DISPLAY DEVICE, MOBILE DEVICE AND DISPLAY METHOD

BOE TECHNOLOGY GROUP CO.,...

1. A method using a mobile device comprising a host module and a display device, the method comprisingconnecting a display module of the display device to a display control module of the display device;
connecting a touch module to the display control module;
directly connecting a display drive component of the display control module and a security component of the display control module;
connecting a touch identification component of the display control module to the display drive component and the security component;
integrating a near-field communication antennas independent from the display control module and the touch module into the display module;
displaying, by the display module, information under the control of the display control module;
indicating, by a trusted mode indicator light, that the display device is in a secure and trusted display mode;
enabling, by the security component, the display device to enter the secure and trusted display mode;
encrypting and decrypting, by the security component, displayed information in the secure and trusted display mode,
in response to the display device entering the secure and trusted display mode, rendering the trusted mode indicator light to emit light with a first color;
in response to the display device exiting the secure and trusted display mode, rendering the trusted mode indicator light to emit light with a second color different from the first color,
authenticating, via the security component, a password inputted by a user;
in response to the authentication being successful, rendering the display device to enter the secure and trusted display mode;
in the secure and trusted display mode, receiving, by the host module, a business message from a trusted service system and forwarding it to the display control module;
authenticating, by the security component of the display control module, a received business message;
in response to the authentication being successful, decrypting the business message; and
controlling, the display drive component, the display module to display a decrypted business message.

US Pat. No. 10,657,234

METHOD, COMPUTER PROGRAM, AND SYSTEM TO REALIZE AND GUARD OVER A SECURE INPUT ROUTINE BASED ON THEIR BEHAVIOR

BEHAVIOMETRICS AB, Lulea...

1. A method for authentication of a user to a web-application based on a client-server-structure, the method comprising:on a client side of the client-server structure, using a web-browser for web-pages written in JavaScript to execute One Time JavaScript (OT-JS) code based on a unique one-time token, said OT-JS code is included in a secure input routine written in JavaScript;
querying a user, using at least one input-page containing said secure input routine, for authentication-related information, said at least one input-page including JavaScript Object Notation (JSON) code which is interpreted and executed by a JavaScript interpreterof said web-browser; and
ensuring correct execution of said OT-JS code by a guard-application on the server
wherein the OT-JS code of said input routine uses a rearranging of data-field headers of at least two input-fields to add extra security and to deter reverse engineering, wherein said rearranging includes randomly changing time data formats and identifiers for each use of said code.

US Pat. No. 10,657,233

EXTENDING ELECTRONIC ID INFORMATION

ASSA ABLOY AB, Stockholm...

1. A method of maintaining a plurality of different sets of data groups for virtualized credentials of a holder, comprising:storing a first subset of the data groups according to a standard for storing data groups, wherein the standard verifies each data group in the first subset of data groups;
storing a second subset of the data groups as a plurality of auxiliary data elements that are separate from the first subset, wherein the auxiliary data elements are not directly accessible using the standard;
providing a custom data group in the first subset that verifies each of the auxiliary data elements; and
verifying at least one of the auxiliary data elements using the custom data group and verifying the custom data group using the standard.

US Pat. No. 10,657,232

INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS

FUJITSU LIMITED, Kawasak...

1. An information processing apparatus that is accessed from a terminal device via a communication link, the terminal device being assigned unique information, the information processing apparatus comprising:a processor that executes a command received from the terminal device;
a storage device that stores therein control information to be accessed from the terminal device;
a plurality of communication ports including a communication port to which the terminal device is connectable;
a first communication control device that includes an authentication login information storage unit that stores therein authentication login information to be used for authenticating access from the terminal device, and that compares, when the terminal device connects to a first communication port among the plurality of communication ports, login information received from the terminal device with the authentication login information, and outputs the command received from the terminal device when the login information matches the authentication login information; and
a control device that includes a first authentication unique information storage unit that stores therein first authentication unique information to be used for authenticating connection of the terminal device to the first communication port, and that compares, when the first communication control device outputs the command received from the terminal device, the unique information of the terminal device with the first authentication unique information, and when the unique information matches the first authentication unique information, causes the processor to perform only a process of reading the control information according to the command received from the terminal device.

US Pat. No. 10,657,231

PROVIDING AN AUTHENTICATING SERVICE OF A CHIP

International Business Ma...

1. A system for providing an authenticating service of a chip, the system comprising:an authentication device comprising an identification engine, a self-test engine, and an intrinsic component associated with a chip and has an intrinsic feature;
the self-test engine configured to retrieve the intrinsic feature and communicate the intrinsic feature to the identification engine, wherein the intrinsic feature is a bit pattern generated from a specified fail count;
the identification engine configured to receive the intrinsic feature, generate a first authentication value using the intrinsic feature, and store the first authentication value in memory;
the self-test engine further configured to generate a second authentication value using an authentication challenge,
the identification engine further comprising a compare circuitry configured to compare the first authentication value and the second authentication value; and
the compare circuitry further configured to generate an authentication output value based on the results of the compare of the first authentication value and the second authentication value.

US Pat. No. 10,657,230

ANALYSIS OF OUTPUT FILES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for file management, the method comprising:monitoring, by a processor, a device to determine an execution of a new process on the device;
based at least in part on the new process starting, monitoring a file system for a creation of a new file, wherein the new file includes one or more file characteristics;
comparing the one or more file characteristics to a knowledge database to determine a file type for the new file;
associating the new file to the new process based at least in part on determining the file type for the new file;
monitoring a first set of processing characteristics required to create the new file on the device;
determining a first hardware configuration for the device, where the device is a first device;
identifying a second device, the second device including a second hardware configuration;
analyzing the first hardware configuration and the second hardware configuration to determine that the second hardware configuration requires fewer software licenses to run the new process with similar processing characteristics to the first set of processing characteristics;
moving the new process to the second device; and
removing the new process from the first device.

US Pat. No. 10,657,229

BUILDING RESILIENT MODELS TO ADDRESS DYNAMIC CUSTOMER DATA USE RIGHTS

Fair Isaac Corporation, ...

1. A method of building a decision or prediction model used for analyzing and scoring behavioral transactions, wherein a customer dataset in a model development store used to build an original model is subject to a data right usage withdrawal, the original model having coverage over the customer dataset, the method comprising:extracting, by one or more processors using data sampling, a portion of the customer dataset to generate a model surrogate dataset that has a distribution of values with a first degree of similarity to the distribution of values of the customer dataset;
discretizing, by the one or more processors, vectors present in both the model surrogate dataset and the customer dataset;
receiving, by the one or more processors, data representing the data right usage withdrawal from the customer dataset;
determining, by the one or more processors, a depletion of the model surrogate dataset according to the data right usage withdrawal;
computing, by the one or more processors, an estimated mean time to coverage failure of the original model based on the depletion of the model surrogate dataset according to the data right usage withdrawal; and
tracking, by one or more processors, a consent validity of a customer associated with the customer dataset, the consent validity representing the customer's continued consent validity for use in the original model.

US Pat. No. 10,657,228

TECHNOLOGIES FOR INTEGRATING CLOUD CONTENT ITEMS ACROSS PLATFORMS

Dropbox, Inc., San Franc...

1. A method comprising:receiving a first request to access a canonical content item stored at a content management system, the canonical content item representing a content item comprising a cloud-based content item or a cloud-backed content item, wherein one or more features of the content item are designed for access through a native online application associated with a cloud content provider;
in response to the canonical content item being invoked, sending, from a local application to the cloud content provider, a second request for the one or more features of the content item;
receiving, at the local application and from the cloud content provider, metadata for enabling the one or more features of the content item; and
in response to receiving the metadata for enabling the one or more features of the content item, providing, on the local application, the one or more features of the content item and a content of the content item as part of a rendered instance of the canonical content item.

US Pat. No. 10,657,227

STREAMLINED DIGITAL RIGHTS MANAGEMENT

Comcast Cable Communicati...

1. A method, comprising:pre-negotiating, between a content server and a license server, a license, the license pertaining to a media content;
receiving, by an authentication server from a client, a request to establish a session, the request to establish a session specifying a user account;
authenticating, by the authentication server, the client based on information relating to the user account;
establishing, between the authentication server and the client, a session, the session having a session security mechanism;
transmitting, by the authentication server to the client, a response to the request to establish a session, the response to the request to establish a session comprising a first indication of the session security mechanism;
receiving, at the content server from the client, a request to access the media content, the request to access the media content comprising a second indication of the session security mechanism;
determining, by the content server based at least in part upon the second indication of the session security mechanism, to grant access to the media content; and
providing, by the content server to the client, a content grant comprising a content key, the content key being embedded in a manifest associated with the media content, wherein the content key is consistent with the license.

US Pat. No. 10,657,226

DIGITAL MEDIA REPRODUCTION AND LICENSING

Media Chain, LLC, Miami,...

1. A system for determining a target demographic for media marketing, comprising:a receiver configured to:
receive a request from an external device associated with a user requesting to stream a media content item and a second request from a second user to stream the media content item,
wherein the media content item includes media content item data included in a digital media file and the media content item data includes at least one identification characteristic that is unique to the media content item that is included in the media content item data when the media content item is initially recorded and not dependent on any encoding during any mastering of the media content item, and
receive one or more requests from a party other than the user or the second user;
at least one processor; and
a memory coupled with the processor, the memory including instructions that, when executed by the processor cause the processor to:
determine the at least one identification characteristic of the media content item data to identify the media content item based on a media fingerprint determination to determine a media fingerprint that uniquely identifies the media content item and includes the at least one identification characteristic,
wherein the at least one identification characteristic is a characteristic unique to the media content item data and the determination of the media fingerprint includes:
determine a plurality of times corresponding to the media content item data within the media content item,
determine for each time a set of words within the media content item data for audible rendering of the media content item uniquely corresponding to the each time based on word recognition,
determine for the each time a corresponding audio frequency of the media content item data,
determine for the each time a data point that includes
the each time,
the corresponding set of words,
and the corresponding audio frequency, and
determine the media fingerprint including each determined data point;
extract from a first user record first user data that includes first demographic data that is specific to the user and from the media record the media content item data that is specific to the media content item into a first statistics record identified by the media fingerprint, wherein the first statistics record summarizes the first user data and the media content item data identified by the media fingerprint associated with the request to stream the media content item;
extract from a second user record second user data that includes second demographic data that is specific to the second user and from the media record the media content item data that is specific to the media content item into a second statistics record identified by the media fingerprint, wherein the second statistics record summarizes the second user data and the media content item data identified by the media fingerprint associated with the second request to stream the media content item;
append, using the media fingerprint, the first statistics record and the second statistics record to a plurality of statistics record that correspond to and are identified by the media fingerprint to generate an updated plurality of statistics records in a database,
wherein the updated plurality of statistics records summarize the first user data and the second user data and the media content item data associated with the request and the second request to stream the media content item;
in response to the one or more requests from the party:
retrieve the updated plurality of statistics records from the database using the media fingerprint,
determine based on the retrieved plurality of statistics records the target demographic based on a first demographic corresponding to the first demographic data and a second demographic corresponding to the second demographic data and a plurality of additional demographic data corresponding to the plurality of statistics records, and
distribute the plurality of statistics records to the party, wherein the target demographic enables the party to target marketing of different media content items to a plurality of other users characterized by the target demographic.

US Pat. No. 10,657,225

PROVIDING BLOCKCHAIN-BASED SUBSCRIPTION-AS-A-SERVICE MANAGEMENT

Red Hat, Inc., Raleigh, ...

