US Pat. No. 10,713,483

PUPIL EDGE DETECTION IN DIGITAL IMAGING

Welch Allyn, Inc., Skane...

1. A method of identifying a pupil edge in a digital image, the method comprising:receiving a digital pupil image;
generating a mean first portion pixel intensity of a first portion of the digital pupil image;
generating a mean second portion pixel intensity of a second portion of the digital pupil image;
averaging the mean first portion pixel intensity and the mean second portion pixel intensity to generate an average pixel intensity;
determining a modified standard deviation, including:
calculating a standard deviation of a pixel intensity for each pixel within the first portion and the second portion; and
multiplying the standard deviation by a multiplier;
generating a threshold value by summing the average pixel intensity and the modified standard deviation; and
using the threshold value, identifying the pupil edge in the digital pupil image.

US Pat. No. 10,713,482

METHOD AND APPARATUS FOR ANALYZING DEFINED TERMS IN A DOCUMENT

Celant Innovations, LLC, ...

1. A computer-implemented method for identifying terms in a document, the method being performed by one or more processors, comprising:electronically obtaining a user document having a plurality of title cased terms and a plurality of defined terms;
determining whether the user document meets acceptance criteria, wherein the acceptance criteria include determining whether the user document is one or more of: password protected, encrypted, or corrupted;
determining a location of each title cased term;
accessing a library stored in a data repository, wherein the library includes predetermined terms not to be identified by a predetermined identifier, wherein the library includes an entities list and an ignore list;
comparing the plurality of title cased terms to the library of predetermined terms, wherein a first title cased term is classified by a first predetermined identifier if the first title cased term is not in the library, and wherein the first title cased term is not classified by the first predetermined identifier if the first title cased term is in the library;
identifying the plurality of defined terms within the user document based, at least in part, on a common expression, wherein the common expression is country specific and is based on a combination of regular expressions, Boolean conditions, and user-specific limitations; and
determining each title cased term which is a defined term and a defined term location and a defined term frequency, wherein each defined term having a frequency value greater than one is reclassified by a second predetermined identifier and wherein each defined term having a frequency value of one is reclassified by a third predetermined identifier.

US Pat. No. 10,713,481

DOCUMENT EXTRACTION SYSTEM AND METHOD

CROWE HORWATH LLP, Oak B...

1. An apparatus comprising:a storage device; and
at least one processor coupled to the storage device, wherein the storage device stores a program for controlling the at least one processor, and wherein the at least one processor, being operative with the program, is configured to:
obtain document recognition data including positional locations of a plurality of characters in a non-standardized digital source document;
identify at least a first column and a second column in the non-standardized digital source document by analyzing the positional locations of the plurality of characters in the document recognition data;
determine whether the first column is a label column or a value column;
determine whether the second column is a label column or a value column;
analyze the positional locations of the plurality of characters to identify a plurality of rows in the first column and the second column;
associate a plurality of predetermined variables with at least one expected word of a plurality of expected words;
correlate at least a portion of the plurality of rows in the label column with a variable of the predetermined plurality of variables based on a comparison of characters in the rows of the label column to determine if the characters in respective rows match at least one of the plurality of expected words and correlating that row with the variable to which the matching expected word is associated, wherein the plurality of expected words vary as a function of a document type of the non-standardized digital source document;
assign values to respective rows in the plurality of rows of the value column to variables associated with corresponding rows in the label column; and
transmit the plurality of variables and respective plurality of values over a network.

US Pat. No. 10,713,480

INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD

SONY CORPORATION, Tokyo ...

1. An information processing system, comprising:a portable terminal including a display;
a mobile object including
an imaging device configured to capture an image, and
an actuator to move the mobile object; and
circuitry configured to:
determine a position of a specific subject related to the portable terminal based on the captured image;
send the captured image and information on the determined position of the specific subject to the portable terminal;
determine a first virtual object based on the determined position of the specific subject; and
control the display to display the first virtual object over the captured image to indicate the determined position of the specific subject.