1. A method for providing blockchain-based subscription-as-a-service on customer networks, comprising:executing, by a node of a plurality of nodes within a customer network, a first subscription-as-a-service software instance;
in conjunction with executing the first subscription-as-a-service software instance, broadcasting, by an activation agent of the node executing the first subscription-as-a-service software instance, an activation transaction for requesting activation of the first subscription-as-a-service software instance to one or more nodes of the plurality of nodes;
generating, by a block-issuing agent of a block-issuing node, a blockchain block comprising the activation transaction as part of a blockchain and inserting a billing transaction comprising billing data into the blockchain block;
receiving, by the activation agent of the node executing the first subscription-as-a-service software instance, in response to broadcasting the activation transaction, the blockchain block comprising the activation transaction as part of the blockchain;
determining, by the activation agent of the node executing the first subscription-as-a-service software instance, whether the first subscription-as-a-service software instance was successfully activated, based on the blockchain block;
responsive to determining that the first subscription-as-a-service software instance was successfully activated, enabling continued execution of the first subscription-as-a-service software instance;
executing, by the node of the plurality of nodes executing the first subscription-as-a-service software instance, a second subscription-as-a-service software instance;
in conjunction with executing the second subscription-as-a-service software instance, broadcasting, by the activation agent, a second activation transaction for requesting activation of the second subscription-as-a-service software instance to the one or more nodes of the plurality of nodes;
determining, by the activation agent of the node executing the second subscription-as-a-service software instance, that a subscription timeout interval has elapsed since the second activation transaction was broadcast;
responsive to determining that the subscription timeout interval has elapsed and to determining that no activation transaction for the second subscription-as-a-service software instance has been received in a blockchain block, terminating execution of the second subscription-as-a-service software instance; and
deleting, by the block-issuing agent, blocks older than a current billing period from the blockchain.

US Pat. No. 10,657,224

MONITORING AND TREATMENT DOSAGE PREDICTION SYSTEM

Accenture Global Solution...

1. A method, comprising:receiving, by a device and from at least one of a sensor of a user device or a server device via a network, lifestyle information corresponding to a user, of the user device, with a medical condition;
creating, by the device and based on receiving the lifestyle information, a lifestyle timeline associated with the user,
the lifestyle timeline:
including a plurality of items of lifestyle information, included in the lifestyle information, and having the plurality of items of lifestyle information arranged in a chronological order;
generating, by the device and based on receiving the lifestyle timeline, a recommendation or a prediction associated with a metric related to the medical condition,
the recommendation being generated based on one or more of the plurality of items of lifestyle information, or
the prediction being generated using a prediction model that uses one or more of the plurality of items of lifestyle information as input;
receiving, by the device and from another device via the network, transaction information associated with a purchase of food by the user;
receiving, by the device via the network, location information associated with the user;
generating, by the device and based on the transaction information and the location information, an updated recommendation regarding insulin dosage; and
providing, by the device and to an insulin device via the network, the updated recommendation,
upon receipt of the updated recommendation, the insulin device adjusting an amount of insulin to a recommended dosage identified by the updated recommendation after the updated recommendation is accepted via a user interface of the insulin device, and
the insulin device administering the amount of insulin to the user after the updated recommendation is accepted via the user interface of the insulin device.

US Pat. No. 10,657,223

CONTROLLED INVENTORY REFRIGERATED DISPENSING SYSTEM

MINIBAR AG, Baar (CH)

1. A refrigerated storage and dispensing unit, comprising:a refrigerator cabinet;
a control compartment comprising a processor having computer executable code configured to receive and store inventory data from said unit;
a shelf within said refrigerator cabinet and in data communication with said control compartment; and
a plurality of product dispensing cartridges removably positioned on said shelf each said product dispensing cartridge further comprising a vertical housing holding a plurality of product units and a dispensing drawer configured for horizontal movement out of said housing, wherein each said product dispensing cartridge is configured to sequentially dispense a single one of said product units upon each horizontal extension of said dispensing drawer from a fully closed position to a fully open position.

US Pat. No. 10,657,222

REAL-TIME EVENT COMMUNICATION AND MANAGEMENT SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT

Iodine Software, LLC, Au...

1. A method for real time medical communication, the method comprising:analyzing, by a real time medical communication system having a processor and a non-transitory computer-readable medium, events of interest relative to medical criteria, the events of interest determined by the real time medical communication system from parsing real time medical data from a data feed;
based on the analyzing, generating, by the real time medical communication system, one or more medical alerts that satisfy the medical criteria for alert generation;
determining, by the real time medical communication system, which notification criteria for the one or more medical alerts have been met, the notification criteria including user-specified notification criteria received by the real time medical communication system from user devices associated with a plurality of user groups;
preparing, by the real time medical communication system based at least in part on the user-specified notification criteria, notifications of the one or more medical alerts; and
communicating, by the real time medical communication system, the notifications to a plurality of devices associated with users whose user-specified notification criteria for the one or more medical alerts have been met.

US Pat. No. 10,657,221

FILE SYSTEM FOR MEDICAL IMAGES AND DATA

1. A computer system for organizing and accessing DICOM files and non-DICOM files, the computer system comprising:(a) a computer processor;
(b) a user input device for receiving input from a user;
(c) a network interface;
(d) a display device for displaying information to the user;
(e) a directory manager implemented by the processor for creating and managing directories, each directory being linked by exactly one parent directory, a plurality of the directories being configured to be linkable to DICOM files, each DICOM file comprising a medical image and being formatted according to the DICOM standard, each DICOM file containing metadata specifying a DICOM series to which the image belongs and a DICOM study to which the DICOM series belongs, at least some of the plurality of the directories further being configured to also be linkable to native format non-DICOM files that are not formatted according to the DICOM standard format for storing medical image files;
(f) a user interface implemented by the processor configured to display on the display device, in response to a selection by the user, a representation of at least a portion of the files and hierarchy defined by links between the directories and the links from directories to the DICOM files and the non-DICOM files, and configured to, in response to a selection by the user of one of the representations of files, display at least a portion of the contents of the file corresponding to the selected representation; and
(g) a DICOM interface configured to listen for DICOM requests addressed to a network address of the network interface,
wherein one or more of the directories is a DICOM-enabled directory having a DICOM application entity title, and the directory manager is further configured to receive DICOM requests from the DICOM interface, each DICOM request including a DICOM application entity title specifying one of the DICOM-enabled directories and including a plurality of DICOM files, so that, in response to the DICOM request, for each DICOM file, the directory manager creates a link to the DICOM file in a series directory representing the DICOM series, creates a link to the series directory in a study directory representing the DICOM study, and creates a link to the study directory in the specified DICOM-enabled directory.

US Pat. No. 10,657,220

SYSTEM AND METHODS FOR MEDICAL REPORTING

ASCEND HIT LLC, Lisle, I...

1. A computer system for creating a structured image set derived from a plurality of actual patient medical images, comprising:a processor;
a screen display;
a main memory in communication with the processor via a communication infrastructure, said memory including stored instructions that, when executed by said processor, cause said processor to:
receive one or more of the plurality of actual patient medical images that display anatomical features or pathologies and create one or more structured reference frames;
retrieve a program code that allows for command code to generate one or more structured data sets from a knowledge base, wherein the structured data set comprises information directed to the anatomical features or the pathologies;
analyze the one or more structured reference frames using the one or more structured data sets by mapping the anatomical features or the pathologies of the actual patient medical images to the information of the structured data set;
generate the structured image set comprising both the one or more structured reference frames and the one or more structured data sets, the structured image set including a structured image object displayed on the actual patient medical images, the structure image object comprising a data information component or graphical data components associated with the anatomical features or pathologies, the data information component or the graphical data components positioned on the one or more structured reference frames; and
display on the screen display the structured image set such that one or more health care worker may view and modify and add to information shown on the structured image set.

US Pat. No. 10,657,219

COLLABORATIVE EDITING OF MANUFACTURING DRAWINGS

Brigham Young University,...

1. A system comprising:a collaborative data store configured to store a 3D collaborative model comprising a plurality of features for a part that is to be manufactured, wherein the 3D collaborative model is encoded in a collaborative server format;
a collaborative server configured to manage the collaborative data store;
a first computer aided technology (CAx) client comprising at least one processor and configured to execute a first CAx application and enable a first user to edit or view a first 3D proprietary model wherein the first 3D proprietary model is encoded in a first CAx format that is different than the collaborative server format;
a second computer aided technology (CAx) client comprising at least one processor and configured to execute a second CAx application and enable a second user to edit or view a second 3D proprietary model wherein the second 3D proprietary model is encoded in a second CAx format that is different than the first CAx format and the collaborative server format;
one or more synchronization modules configured to execute on at least one of the first CAx client, the second CAx client, and the collaborative server, the one or more synchronization modules configured to synchronize the collaborative model with the first 3D proprietary model in response to updates to at least one of the first 3D proprietary model, the second 3D proprietary model, and the 3D collaborative model;
wherein the one or more synchronization modules are further configured to detect a request from the first user to generate a first 2D manufacturing drawing and model corresponding to a selected view of the part that is to be manufactured;
wherein the one or more synchronization modules are further configured to generate, responsive to the request from the first user, the first 2D manufacturing model and a 2D collaborative model corresponding to the first 2D manufacturing model and initiate storage of the 2D collaborative model on the collaborative data store;
wherein the first 2D manufacturing model is distinct from the first 3D proprietary model, the second 3D proprietary model, and the 3D collaborative model; and
wherein the first 2D manufacturing drawing and model enable the user to specify and update manufacturing dimensions and tolerances without updating any of the first 3D proprietary model, the second 3D proprietary model, and the 3D collaborative model.

US Pat. No. 10,657,218

WIRELENGTH DISTRIBUTION SCHEMES AND TECHNIQUES

Arm Limited, Cambridge (...

1. A device comprising:a processor; and
memory having stored thereon instructions that, when executed by the processor, cause the processor to:
acquire an integrated circuit layout of physical cells from a database;
define wirelength relationships between input/output (IO) connections (T) and a cell count (N) for the physical cells in multiple domains including a standard cell domain, a functional implementation domain, and a chip periphery domain;
define wirelength parameters of the integrated circuit layout in each domain of the multiple domains;
generate a data file for the integrated circuit layout of the physical cells based on the wirelength relationships and the wirelength parameters to guide power and performance of the integrated circuit layout of the physical cells; and
fabricate, or contribute to the fabrication of, an integrated circuit based on the data file for the integrated circuit layout of the physical cells.

US Pat. No. 10,657,217

LATENCY TEST IN NETWORKING SYSTEM-ON-CHIP VERIFICATION

Mentor Graphics Corporati...

1. A method, comprising:associating, by a hardware model of interface circuitry implemented in a reconfigurable hardware modeling device, arrival time information with messages when the messages are delivered to a hardware model of a circuit design implemented in the reconfigurable hardware modeling device, the arrival time information of a particular message including information about when, based on a model time reference provided in the reconfigurable hardware modeling device, the particular message is delivered to the hardware model of the circuit design, wherein the associating arrival time information with messages comprises inserting the arrival time information of each of the messages in a metadata field of or a data field of the each of the messages or in special messages;
associating, by the hardware model of the interface circuitry, latency information with the messages when the messages are dispatched by the hardware model of the circuit design, the latency information being determined based on the model time reference and the arrival time information; and
sending the messages and the latency information to a traffic analysis device.

US Pat. No. 10,657,216

ROUTERLESS NETWORKS-ON-CHIP

Oregon State University, ...

1. A computer-implemented method, comprising:by a processor implementing an electronic design automation (EDA) design tool, generating a hardware description of a network-on-chip configured to interconnect a plurality of processing cores of a multi-core processor via routerless wiring paths, wherein the generating comprises:
inputting parameters describing a size of a topological mesh of nodes, the nodes of the mesh corresponding to processing cores of the multi-core processor;
generating a wiring layout for the network-on-chip by applying a path generation procedure that generates circular wiring paths connecting processing cores of a first layer of the topological mesh and recursively applying the path generation procedure to generate circular wiring paths connecting processing cores for one or more additional layers of the topological mesh; and
outputting the wiring layout.

US Pat. No. 10,657,215

COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR GENERATING A LAYOUT OF A CELL DEFINING A CIRCUIT COMPONENT

Arm Limited, Cambridge (...

1. A method, comprising:generating first archetype layouts associated with first standard cells that conform to a process technology, wherein the first archetype layouts are generated with stick diagrams having rectangular sections along with absent rectangular sections;
generating a database for the first archetype layouts, wherein the database has mapping entries associated with the process technology, and wherein the database has grid locations associated with the rectangular sections of the stick diagrams;
determining if the mapping entries match the grid locations, wherein if the mapping entries match the grid locations, then modifying the mapping entries to include the absent rectangular sections in first archetype layouts; and
automatically generating second archetype layouts associated with second standard cells for the database based on the mapping entries for the first archetype layouts, wherein the second archetype layouts associated with the second standard cells conform to the process technology.

US Pat. No. 10,657,214

PREDICTIVE SPATIAL DIGITAL DESIGN OF EXPERIMENT FOR ADVANCED SEMICONDUCTOR PROCESS OPTIMIZATION AND CONTROL

APPLIED MATERIALS, INC., ...

1. A computer-implemented method, comprising:performing a physical design of experiment (DoE) based on a known initial recipe by processing a finite number of wafers to generate virtual metrology (VM) data and on-board metrology (OBM) data related to one or more dimensions of interest associated with features of devices fabricated on the finite number of wafers, wherein the VM data includes time traces of one or more process variables collected from sensors of a processing equipment;
obtaining in-line metrology data from a scanning electron microscope (SEM);
obtaining an empirical process model for a process and the processing equipment;
calibrating the empirical process model by using the in-line metrology data as reference;
combining the VM, OBM and in-line metrology data to generate customized metrology data; and
building a predictive model by refining the empirical process model by a machine-learning engine that receives the customized metrology data and outputs one or more spatial maps of a wafer for one or more dimensions of interest across the wafer, wherein the predictive model is to perform spatial digital DoE without physically processing any further wafers, and wherein the spatial digital DoE comprises a multi-constraint optimization of the process for the processing equipment and for the one or more dimensions of interest across the wafer.

US Pat. No. 10,657,213

MODELING OF A DESIGN IN RETICLE ENHANCEMENT TECHNOLOGY

D2S, Inc., San Jose, CA ...

1. A method for reticle enhancement technology (RET) comprising:representing a target wafer pattern or a predicted wafer pattern as a smooth function captured as a function sample array (FSA), wherein the FSA is an array of function values which can be real numbers, complex numbers, or an aggregate of numbers;
providing a continuous tone mask (CTM), wherein the CTM is used to produce the predicted wafer pattern, the predicted wafer pattern spanning an entire design area;
dividing the entire design area into a plurality of tiles; and
iterating the CTM for the entire design area until the CTM meets criteria towards producing the target wafer pattern, wherein each iteration comprises:
calculating the predicted wafer pattern for a subset of the plurality of tiles;
wherein all tiles in the subset are calculated before the next iteration.

US Pat. No. 10,657,212

APPLICATION- OR ALGORITHM-SPECIFIC QUANTUM CIRCUIT DESIGN

INTERNATIONAL BUSINESS MA...

1. A system, comprising:a memory that stores computer-executable components; and
a processor, operatively coupled to the memory, that executes computer-executable components, the computer-executable components comprising:
an extractor component that extracts pairs of qubits that are determined to satisfy a defined threshold potential of having to use a direct connection between each other based on an analysis of an application; and
a design management component that determines a circuit design of a quantum circuit to use for the application based on an analysis of characteristics associated with the pairs of qubits, wherein the design management component sorts the pairs of qubits based on the characteristics associated with the pairs of qubits and weight values associated with the characteristics.

US Pat. No. 10,657,211

CIRCUIT GENERATION BASED ON ZERO WIRE LOAD ASSERTIONS

INTERNATIONAL BUSINESS MA...

1. A system for generating zero wire load based assertions comprising:a processor configured to perform a method, the method comprising:
generating, via a zero wire load tool, a zero wire load report for a set of logic in a hardware description language corresponding to a circuit design;
identifying a set of zero-wire-load-based assertions for the circuit design by parsing the zero wire load report based in part on real data values corresponding to best case delays for one or more input pins and one or more output pins in a plurality of macros of the circuit design, the real data values being actual delay values according to a hardware description language simulation, and an assertion of the set of zero-wire-load-based assertions including a statement in the hardware description language that determines a Boolean condition; and
initiating fabrication of a circuit based on the set of zero-wire-load-based assertions.

US Pat. No. 10,657,210

SLACK TIME RECYCLING

Mentor Graphics Corporati...

1. A method comprising:utilizing, by a computing system, a physical specification of a verification system to identify partitions of configurable hardware in the verification system;
identifying, by the computing system, a stage of a logic pipeline described in a circuit design that, when implemented in the verification system, spans between a plurality of the partitions of the configurable hardware; and
modifying, by the computing system, the circuit design to alter a timing for logic operations in the logic pipeline based, at least in part, on the identified partitions of the configurable hardware, which reduces slack in at least one stage in the logic pipeline adjacent to the identified stage in the logic pipeline, wherein the configurable hardware, when configured with the modified circuit design, implements the logic pipeline with the altered timing.

US Pat. No. 10,657,209

COMPUTING SYSTEM AND METHOD OF PERFORMING VERIFICATION OF CIRCUIT DESIGN IN THE COMPUTING SYSTEM

Samsung Electronics Co., ...

1. A computing system comprising:an input/output (I/O) device configured to receive an input from a user; and
a memory configured to store computer executable instructions; and
at least one processor configured to execute the computer executable instructions to,
receive the input from the user, the input including hardware description language (HDL) code representing a circuit design for verification,
generate a functional coverage model from the HDL code, and
verify the circuit design based on the functional coverage model, the verifying the circuit design including simulating the circuit design using the HDL code, and measuring how frequently the functional coverage model is generated as a result of the simulating the circuit design to determine a level of the circuit design verification; and
the I/O device is further configured to receive from the user a second input correcting the functional coverage model, the second input including alternate HDL code.

US Pat. No. 10,657,208

ANALYZING MODEL BASED ON DESIGN INTEREST

The MathWorks, Inc., Nat...

1. A method comprising:accessing, by a device, an executable model,
the executable model including graphical model elements, and, when executed, simulate a system;
receiving, by the device, a design interest for the executable model,
the design interest being associated with a behavior of a portion of the executable model;
analyzing, by the device, the executable model based on the design interest;
determining, by the device, a group of the graphical model elements that are related to the design interest, wherein the group of the graphical model elements is a subset of the graphical model elements within the executable model and the determining comprising:
performing a dynamic analysis on the executable model to obtain coverage information associated with the executable model, and
determining that the group of graphical model elements are in an active state during an execution of the executable model based on the coverage information; and outputting, by the device, a result,
the outputting the result including one or more of:
providing information identifying the group of the graphical model elements for display to a user, or
generating an executable model slice that includes at least one of the graphical model elements from the group of the graphical model elements that are in the active state,
the executable model slice, when executed, exhibiting a model slice behavior corresponding to the behavior of the portion of the executable model when executed.

US Pat. No. 10,657,207

INTER-CELL BRIDGE DEFECT DIAGNOSIS

Mentor Graphics Corporati...

1. A method, executed by at least one processor of a computer, comprising:performing failing test pattern simulations to determine initial defect suspects based on injecting faults to defect candidate sites, the defect candidate sites determined based on test responses, the test responses obtained by applying test patterns to a circuit for testing, and the test responses comprising failing bits;
determining initial inter-cell bridge suspects from cells in the initial defect suspects based on layout information and electrical information of the circuit, the determining comprising identifying pairs of neighboring cells based on the layout information, the electrical information of the circuit comprising cell internal signal information which is obtained based on transistor-level circuit simulations or switch-level circuit simulations; and
performing passing test pattern simulations to determine inter-cell bridge suspects from the initial inter-cell bridge suspects.

US Pat. No. 10,657,206

GRAPHICAL USER INTERFACE SYSTEM AND METHOD FOR NATURAL LANGUAGE GENERATION EDITING

STATS LLC, Chicago, IL (...

1. A method for generating data driven natural language text via a computer-implemented graphical user interface and narrative content generation system, comprising:receiving, at a computing device coupled to a communications network, data from one or more data sources;
grouping, at the computing device, the received data in accordance with a pre-defined scope;
evaluating, at the computing device, a condition and an associated origin structure to generate a set of customized segments of narrative text for the data scope, wherein the origin structure comprises logical structural framework that includes a set of data conditions and wherein the narrative text is based on logical evaluation of the set of data conditions, the customized segments maintaining a link to the origin structure;
presenting, through a display at the computing device, a user interface comprising:
a content preview region for presenting a preview comprising the customized segments of narrative text; and
a data variable display region for presenting data variables grouped according to the pre-defined data scope;
receiving a user selection of a segment of narrative text on the content preview region; and
presenting a portion of the origin structure linked with the user-selected segment via the user interface.

US Pat. No. 10,657,205

ARCHITECTURE AND PROCESSES FOR COMPUTER LEARNING AND UNDERSTANDING

ELEMENTAL COGNITION LLC, ...

1. A computer-implemented method, comprising:maintaining a collection of frame structures within memory of a computing system, individual frame structures of the collection of frame structures including multiple generative semantic primitive (GSP) structures defined with roles that are commonly associated with a theme or a context of a setting of natural language stories;
receiving, by the computing system, a natural language story;
retrieving, by the computing system and from the collection of frame structures in the memory, one or more frame structures that includes GSP structures defined with the roles that are relevant to a current understanding of the natural language story, wherein a frame structure of the one or more frame structures defines the theme represented within the natural language story, and the frame structure comprises a set of GSP structures that define the roles associated with the theme, an individual GSP structure of the GSP structures having at least a threshold probability of being included in the one or more frame structures that is associated with a particular context of a particular setting of the natural language story;
aligning, by the computing system, entities in the natural language story to the roles defined in the GSP structures of the one or more frame structures; and
evaluating, by the computing system, an extent to which the one or more frame structures, when aligned with the entities in the natural language story, represent the current understanding of the natural language story by computing a confidence score, the confidence score being based at least in part on the individual GSP structure of the GSP structures having a probability of being true for the one or more frame structures, wherein the confidence score is determined according to a function that produces a higher score based on a comparison of a lower number of frame structures with respect to a higher number of GSP structures included in the frame structures that match GSP structures extracted from the natural language story.

US Pat. No. 10,657,204

METHOD FOR IMPROVING THE ACCURACY OF A STATEMENT

International Business Ma...

1. A computer-implemented method performed by a cognitive assistant (CA) system for improving an accuracy of a statement, comprising:receiving from a user an original statement comprising a plurality of statement entities;
generating an original confidence estimate (CE) for a correctness of the original statement;
generating a replacement statement by:
selecting a suspect statement entity in the plurality of statement entities;
selecting a replacement entity for the suspect statement entity; and
replacing the suspect statement entity with the replacement entity in the original statement to generate a replacement statement;
generating a replacement CE for a correctness of the replacement statement;
sending the replacement statement to the user when the replacement CE exceeds the original CE by a tuning factor; and
repeating generating the replacement statement and generating the replacement CE when the replacement CE does not exceed the original CE by the tuning factor.

US Pat. No. 10,657,203

PREDICTING PROBABILITY OF OCCURRENCE OF A STRING USING SEQUENCE OF VECTORS

ABBYY Production LLC, Mo...

1. A method comprising:receiving a plurality of strings, each string of the plurality of strings comprising a plurality of symbols;
for each string of the plurality of strings, generating, by a processing device, a first sequence of vectors based at least on a maximum length of word for each symbol in the string, wherein the maximum length of word for each symbol in the string corresponds to length of a longest possible word within the string that starts with the symbol, the longest possible word comprising one or more of a word: 1) with a commonplace meaning, or 2) found in a dictionary;
providing to a machine learning unit the first sequence of vectors for each string of the plurality of strings; and
obtaining from the machine learning unit a probability of occurrence of each string of the plurality of strings.

US Pat. No. 10,657,202

COGNITIVE PRESENTATION SYSTEM AND METHOD

International Business Ma...

1. A computer-implemented method comprising:receiving, at a computing device, a presentation file, the presentation file including textual portions displayable via a slide-sharing application and audio portions provided by a speaker who recites the textual portions, expounds upon the textual portions, and speaks on content not provided in the textual portions of the presentation file,
wherein each textual portion of the presentation file is associated with one audio portion of the audio portions of the presentation file,
wherein at least one other audio portion of the audio portions of the presentation file includes content spoken by the speaker and does not have a corresponding textual portion in the presentation file, the other audio portion, including content spoken by the speaker and not having a corresponding textual portion in the presentation file, being a rich portion of the presentation file;
generating an audio transcript of the presentation file, using an automatic speech-to-text (STT) system, from the audio portions of the presentation file;
generating a textual transcript of the textual portions of the presentation file;
determining one or more rich portions of the presentation file based upon, at least in part, a comparison of the audio transcript and the textual transcript,
wherein determining the one or more rich portions includes:
comparing words of the audio transcript with words of the textual transcript;
determining each rich portion as a portion of the presentation file where an audio portion of the presentation file yields an audio transcript that includes one or more words that are not included in the textual transcript;
determining non-rich portions of the presentation file as portions where words of the audio transcript have corresponding words in the textual transcript; and
presenting, on a display via a user interface, one or more playback controls configured to present the one or more non-rich portions at an accelerated speed relative to the one or more rich portions of the presentation file.

US Pat. No. 10,657,201

CONFIGURABLE AND PORTABLE SYSTEM FOR GENERATING NARRATIVES

NARRATIVE SCIENCE INC., ...

1. A computer program product for automatically generating a narrative story about a data set, the data set comprising structured data in a plurality of fields and/or categories that describe one or more events, situations, entities, and/or combinations thereof, the computer program product comprising:a story specification that is resident on a non-transitory computer-readable storage medium, the story specification configured to organize a narrative structure for the narrative story, the story specification comprising (1) specifications of a plurality of data models, and (2) specifications of a plurality of modular angles, each modular angle corresponding to an interpretation of data, the modular angles comprising a plurality of specified applicability condition parameters for testing to determine whether a corresponding interpretation validly characterizes the one or more events, situations, entities, and/or combinations thereof described by the data set, wherein the applicability condition parameters permit the modular angles to be re-used with respect to a plurality of different story types or content verticals, and wherein the specifications of the data models and the modular angles are not expressed as program code directly executable by a processor and are not expressed in a general purpose programming language; and
a plurality of processor-executable instructions for processing the story specification to (1) generate executable code that defines an analytical framework for performing an analysis on the structured data to determine an interpretation of the data set that validly characterizes the one or more events, situations, entities, and/or combinations thereof described by the data set, and (2) generate executable code that defines a narrative generation framework for producing a narrative story about the data set that expresses the determined interpretation, wherein the instructions are resident on a non-transitory computer-readable storage medium; and
wherein the instructions are configured, upon execution by a processor, to cause the processor to:
receive the data set and the story specification as inputs;
generate the executable code for the analytical framework based on the processed story specification, the analytical framework executable code including (1) code that prepares the data set for the analytical framework and the narrative generation framework based on the specified data models, wherein the prepared data set includes data derived from the structured data, and (2) testing code that implements the testing defined by the modular angles such that the specified applicability condition parameters are tied to data within the prepared data set;
execute the analytical framework executable code to (1) generate the prepared data set, and (2) determine, based on execution of the testing code with respect to the prepared data set, an interpretation corresponding to a modular angle for expression in the narrative story, wherein the determined interpretation is deemed by the testing to validly characterize the one or more events, situations, entities, and/or combinations thereof described by the data set;
generate the executable code for the narrative generation framework based on the processed story specification; and
execute the narrative generation framework executable code with respect to the prepared data set and the determined interpretation to automatically generate the narrative story about the data set in natural language text and in accordance with the organized narrative structure such that the narrative story expresses the determined interpretation.

US Pat. No. 10,657,200

PROACTIVE FORM GUIDANCE FOR INTERACTING WITH ELECTRONIC FORMS

Adobe Inc., San Jose, CA...

1. A computer-implemented method for proactively guiding user interactions with electronic forms via a computing device, the computer-implemented method comprising:storing, by a form guidance engine, user information comprising a preference of a user that indicates a time period in which changes to a target state are to be completed for electronic forms;
verifying that an electronic form is available on a data source accessible to the form guidance engine;
storing, by the form guidance engine, state information for the electronic form, the state information identifying a current state of the electronic form, the current state corresponding to at least one of (a) an import of the electronic form into a storage location in which the electronic form is editable by the computing device associated with user, (b) a degree of completion of the electronic form, (c) a validation of the electronic form, or (d) an export of the electronic form from the computing device to a target device;
detecting, by the form guidance engine and from the stored state information of the electronic form, a triggering event for a potential interaction of the user with the electronic form via the computing device, the triggering event comprising that (a) a current time is within the time period from the preference in the user information and (b) a change in state to the target state has not occurred within the time period as of the current time;
based on detecting the triggering event:
identifying, by the form guidance engine, an action that updates content of the electronic form and thereby causes a change from the current state to the target state of the electronic form, and
initiating, by the form guidance engine, a presentation of a guided interaction interface that is separate from the electronic form and that is configured to guide the user to perform the action via the computing device; and
updating, by the form guidance engine and based on a user response to the presentation, the state information of the electronic form to identify the target state.

US Pat. No. 10,657,199

CALIBRATION TECHNIQUE FOR RULES USED WITH ASSET MONITORING IN INDUSTRIAL PROCESS CONTROL AND AUTOMATION SYSTEMS

Honeywell International I...

1. A method for monitoring assets in an industrial process control and automation system, the method comprising:obtaining from an asset monitoring system, historical operational data associated with at least one asset of the asset monitoring and obtaining historical failure data associated with faults of the at least one asset;
generating alerts or notifications by executing at least one monitoring rule using the obtained historical operational data;
identifying known faults by comparing the generated alerts or notifications with the faults of the at least one asset;
identifying a statistical performance of the at least one monitoring rule associated with the asset monitoring system, the statistical performance comprising an effectiveness of the monitoring rule in identifying the known faults by identifying rates associated with different outcomes of the monitoring rule, the different outcomes including true positive outcomes, true negative outcomes, false positive outcomes, and false negative outcomes;
identifying an economic performance of the monitoring rule, by generating at least one economic cost function associated with the at least one monitoring rule, wherein the processing device executes a calibration analytics querying of a user or a database to obtain values for the costs associated with the true positive, true negative, false positive, and false negative outcomes of the monitoring rule;
identifying, by the calibration analytics, one or more tuning parameter values of the monitoring rule based on the at least one economic cost function; and
updating or replacing the monitoring rule based on the economic performance to optimize asset monitoring by varying the at least one tuning parameter value of the monitoring rule to identify which parameter value provides improved or optimized cost.

US Pat. No. 10,657,198

RE-EQUILIBRATED QUANTUM SAMPLING

D-WAVE SYSTEMS INC., Bur...

1. A method of operation of a hybrid computing system to generate approximate equilibrium statistics, the hybrid computing system comprising an analog processor and a digital processor, the method comprising:initializing a counter i;
determining an intermediate value si* of an annealing parameter, the annealing parameter normalized between a value of zero and a value of one;
determining a ramp time tramp wherein the ramp time tramp is smaller than a relaxation time of the analog processor and greater than a time needed for non-adiabatic transition to higher energy states;
initializing, the analog processor to a state i;
until an exit condition is met, iteratively:
evolving the analog processor from a value of one for the annealing parameter until the annealing parameter is equal to the intermediate value si*, wherein evolving the analog processor from a value of one for the annealing parameter until the annealing parameter is equal to the intermediate value si* occurs in the ramp time tramp;
holding the annealing parameter of the analog processor to the intermediate value si* for a defined dwell time;
evolving the analog processor from the intermediate value si* of the annealing parameter until the annealing parameter is equal to one, wherein evolving the analog processor from the intermediate value si* of the annealing parameter until the annealing parameter is equal to one occurs in the ramp time tramp and after the ramp time tramp the analog processor is in a state i+1; and
reading out the state i+1 of the analog processor;
if the exit condition is not met, determining a new intermediate value si+1*>si* of the annealing parameter; and
incrementing the counter i.

US Pat. No. 10,657,197

MANAGING NON-DESTRUCTIVE EVALUATION DATA

Etegent Technologies. Ltd...

1. A method of managing non-destructive evaluation (NDE) data for an asset for manufacturing and maintenance purposes in a system of the type that includes at least one processing unit and a memory, the method comprising:receiving a first dataset of NDE data for at least a portion of the asset, including receiving inspection information associated with the first dataset of NDE data that includes at least one of identification data for an NDE collection device used to capture the NDE data or identification data for the at least a portion of the asset;
receiving a second dataset of NDE data for at least a portion of the asset, including receiving inspection information associated with the second dataset of NDE data that includes at least one of identification data for an NDE collection device used to capture the NDE data or identification data for the at least a portion of the asset;
the first NDE dataset being captured from the asset during a first session and the second NDE dataset being captured from the asset during a second session occurring at a different time than the first session;
selecting a first alignment algorithm from a plurality of alignment algorithms based upon at least one of the first dataset of the NDE data or inspection information associated with the first dataset of the NDE data;
selecting a second alignment algorithm from a plurality of alignment algorithms based upon at least one of the second dataset of the NDE data or inspection information associated with the second dataset of the NDE data;
using the at least one processing unit, automatically aligning the first NDE dataset from the first session to a simulated model using the selected first alignment algorithm and automatically aligning the second NDE dataset from the second session to the simulated model using the selected second alignment algorithm to put datasets in a common reference frame; and
using the at least one processing unit, determining a difference between the first aligned NDE dataset from the first session and the second aligned NDE dataset from the second session for determining variations in the datasets for the asset over time.

US Pat. No. 10,657,196

SYSTEM AND METHOD FOR MEASURING THE VIRALITY OF INTERNET CONTENT USING INDICES

Oath Inc., New York, NY ...

1. A system for measuring a virality of content items on a network, the system comprising:a publisher server for providing a page comprising a content item, the page provided in response to a referral from at least one of a referral server or a social media website, the referral for providing user remote access to the content item;
an indexer for tracking behavior associated with content items, the indexer comprising a processor configured to:
monitor user access requests for the content item at the publisher server, at least a portion of the user access requests comprising a plurality of referrals for the content item;
determine a plurality of origin servers of the plurality of referrals for the content item;
identify that the plurality of origin servers comprise social media network servers;
determine that the plurality of referrals are a result of a plurality of explicit shares of the content item on a plurality of social media networks associated with the social media network servers;
determine a first number of accesses of the content item as a result of the plurality of explicit shares of the content item on the plurality of social media networks;
determine a total number of accesses of the content item from all sources; and
generate a virality index score for the content item comprising a proportion of the first number of accesses compared to the total number of accesses; and
a logic generator for generating a graphical representation of a web page based upon the virality index score.

US Pat. No. 10,657,195

METHOD, SYSTEM, APPARATUS, AND PROGRAM FOR IDENTIFYING AND REWARDING SENDER AND RECEIVER OF SHARED URLS AND RECOMMENDATIONS BY USING DOUBLE-SIDED AFFILIATE LINK

SPLIT TECHNOLOGIES, INC.,...

1. A method implemented on a computer of a DSAL provider having a processor and a memory for identifying and rewarding a first user and a second user, comprising:providing a user interface that has an option to send a request to create a parent double-sided affiliate link (DSAL) on a device of the first user;
upon receiving the request to create a parent DSAL from the first user, creating a parent DSAL, which is a link that is specific at least to a user ID of the first user and a uniform resource locator (URL) selected by the first user;
displaying the parent DSAL on the device of the first user to enable the first user to share the parent DSAL with other users;
creating a child DSAL, which is a link that is specific at least to the parent DSAL and a fingerprint of the second user who clicked on the parent DSAL, after the second user clicked on the parent DSAL, wherein the fingerprint of the second user is a string of random characters assigned to the second user, wherein a fingerprint of a user is created from at least one of cookies, login information to a website, an IP address, a screen brightness level, a phone type, a unique device identifier (UDID), and/or a web browser type;
displaying on a device of the second user content of the selected URL after the second user clicked on the parent DSAL;
sending the child DSAL to an affiliate network, wherein the affiliate network then sends the child DSAL to a device of a vendor;
when the second user makes a purchase on the selected URL, receiving by the affiliate network purchase information and the child DSAL from the device of the vendor of the selected URL;
receiving by the computer of the DSAL provider commission information and the child DSAL from the affiliate network; and
using the child DSAL to identify the first user and the second user and to determine rewards for the first and second users;
wherein the child DSAL is specific to one parent DSAL;
wherein the parent DSAL identifies the first user but no other user and, when the second user clicks on the parent DSAL, the step of creating the child DSAL is triggered; and
wherein the child DSAL identifies the first user and the second user but no other user.

US Pat. No. 10,657,194

SYSTEM AND METHOD FOR CODED PATTERN COMMUNICATION

Samsung Electronics Co., ...

1. An apparatus comprising:at least one image sensor configured to capture a plurality of images;
at least one communication interface;
at least one display; and
at least one processor coupled to the at least one image sensor, the at least one communication interface, and the at least one display, the at least one processor configured to:
identify a network address encoded into a first optical pattern within one or more first images of the plurality of captured images;
transmit a first request to the network address;
identify a unique identifier encoded into a second optical pattern within one or more second images of the plurality of captured images;
transmit a second request containing the unique identifier;
receive session information; and
output, to the at least one display, extended reality-related content obtained during a session associated with the session information.

US Pat. No. 10,657,193

SYSTEMS AND METHODS FOR SELECTING CONTENT BASED ON LINKED DEVICES

Google LLC, Mountain Vie...

13. A method of associating computing devices with each other based on computer network activity, comprising:receiving, by a data processing system having a matching engine and a connector executed by one or more processors, via a connection between a first computing device and a computer network, data packets comprising voice input detected by a sensor of the first computing device at a first location in a first time period;
receiving, by the data processing system, via a connection between a second computing device and the computer network, data packets comprising voice input detected by a sensor of the second computing device at the first location in the first time period;
identifying, by the data processing system, a first linking factor based on the connection between the first computing device and the computer network providing the voice input from the first computing device in the first time period, and based on the connection between the second computing device and the computer network providing the voice input from the second computing device in the first time period;
determining, by the data processing system, a number of computing devices other than the first computing device that connect with the computer network at the first location during the first time period;
generating, by the data processing system, a positive match probability based on the first linking factor and based on the number of computing devices;
monitoring, by the data processing system, for a second linking factor based on input activity at the first computing device in a second time period, and based on input activity at the second computing device in the second time period;
monitoring, by the data processing system, for a third linking factor based on activity at the first computing device at the first location during a third time period, and based on activity at the second computing device at a second location in the third time period;
determining, by the data processing system, a negative match probability based on the second linking factor and based on the third linking factor; and
linking, in a data structure, the first computing device with the second computing device based on the positive match probability and the negative match probability.

US Pat. No. 10,657,192

SYSTEMS AND METHODS FOR SELECTING CONTENT BASED ON LINKED DEVICES

Google LLC, Mountain Vie...

13. A method of associating computing devices with each other based on computer network activity, comprising:identifying, by a data processing system having a matching engine and a connector executed by one or more processors, a first linking factor based on a connection between a first computing device and the computer network at a first location during a first time period, and based on a connection between a second computing device and the computer network at the first location during the first time period;
determining, by the data processing system, a number of computing devices other than the first computing device that connect with the computer network at the first location during the first time period;
generating, by the data processing system, a positive match probability based on the first linking factor and based on the number of computing devices;
monitoring, by the data processing system, for a second linking factor based on input activity at the first computing device during a second time period, and based on input activity at the second computing device during the second time period;
monitoring, by the data processing system, for a third linking factor based on activity at the first computing device at the first location during a third time period, and based on activity at the second computing device at a second location during the third time period;
determining, by the data processing system, a negative match probability based on the second linking factor and based on the third linking factor;
linking, by the data processing system, the first computing device with the second computing device based on the positive match probability and the negative match probability; and
creating, by the data processing system, a data structure to indicate a link between the first computing device and the second computing device.

US Pat. No. 10,657,191

METHOD AND SYSTEM FOR SECURE REMOTE INTERACTION

Voconomy, Inc., Dallas, ...

1. A method comprising:receiving a connection request from a user device;
creating an operator instance on one or more servers, separate from the user device and user instance on the one or more servers, associated with an operator device;
establishing a communication channel between the user instance and the operator instance;
creating an operator instance visual to be a copy of a user instance visual;
restricting commands from the operator instance to a list of commands to create an overlay or change the user instance visual;
sending one or more commands as required to keep the operator instance visual to be a copy of the user instance visual;
receiving an animation command from the operator instance;
sending a command to overlay the animation on the user instance; and
closing the established communication channel.

US Pat. No. 10,657,190

SYSTEM AND METHODS FOR CLOUD BASED AUTONOMOUS AND COLLABORATIVE AUTHORING

PLANBOX INC., (CA)

1. A cloud based system for supporting a plurality of participants in an organisation in autonomous and collaborative authoring using a content retrieved from a plurality of on-line data sources accessible via a network, the system comprising;a web portal for providing each of the participants remote access and via which at least one of the participants establishes an organizational context of the organization, at least one instance context and at least one autonomous intention comprising a plurality of articles and via which each of the participants may provide participant input in respect to said at least one autonomous intention wherein each of said organizational context, said instance context and said autonomous intention comprises a term set comprising a plurality of terms and weights;
an Article and Intention Generation (AIG) engine comprising a term set compiler for deriving an aggregate term set from each of said organizational context term set, said instance context term set and said autonomous intention term set, said aggregate term set comprising a plurality of aggregate terms and corresponding weights, and a query builder for generating at least one query from said plurality of aggregate terms and corresponding weights;
a content retrieval engine for retrieving the content from the plurality of on-line data sources matching said at least one query wherein said retrieved content is ranked according to a ranking method; and
a repository for storing the retrieved content and a history of each participant's inputs;
wherein said AIG engine autonomously takes action by at least one of autonomously voting, autonomously commenting and autonomously taking another defined action for each of the participants, said action determined based on said participant inputs, said history, said organizational context, said instant context and the retrieved content.

US Pat. No. 10,657,189

JOINT EMBEDDING OF CORPUS PAIRS FOR DOMAIN MAPPING

INTERNATIONAL BUSINESS MA...

1. A system, comprising:a memory that stores computer executable components; and
a processor that executes the computer executable components stored in the memory, wherein the computer executable components comprise:
a first learning component that:
analyzes first domain data associated with a domain comprising a first corpus, resulting in first analyzed data;
a second learning component that:
analyzes second domain data associated with a second domain comprising a second corpus, resulting in second analyzed data;
an identification component that:
based on the first analyzed data and the second analyzed data, identifies equivalent terms between the first domain data and the second domain data; and
a joint embedding component that:
based on the equivalent terms, the first analyzed data, and the second analyzed data, jointly embeds the first domain data and the second domain data, resulting in jointly embedded data and wherein the jointly embedding comprises analyzing a defined word, a sequence of words in a fixed window on either side of the defined word and generating a prediction of a context in which the defined word is likely to appear; and
in response to the jointly embedded data, outputs a model associated with the jointly embedded data employed to leverage across other domains to generate additional terms.

US Pat. No. 10,657,188

REPRESENTATIONAL STATE TRANSFER RESOURCE COLLECTION MANAGEMENT

International Business Ma...

1. A computer-implemented method of managing resources within a computer system implementing a representational state transfer architecture, the computer-implemented method comprising:accessing a persisted collection resource and at least one metadata resource identifying the persisted collection resource, the persisted collection resource comprising a collection query with at least one query parameter defining a collection of resources, wherein the at least one metadata resource comprises a Uniform Resource Identifier (URI), the URI identifying a location of the collection query with the at least one query parameter;
processing the collection query with respect to resources within the computer system to dynamically generate a list of resources associated with the at least one query parameter, wherein dynamically generating the list is a result of processing the collection query;
providing a resource structure comprising a first resource structure comprising the at least one metadata resource and the persisted collection resource and a second resource structure separate from the first resource structure comprising the collection of resources defined by the collection query with the at least one query parameter; and
determining a resource request for at least one of the resources, the resource request comprising a resource identifier, wherein the accessing the persisted collection resource comprises accessing the persisted collection resource based on the resource identifier, wherein the resource request further comprises an action, and the method further comprises processing the action based on the list of resources, and wherein the processing the action based on the list of resources comprises performing a Hypertext Transfer Protocol (HTTP) action with respect to the list of resources.

US Pat. No. 10,657,187

SEARCH INFRASTRUCTURE

Twitter, Inc., San Franc...

1. A system for real-time search in a messaging platform, comprising:one or more computers including one or more a computer processors and one or more storage devices, the one or more computers being configured to provide;
a fanout module configured to:
receive a search query comprising one or more search terms;
provide the search query to each of a plurality of partitions in parallel; and
receive, from one or more of the partitions in response to the search query, one or more document identifiers corresponding to messages containing one or more of the search terms;
the plurality of partitions, each partition comprising:
a set of segments, wherein each segment of the set of segments stores a postings list representing messages broadcast to the messaging platform during a particular time slice defining a particular time range in which the messages represented by the segment were broadcast, wherein the messages were broadcast by respective user accounts of the messaging platform, wherein each segment of the partition corresponds to a different time slice; and
a real-time search engine configured to:
receive the one or more terms of the search query in parallel with search engines of the other partitions in the plurality of partitions; and
search at least one segment of the set of segments, wherein the at least one segment is searched in reverse chronological order according to the time range specified by the time slice of each segment of the partition such that the segment with the most recent time range is searched first, wherein the search is performed to identify document identifiers of messages from the postings list containing one or more of the search terms.

US Pat. No. 10,657,186

SYSTEM AND METHOD FOR AUTOMATIC DOCUMENT CLASSIFICATION AND GROUPING BASED ON DOCUMENT TOPIC

Dell Products, L.P., Rou...

1. A machine comprising:a memory; and
a processor in communication with the memory, the processor to receive first information from a first document, determine that the first document includes a first topic cluster based on the first information, determine that a database includes the first topic cluster, determine a first classification level of the first document within a hierarchical classification system, wherein access of a user to the first document is granted when the user has a first clearance level that corresponds with the first classification level and determine a first grouping of the first document within a grouping system, wherein the access to the first document is granted when the user is associated with the first grouping, wherein determining the first classification level and the first grouping are based upon the database including an association of the first classification level and the first grouping with the first topic cluster, associate the first classification level and the first grouping with the first topic cluster, receive second information from a second document, determine that the second document includes the first topic cluster based on the second information, modify the second document to ascribe the first classification level and the first grouping to the second document in response to determining that the second document includes the first topic cluster, receive third information from a third document, determine that the third document is associated with the first classification level and the first grouping, determine that the third document includes a second topic cluster based on the third information, add the third topic cluster to the database, and grant access to the second document to a member of the first group, wherein the first document is determined to include the first topic cluster based upon a language processing analysis of the first information, the second document is determined to include the first topic cluster based upon the language processing analysis of the second information, and the third document is determined to include the second topic cluster based upon the language processing analysis of the third information.

US Pat. No. 10,657,185

SUGGESTED FILED EXTRACTION

SPLUNK INC., San Francis...

1. A computer-implemented method comprising:displaying, in a graphical interface, one or more events in a table format that includes one or more rows and each of the one or more rows includes one or more cells, wherein each of the one or more rows corresponds to one of the one or more events and at least one of the one or more cells of each row displays raw data that is associated with a corresponding event of the one or more events;
based on a first user selection of first one or more values included in a portion of the raw data that is displayed in a particular cell of a particular row corresponding to a particular event of one or more events, automatically determining an extraction rule that includes instructions to extract a field label-value pair from the portion of the raw data, wherein the field label-value pair includes a particular value of the selected first one or more values and a particular field label that indicates a location in the particular event that contains the particular value and the instructions of the extraction rule identifies, within the portion of the raw data, each of the particular value and the particular field label based on one or more demarcating characters included in the portion of the raw data;
causing display of an option corresponding to the determined extraction rule in the graphical interface; and
based on a second user selection of the option in the graphical interface, causing display of second one or more values of one or more additional field label-value pairs, wherein the one or more additional field label-value pairs are extracted from additional portions of the raw data that are associated with additional events of the one or more events using the extraction rule.

US Pat. No. 10,657,184

COMPUTER DATA SYSTEM DATA SOURCE HAVING AN UPDATE PROPAGATION GRAPH WITH FEEDBACK CYCLICALITY

Deephaven Data Labs LLC, ...

1. A system for updating a data object using an update propagation graph having a cyclicality feedback provider, the system comprising:one or more hardware processors coupled to a nontransitory computer readable medium having stored thereon software instructions that, when executed by the one or more hardware processors, cause the one or more hardware processors to perform operations including:
constructing a computer data system update propagation graph; and
adding a feedback provider listener to the computer data system update propagation graph, wherein the feedback provider listener provides feedback updates to one or more feedback data fields of a cyclicality feedback provider object when changes to one or more update propagation graph data fields corresponding to one or more feedback data fields are detected, and wherein the feedback updates are provided to the one or more feedback data fields of the cyclicality feedback provider object based on a state of a logical clock and on completion of update processing for a given logical clock cycle.

US Pat. No. 10,657,183

INFORMATION PROCESSING APPARATUS, SIMILARITY SEARCH PROGRAM, AND SIMILARITY SEARCH METHOD

FUJITSU LIMITED, Kawasak...

1. An information processing apparatus, comprising:a memory; and
a processor coupled to the memory and configured to perform a process, the process including:
first calculating, based on a plurality of record data, each of the record data including a plurality of feature quantities, normal hyperplane data representing a normal hyperplane, the normal hyperplane being a hyperplane dividing a feature quantity space, and distances between the normal hyperplane and each of a pair of divided areas having symmetry,
second calculating, based on the plurality of record data and the normal hyperplane data, one-way hyperplane data representing at least one one-way hyperplane which is a hyperplane such that when the feature quantity space is divided by the one-way hyperplane, distances between the one-way hyperplane and each of a pair of divided areas have asymmetry, and the one-way hyperplane data being calculated such that the one-way hyperplane overlaps the normal hyperplane represented by the normal hyperplane data in the feature quantity space,
converting, based on the normal hyperplane data and the one-way hyperplane data, query data including a plurality of feature quantities and the plurality of record data into respective binary strings, the query data and the plurality of record data being respectively converted to first binary strings using the normal hyperplane data, the query data and the plurality of record data being respectively converted to second binary strings using the one-way hyperplane data, and
outputting a predetermined number of record data in an order of a dissimilarity value, wherein the dissimilarity value is a sum of a dissimilarity between the first binary strinq of the query data and the first binary strinq of the record data and the dissimilarity between the second binary string of the query data and the second binary string of the record data, for each of the record data.

US Pat. No. 10,657,182

SIMILAR EMAIL SPAM DETECTION

International Business Ma...

1. A method for determining if an email is a spam email, the method comprising:receiving a first email at a first mail server;
creating a first sender hash of the first email;
creating one or more similarity measurement hashes of the first email including a first similarity measurement hash, wherein the first similarity measurement hash further comprises:
gathering one or more properties of the first email;
combining one or more of the properties of the first email into the first similarity measurement hash of the first email;
wherein the one or more properties are selected from the group consisting of header entries, email structure, normalized plain text, normalized uniform resource locators, and attachments; and
wherein the first sender hash and first similarity measurement hash are a combined hash of a 32-character fixed length hash;
querying a centralized storage system for one or more similarity measurement hashes of one or more emails, wherein the centralized storage is a domain name system;
connecting one or more mail servers to the domain name system;
querying the domain name system from a first mail server of the one or mail servers to retrieve a second sender hash and a second similarity measurement hash that was developed in a second mail server of the one or more mail servers
comparing the first similarity measurement hash and the first sender hash of the first email to the second similarity hash and the second sender hash of a second email stored within the centralized storage system;
determining, in response to comparing, that the first similarity measurement hash of the first email matches the second similarity measurement hash of the second email;
determining, in response to comparing, that the first sender hash of the first email is different from the second sender hash of the second email;
marking, in response to determining that the first similarity measurement hash matches the second similarity measurement hash and the first sender hash is different from the second sender hash, the first email as a spam email;
determining that the second email has been received by the mail server; and
marking the second email as a spam email, in response to marking the first email as spam email.

US Pat. No. 10,657,181

QUERY SUGGESTIONS USING ONTOLOGY PARTITIONS

INTERNATIONAL BUSINESS MA...

1. A method, comprising:utilizing at least one processor to execute computer code that performs the steps of:
receiving a partially completed query request from a user, wherein the partially completed query request comprises at least one text string provided in a query field;
mapping at least one extracted keyword from the at least one text string to at least one ontology element contained within at least one of a plurality of partitions in an ontology graph, wherein each of the plurality of partitions represent a single domain functionality, the ontology graph comprising (i) ontology elements represented as nodes and (ii) connections between ontology elements represented as edges, wherein each of the plurality of partitions corresponds to a subject area of a field and comprises ontology elements corresponding to concepts related to the subject area of the field, wherein the ontology elements included within a partition have a semantic relationship between other ontology elements of the partition; and
generating, in view of the plurality of partitions, at least one suggestion for completing the query request to the user, wherein the generating the at least one suggestion comprises generating a plurality of suggestions and ranking the plurality of suggestions, wherein the at least one suggestion comprises a semantically relevant suggestion corresponding to the at least one text string provided in the query field, wherein a semantically relevant suggestion comprises a suggestion generated from an ontology element included within a partition in the ontology graph having a direct connection to the at least one text string, wherein the partition having a direct connection comprises a partition within the ontology graph that does not require traversing through another ontology partition which is not spanned by ontology elements mapped for the query request, and wherein the at least one suggestion is provided in an order based upon a number of edges to be directly traversed within the ontology graph to reach the at least one suggestion.

US Pat. No. 10,657,180

BUILDING AND REUSING SOLUTION CACHE FOR CONSTRAINT SATISFACTION PROBLEMS

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for reusing a solution for a test, the method comprising:building, by a processor, a solution cache comprising a tree structure representative of a plurality of solutions, the tree structure comprising a key configurable immediate value of a previous solution as a node, the previous solution as a leaf node of the tree, and an edge from the node indicative of a value of the key configurable immediate value at the node;
in response to receiving the test for which a solution is to be determined:
identifying a constraint in the test that uses an immediate value, which is a symbol used in the constraint, and which is configured with a particular value at time of executing the test;
determining that the immediate value was used for solving the previous solution;
marking the immediate value as the key configurable immediate value based on the determination, without executing the test to generate a new solution for the test;
traversing to a first node of the tree structure in the solution cache, the first node comprising the key configurable immediate value of the previous solution identical to a configurable immediate value from the test;
identifying an edge of the tree structure from the first node, the edge being associated with a value identical to a value of the configurable immediate value from the test;
traversing to a next node of the tree structure along the edge; and
in response to the next node being a leaf node of the tree structure, using the solution at the leaf node as a solution of the test.

US Pat. No. 10,657,179

BIPARTITE GRAPH STRUCTURE

X DEVELOPMENT LLC, Mount...

1. A system for storing biochemical information comprising:a non-transitory computer readable storage medium;
a processor executing instructions to configure the non-transitory computer readable storage medium to store a database structured as a bipartite graph comprising: a plurality of molecule nodes, wherein each molecule node of the plurality of molecule nodes represents a molecule in a biochemical environment and wherein each molecule node of the plurality of molecule nodes includes a plurality of molecule metadata fields characterizing the molecule;
a plurality of process nodes, wherein each process node of the plurality of process nodes represents a process occurring in a biochemical environment, and wherein each process node of the plurality of process nodes includes a plurality of process metadata fields including at least a roles field, wherein the roles field defines a set of roles of molecules in the process; and
a plurality of edges, wherein each edge of the plurality of edges associates a molecule node to a process node, and wherein each edge of the plurality of edges characterizes a role of a molecule represented by the associated molecule node in a process represented by the associated process node, wherein the edge includes the stoichiometric coefficient of the molecule in the process;
wherein, for each edge of one or more first edges of the plurality of edges, the role characterized by the edge is a catalyst role or cofactor role and a directionality of the edge is bidirectional; wherein, for each edge of one or more second edges of the plurality of edges, the role characterized by the edge is a reactant role and a directionality of the edge is unidirectional; and wherein the plurality of molecule nodes, the plurality of process nodes, and the plurality of edges are stored in a non-SQL graph database.

US Pat. No. 10,657,178

PROCESSING OF A GENERATE ENTITY TYPE GRAPH COMPONENT OF A GRAPH ANALYSIS SYSTEM

Hewlett Packard Enterpris...

1. A computer-readable storage medium storing computer-executable instructions for controlling a computing device to provide a graphical user interface for analyzing an entity graph having vertices and edges, at least some of the vertices being entity vertices representing an entity of an entity type, each entity having an entity identifier, each edge having an edge type, the instructions comprising:a generate overall characteristics report component that
receives from a user a selection of one or more characteristics relating to the entity graph;
generates an overall characteristics report for the entity graph that includes the selected characteristics; and
presents the overall characteristics report to the user; and
a generate entity type graph component that
receives from a user a specification of a node filter and a link filter;
generates an entity type graph for the entity graph, the entity type graph having nodes and links, each node representing an entity type and satisfying the node filter, each link connecting nodes to indicate that the entity graph includes one or more edges connecting entity vertices with the entity types of the connected nodes and satisfying the link filter; and
presents the entity type graph to the user.

US Pat. No. 10,657,177

METHOD AND APPARATUS FOR IMPLEMENTING A SEARCH INDEX GENERATOR

GROUPON, INC., Chicago, ...

1. A method for generating a search index in a system where relationships between searchable items are dynamically changing and relationships between searchable items and search query criteria are dynamically changing, the method comprising:receiving, by index workflow circuitry comprising a processor, a search index update indicator, the search index update indicator generated in response to a change in one or more relationships between searchable items and search query criteria based at least in part on interactions with promotion content by consumer devices;
causing, by the index workflow circuitry comprising the processor, and in response to receiving the search index update indicator, index generation circuitry to retrieve data sets from a plurality of data sources, wherein the plurality of data sources includes relevance data identifying relationships between interactions with content and characteristics of the content;
calculating, by the index workflow circuitry comprising the processor, a checksum for each of the data sets;
comparing, by the index workflow circuitry comprising the processor, the checksum for each of the data sets to a set of search index metadata;
in response to determining that at least one checksum for at least one of the data sets does not match a metadata checksum from the set of search index metadata, generating, by the index workflow circuitry comprising the processor, a set of search index data from the data set corresponding to the at least one checksum;
generating, by the index workflow circuitry comprising the processor, a search index using at least the set of search index data; and
transmitting, by the index workflow circuitry comprising the processor, the search index to a search service for use in responding to at least one search query.

US Pat. No. 10,657,176

ASSOCIATING OBJECT RELATED KEYWORDS WITH VIDEO METADATA

Amazon Technologies, Inc....

1. A computer-implemented method comprising:identifying a product for sale associated with a video;
identifying one or more attributes of the product for sale;
obtaining a transcription of audio content within the video, wherein the transcription comprises information indicating, for each word in the transcription, a time instance when the word is mentioned in the audio content within the video;
determining, based on an analysis of the transcription of the audio content within the video, that a first word in the transcription is associated with at least one attribute of the one or more attributes of the product for sale;
generating a tag that associates the first word with the time instance when the first word is mentioned in the audio content within the video; and
transmitting the tag and the video as a package to a user device.

US Pat. No. 10,657,175

AUDIO FINGERPRINT EXTRACTION AND AUDIO RECOGNITION USING SAID FINGERPRINTS

Spotify AB, Stockholm (S...

1. A method for generating fingerprints for audio content information, the method comprising:generating a frequency representation of the audio content information, wherein the frequency representation represents information about at least a number of frequencies within a time range containing a number of time frames of the audio content information and a level associated with each of said frequencies;
selecting a plurality of areas from said frequency representation, wherein each of the plurality of areas comprises information about a sub-range of frequencies and a sub-range of time frames of the audio content information;
generating a first fingerprint for a first selected area of the plurality of areas by applying a trained neural network that converts the plurality of areas into respective fingerprints in a metric space, wherein the neural network is trained such that the neural network produces the same or similar fingerprints for at least two areas of the plurality of areas when the at least two areas of the plurality of areas contain the same frequency representation of audio content information, regardless of the position of the at least two areas in said frequency representation;
comparing the first fingerprint to at least one reference fingerprint accessible by a database and generated from a set of reference audio files, by calculating a distance between the first fingerprint and at least one reference fingerprint, using a specified distance metric; and
identifying a reference audio file, having at least one associated reference fingerprint with an associated distance from the first fingerprint satisfying a predetermined threshold.

US Pat. No. 10,657,174

SYSTEMS AND METHODS FOR PROVIDING IDENTIFICATION INFORMATION IN RESPONSE TO AN AUDIO SEGMENT

SoundHound, Inc., Santa ...

11. A non-transitory computer-readable recording medium having computer program instructions recorded thereon, the computer program instructions for providing identification information in response to an audio segment, and the computer program instructions, when implemented on a processor, implement a method comprising:receiving an audio segment from an electronic device;
identifying information related to the audio segment received from the electronic device;
storing the identified information;
providing meta-data for the identifying information, the meta-data being enabling for the electronic device to use as a criterion for selection of locally obtained or server obtained identification information; and
sending (a) the identification information relating to the audio segment and (b) the meta-data to the electronic device.

US Pat. No. 10,657,173

VALIDATE MODIFICATION OF AUDIO-BASED COMPUTER PROGRAM OUTPUT

Google LLC, Mountain Vie...

1. A system to validate modification of computer program output, comprising:a data processing system having one or more processors and memory to:
establish a communication channel with a third-party server that provides a computer program comprising a chatbot, the computer program comprising the chatbot selected based on an acoustic signal detected by a microphone of a computing device;
receive, from the third-party server, a request for content in a parameterized format configured for a parametrically driven text to speech technique, the request triggered by identification of a placeholder field in a dialog data structure identified by the chatbot;
select, via a content selection process responsive to the request, a content item for insertion into the placeholder field of the dialog data structure, the content item in the parameterized format configured for the parametrically driven text to speech technique;
transmit, to the third-party server different from the data processing system, the content item in the parameterized format selected via the content selection process for provision to the chatbot to cause the computing device to perform the parametrically driven text to speech technique to generate a second acoustic signal corresponding to the dialog data structure modified with the content item;
receive, from the chatbot, an indication of the content item;
determine, based on a comparison of the indication of the content item with the content item, that the content item received by the chatbot from the third-party server matches the content item transmitted by the data processing system to the third-party server; and
set, based on the determination that the content item received by the chatbot from the third-party server matches the content item transmitted by the data processing system to the third-party server, a validation parameter for the third-party server.

US Pat. No. 10,657,172

METHOD AND APPARATUS FOR MANAGING IMAGE METADATA

Samsung Electronics Co., ...

1. An image processing method of an electronic device comprising:obtaining an image using a camera operably coupled with the electronic device;
dividing the image into a plurality of image blocks;
measuring a distance value related to the image;
determining an image attribute for at least one of the plurality of image blocks based on the distance value;
generating a first part of metadata corresponding to the image, wherein the metadata comprises a hierarchical data structure and the first part of the metadata is associated with a first layer of the hierarchical data structure, wherein the hierarchical data structure includes a plurality of layers;
generating a second part of metadata corresponding to each of the plurality of image blocks, wherein the second part of metadata is associated with a second layer of the hierarchical data structure, wherein the second layer corresponds to a lower layer than the first layer in the hierarchical data structure; and
storing the hierarchical data structure in association with the image in a storage unit operatively coupled to the electronic device,
wherein the first part of metadata corresponding to the image comprises at least one of a photographic view, a photographic composition, a photographic date, a photographic time, a photographic location, a temperature when taking a photograph, a photographic illuminance, and camera settings, and
wherein the second part of metadata corresponding to each of the plurality of image blocks comprises at least one of identification information of an image block included in the plurality of image blocks, size information of the image block, location information of the image block, color information of the image block, brightness information of the image block, depth information of the image block, and the attribute information of the image block.

US Pat. No. 10,657,171

IMAGE SEARCH DEVICE AND METHOD FOR SEARCHING IMAGE

Hitachi, Ltd., Tokyo (JP...

1. An image search device that searches an image from an image database that stores a recorded image, one or more types of feature values including a first type of said recorded image, and propagation information that indicates a link between a same type of the feature values of the recorded image, the image search device comprising:an image acquisition unit that acquires a first image and the one or more types of feature values of the first image, and records the first image and the feature values in the image database;
an attribute propagation unit that calculates a propagation intensity indicating similarity or sameness between the types of feature values of the recorded image and the types of feature values of the first image, and includes in the propagation information a link between the types of feature values of the first image and the types of feature values of the recorded image for which the propagation intensity between the types of feature values of the recorded image and the types of feature values of the first image is at a maximum value;
a query input unit that acquires a first feature value of a first type from the feature values of the recorded image stored in the image database and generates an input query including the first feature value;
a query reinforcing unit that, on the basis of a correspondence indicated by the propagation information, performs a search that traverses the feature values of the recorded image starting with the first feature value, and generates an additional query including the first type of feature value of the recorded image that has feature values on a path of the search; and
an image search unit that searches for images from the image database using the input query and the additional query.

US Pat. No. 10,657,170

SYSTEM AND METHOD FOR AUTOMATICALLY SELECTING IMAGES TO ACCOMPANY TEXT

MediaLab.AI, Venice, CA ...

1. A system for selecting an image to accompany text from a user in connection with a social media post, comprising a processor and a tangible storage medium, said tangible storage medium comprising code executable by the processor for performing steps comprising:receiving text from the user;
performing sentiment analysis on the text to generate search terms;
identifying candidate images from images in one or more image databases using the search terms;
presenting one or more candidate images to the user;
receiving from the user a selected image from the one or more candidate images;
generating the social media post comprising the selected image and the user-submitted text, wherein the graphical social media post is of a similar size and of a similar shape as the selected image, and wherein the graphical social media post comprises the text displayed superimposed on the selected image;
transmitting the social media post for display; and
wherein the user-submitted text further comprises one or more search terms and the sentiment analysis performance comprises identifying those search terms.

US Pat. No. 10,657,169

SYSTEMS, METHODS, AND COMPUTER READABLE MEDIUM FOR GENERATING PLAYLISTS

Spotify AB, Stockholm (S...

1. An apparatus for generating a playlist, comprising:a processor coupled to a memory and a catalog database, and configured to function as:
a playlist engine evaluator configured to:
evaluate a rule corresponding to each rule-primitive in a set of rule-primitives across a catalog of media content stored in the catalog database;
evaluate a set of corresponding weights respectively associated with one or more rule-primitives;
calculate a rule cost associated with each item in the catalog of media content and the weight associated with the corresponding rule-primitive; and
generate a playlist based on the items of the catalog having the lowest rule costs.

US Pat. No. 10,657,168

METHODS AND SYSTEMS FOR PERSONALIZED RENDERING OF DIGITAL MEDIA CONTENT

Slacker, Inc., San Diego...

1. A method for facilitating personalized rendering sequences of media files on a wireless device configured with a wireless transmitter, a wireless receiver, a client cache and a user interface, the sequences of media files corresponding to a plurality of personalized content channels, the method comprising:transmitting, using the wireless transmitter, a plurality of station profiles corresponding to the plurality of personalized content channels and current media file inventories for the plurality of personalized content channels, the current media file inventories and the plurality of station profiles being stored within the client cache;
receiving, from a server using the wireless receiver, a list of media files to be downloaded by the device wherein the list is generated based at least upon the current media file inventories;
requesting, from the server, ones of the media files on the list;
receiving, from the server over a-data link, the ones of the media files and associated file metadata, wherein the file metadata defines one or more attributes of the media files;
storing, in the client cache, the ones of the media files;
receiving, through the user interface, a user selection of a first selected one of the plurality of personalized content channels;
sequencing a first plurality of the media files for playback on a first of the plurality of personalized content channels based upon the one of the plurality of station profiles and the one of the current media file inventories associated with the first selected one of the plurality of personalized content channels;
receiving, through the user interface, a user selection of a second selected one of the plurality of personalized content channels; and
sequencing a second plurality of the media files for playback on a second of the plurality of personalized content channels based upon the one of the plurality of station profiles and the one of the current media file inventories associated with the second selected one of the plurality of personalized content channels wherein the first plurality of media files is different from the second plurality of media files.

US Pat. No. 10,657,167

CLOUD GATEWAY FOR ZFS SNAPSHOT GENERATION AND STORAGE

Oracle International Corp...

1. A method of creating a snapshot of a tree hierarchy on a cloud object store that is remote from a block storage system, the method comprising:receiving, at an application layer of the block storage system and through a system call interface of an interface layer of the block storage system, a first request to modify a file, the first request including file data;
identifying, based on comparing the file data to a first snapshot of the block storage system, a first storage location of a first portion of the file data that is to be modified by the request to modify the file and a second storage location of a second portion of the file data that is to remain unmodified, the first snapshot including a representation of the file prior to receiving the first request to modify the file;
generating, at a transactional object layer of the block storage system and based on the first portion of the file, a plurality of data blocks, each data block of the plurality of data blocks corresponding to the first portion of the file data;
generating, at the transactional object layer of the block storage system, a plurality of metadata blocks corresponding to the plurality of data blocks, the plurality of metadata blocks being configured to hierarchically point to lower-level blocks associated with the file thereby correspond to at least part of a modified tree hierarchy for the file, wherein:
each metadata block of the plurality of metadata blocks includes one or more address pointers, each address pointer of the one or more address pointers pointing to a data block of the plurality of data blocks or to a metadata block of the plurality of metadata blocks;
each data block of the plurality of data blocks being pointed to by at least one metadata block of the plurality of metadata blocks;
the plurality of metadata blocks includes a root block that is positioned at a top of the modified tree hierarchy for the file and one or more non-root metadata blocks; and
each non-root metadata block of the plurality of metadata blocks being pointed to by at least one metadata block of the plurality of metadata blocks of the modified tree hierarchy for the file;
causing a set of cloud storage objects to be stored in the cloud object store by transmitting the plurality of data blocks and the plurality of metadata blocks to a hybrid cloud storage system, the hybrid cloud storage system managing data storage in the cloud object store, wherein transmitting the plurality of data blocks and the plurality of metadata blocks;
transmitting, to the hybrid cloud storage system, one or more second requests for a set of addresses, each address of the set of addresses corresponding to a data block of the plurality of data blocks or a metadata block of the plurality of metadata blocks;
receiving, from the hybrid cloud storage system, one or more responses to the one or more second requests, each response of the one or more responses identifying an address corresponding to a data block of the plurality of data blocks or a metadata block of the plurality of metadata blocks, the address identifying a storage location in the cloud object store;
receiving, at the application layer of the block storage system and through the system call interface of the interface layer of the block storage system, a third request to generate a new snapshot of the tree hierarchy; and
generating, at a data and snapshot layer of the block storage system, the new snapshot of the tree hierarchy by:
storing a snapshot reference to a live root block, wherein the live root block is the root block in use at a time period beginning when the third request is received; and
marking as read-only capable the plurality of data blocks and the plurality of metadata blocks that are accessible from the snapshot reference.

US Pat. No. 10,657,166

REAL-TIME SENTIMENT ANALYSIS FOR CONFLICT MITIGATION USING COGNATIVE ANALYTICS AND IDENTIFIERS

International Business Ma...

1. A computer-implemented method for mitigating conflicts, the method comprising:receiving a first communication by a first person operating a first computing device;
receiving a second communication by a second person operating a second computing device, wherein the first person and the second person are in a face-to-face conversation, wherein the first computing device and the second computing device each have a camera, a microphone and a sensor to measure a plurality of identifiers, wherein the plurality of identifiers include facial features, voice features and biometric features;
determining the received first communication has a first sentiment associated with the first person and a second sentiment associated with the second person, wherein the second sentiment is in response to the first communication, wherein the first sentiment and the second sentiment are measured by the plurality of identifiers, wherein the plurality of identifiers for the first sentiment and the second sentiment are analyzed by a cognitive analyzer, wherein the cognitive analyzer compares the received measurements, historical data and personality;
determining that the first sentiment does not match the second sentiment, wherein the determination is made based on the cognitive analyzer's measurements and analysis between the first person and the second person;
retrieving successful conversational responses from a database of a similar topic as the first communication and the second communication;
providing a response to the first person on the first computing device and the second person on the second computing device, wherein the response is created to align the sentiment between the first person and the second person towards a matching sentiment; and
logging a conversation result in a database.

US Pat. No. 10,657,165

INFERRING MEMBERSHIP IN A GROUP

Google LLC, Mountain Vie...

1. A computer system comprising:one or more processing devices; and
one or more machine-readable hardware storage devices storing instructions that are executable by the one or more processing devices to perform operations comprising:
receiving a query from a user device of a user during a period of time;
identifying the query as being distinguished from one or more other queries received from the user device by performing operations comprising:
for a particular query of the one or more other queries:
determining a frequency of input by the user of the particular query during the period of time; and
for the query received:
comparing the frequency of input by the user of the particular query to a frequency of input of the query received during the period of time; and
determining, based on the comparing, that a difference between the frequency of input by the user of the particular query and the frequency of input of the query received satisfies a threshold;
in response to identifying the query as being distinguished, determining that the user is a member of a group based on:
a subject matter of the query, the group having one or more characteristics associated with the subject matter of the query; and
one or more frequencies of one or more respective other queries that have the subject matter of the query and that are submitted by members of the group during the period of time;
following the determining, attributing the one or more characteristics to the user;
based on the one or more characteristics, identifying the user for distribution of digital content authored by one or more members of the group; and
providing the user with access to the digital content.

US Pat. No. 10,657,164

DETERMINING ANSWERS TO QUESTIONS USING A HIERARCHY OF QUESTION AND ANSWER PAIRS

International Business Ma...

1. A method comprising:generating a plurality of question and answer pairs, where the plurality of question and answer pairs includes at least a first answer paired to a first question and a second answer paired to a second question, where the second answer paired to the second question is a subset of the first answer paired to the first question;
identifying a hierarchy of question and answer pairs, where the first answer paired to the first question is at a root node in the hierarchy of question and answer pairs, and where the second answer paired to the second question is at a node below the root node in the hierarchy of question and answer pairs based, at least in part, on the second answer being a subset of the first answer;
receiving, by a question answering system, an input question from a first user, where the input question matches the first question;
identifying first user contextual information pertaining to the first user, where the first user contextual information indicates a desired answer length based on a screen size of a device used by the first user to submit the input question, the desired answer length being shorter than a length of the first answer; and
answering the input question with the second answer, by the question answering system, based, at least in part, on the hierarchy of question and answer pairs and the first user contextual information, wherein answering the input question with the second answer includes sending the second answer to the device used by the user to submit the input question.

US Pat. No. 10,657,163

SYSTEMS AND METHODS FOR TRACKING ASSETS ACROSS A DISTRIBUTED NETWORK ENVIRONMENT

Open Text SA ULC, Halifa...

1. A content flow system for providing asset tracking in a distributed and networked enterprise environment, comprising:a content flow server coupled to a set of distributed content management systems over a network, each content management system managing a corresponding set of assets and having an asset tracking module deployed thereon, the content flow server including:
a graph database storing a graph representing the sets of assets across the set of distributed content management systems, a set of communications sent by a communication management system and a set of users to which the set of communications were sent by the communication management system, the graph comprising:
a set of asset objects and a set of usedIn relationships between those asset objects, wherein each asset object includes a content management identifier of the content management system managing the asset corresponding to the asset object and an asset identifier used by that content management system for managing the corresponding asset,
a set of communication objects and a set of generate relationships between the set of asset objects and the set of communication objects, and
a set of user objects and a set of sent relationships between the set of communication objects and the set of user objects, each sent relationship specifying a delivery method as a property;
an asset tracking interface for:
receiving an interaction notification from a first asset tracking module deployed on a first content management system in the enterprise environment, the interaction notification specifying a first content management identifier of the first content management system, a first asset identifier for a first asset as used by the first content management system, and the first usedIn relationship including the first asset; and
updating the set of asset objects and set of usedIn relationships of the graph in the graph database based on the interaction notification, including creating a usedIn relationship between a first asset object representing the first asset and at least one second asset object representing a second asset managed by a second content management system;
a communication tracking interface for:
receiving a communication notification from a communications tracking module deployed on the communication management system in the enterprise environment, the communication notification specifying a first communication, a generate relationship with the first asset and a sent relationship including the first communication and a first user; and
updating the set of communication objects, set of user objects, set of generate relationships and set of sent relationships of the graph of the graph database to include a first communication object representing the first communication, a first user object representing the first user, a first generate relationship between the first communication object and the first asset object and a first sent relationship between the first communication object and the first user object; and
a search interface for:
receiving a query including the first asset identifier for the first asset as used by the first content management system and the generate relationship;
forming a graph query corresponding to the received query, including the first asset identifier of the first asset;
searching the graph database based on the graph query to determine the first user object for the first user having the first sent relationship to the first communication object having the generate relationship to the first asset object; and
returning, in response to the received query, a user identifier for the first user associated with the first user object and the delivery method associated with the first sent relationship between the first user object and the first communication object.

US Pat. No. 10,657,162

METHOD AND SYSTEM FOR VISUALIZING DOCUMENTS

TEXTWISE COMPANY, LLC, F...

1. A method, implemented on at least one machine having at least one processor, storage, and a communication platform connected to a network for visualizing documents, comprising the steps of:obtaining, for each document in a set of documents, a feature based representation of the document, wherein the feature based representation includes at least one concept associated with the document;
generating an N-dimensional semantic compact representation for each document based on the feature based representation, wherein the N-dimensional semantic compact representation includes one or more codes encoding semantics of the document, wherein the one or more codes encoding semantics of the document are obtained via a neural network, and wherein a dimensionality of the N-dimensional semantic compact representation is determined based on a size of a coding layer of the neural network;
retrieving, from the set of documents, a plurality of documents and their corresponding N-dimensional semantic compact representations;
projecting each of the retrieved documents to a point on a K-dimensional map based on its N-dimensional semantic compact representation so that projected document points in the K-dimensional map maintain the relative distances among the retrieved documents in the N-dimensional space;
identifying each region in the K-dimensional map having a density of document points associated with a concept being higher than a threshold;
generating, based on the identifying, a label for each concept associated with the document points in the region; and
rendering, on the K-dimensional map, the document points and one or more of the generated labels in corresponding identified regions.

US Pat. No. 10,657,161

INTELLIGENT NAVIGATION OF A CATEGORY SYSTEM

Alibaba Group Holding Lim...

1. A method, comprising:performing analysis of historical user activity data with respect to a query term to generate reference data associated with the query term;
selecting a navigation recommendation model for the query term based at least in part on the reference data;
using the selected navigation recommendation model to determine an initial current category of a category system;
selecting at least one subcategory associated with the determined initial current category, the at least one subcategory being at least one level below a level associated with the determined initial current category, wherein the selecting of the at least one selected subcategory is based at least in part on the determined initial current category and a portion of the reference data associated with the at least one subcategory;
generating a set of recommendation data that includes the at least one selected subcategory having been moved to the level associated with the determined initial current category in the category system; and
recording an association between the set of recommendation data and the query term in a recommendation list, wherein the set of recommendation data includes at least a portion of the category system to be displayed in response to a subsequently received query including the query term.

US Pat. No. 10,657,160

DYNAMIC LOCATION SEARCH SUGGESTIONS BASED ON TRAVEL ITINERARIES

Apple Inc., Cupertino, C...

1. A non-transitory machine readable medium storing instructions executable by an electronic device to perform operations comprising:identifying, by the electronic device, a travel destination based on information stored by a first application on the electronic device;
communicating the travel destination to a second application on the electronic device, wherein the second application is adapted to retrieve information associated with an identified geographic location;
identifying a time of travel to the travel destination based on the information stored by the first application; and
providing, through the second application, information associated with the travel destination, the information associated with the travel destination provided based on the time of travel to the travel destination in response to activation of the second application.