US Pat. No. 10,713,479

MOTION RECOGNITION METHOD AND MOTION RECOGNITION DEVICE FOR RECOGNIZING MOTION OF USER RECEIVED VIA NUI DEVICE BY COMPARING WITH PRESET COMPARISON TARGET INFORMATION

STARSHIP VENDING-MACHINE ...

1. A method for recognizing a motion of a user received via an NUI device, which is performed by a motion recognition device, the method comprising:(a) acquiring information about a motion of a user;
(b) determining a comparison target information which is matched to the motion of the user among one or more preset comparison target information by performing dynamic time-warping between the information about the motion and each of the preset comparison target information; and
(c) detecting that a command corresponding to the determined comparison target information has been input,
wherein step (a) comprises:
(a-1) configuring the motion of the user, and converting the motion of the user into a binary vector based on one or more pose information including 3D locations of a joint of the user; and
(a-2) setting the binary vector as the information about the motion of the user,
wherein the binary vector is a bit array which is comprised of binary values output from conditional expressions, and
wherein each of the conditional expressions uses the pose information as a factor, and outputs the binary values corresponding to the pose information.

US Pat. No. 10,713,477

EXPRESSION DETERMINATION DEVICE, EXPRESSION DETERMINATION METHOD, AND RECORDING MEDIUM

CASIO COMPUTER CO., LTD.,...

1. An expression determination device comprising a processor:wherein the processor is configured to:
acquire image data;
detect a face of a person from the acquired image data;
estimate an angle of the detected face;
acquire a single expression score indicating a degree of expression of an expression worn by the face; and
determine the expression worn by the face by calculating a single corrected score that is obtained by correcting the acquired single expression score based on the estimated angle of the face.

US Pat. No. 10,713,476

HIGH THROUGHPUT PASSENGER IDENTIFICATION IN PORTAL MONITORING

Royal Caribbean Cruises L...

1. A data processing system adapted for high throughput passenger identification in portal security, the system comprising:a host computing system comprising at least one processor and memory;
a display coupled to the host computing system and positioned at a portal passageway leading into a secure area;
an image acquisition device communicatively linked to the host computing system and disposed at the portal passageway, the image acquisition device continuously acquiring imagery at the portal passageway and transmitting the acquired imagery to the display;
a database of faces coupled to the host computing system; and,
a high throughput passenger identification module comprising computer program instructions executing in the host computing system and enabled to perform:
receiving from the image acquisition device as part of the continuously acquired imagery, a contemporaneously acquired image of a group of individuals approaching the portal passageway;
identifying a set of faces of the group of individuals in the contemporaneously acquired image;
querying the database with each identified face in the set and for each face assigning a confidence value of having matched the face to a record of a known person in the database;
visually decorating each face in the contemporaneously acquired image with an initial visual characteristic on condition that a correspondingly assigned confidence value falls short of a threshold, but with a different visual characteristic on condition that the correspondingly assigned confidence value does not fall short of the threshold;
displaying the contemporaneously acquired image as part of the continuously acquired imagery in the display;
receiving from the image acquisition device a subsequently acquired image of the group of individuals approaching the portal passageway;
identifying the set of faces of the group of individuals in the subsequently acquired image;
re-querying the database with each identified face in the set and for each face assigning a new confidence value of having matched the face to a record of a known person in the database;
visually re-decorating each face of the subsequently acquired image with the initial visual characteristic on condition that the correspondingly assigned new confidence value falls short of the threshold, but with the different visual characteristic on condition that the correspondingly assigned new confidence value does not fall sort of the threshold; and,
displaying the subsequently acquired image in the display in place of the contemporaneously acquired image.

US Pat. No. 10,713,475

FACE DETECTION, POSE ESTIMATION, AND DISTANCE FROM A CAMERA ESTIMATION USING A SINGLE NETWORK

Apple Inc., Cupertino, C...

1. A method, comprising:capturing at least one flood infrared image using a camera located on a device, the device comprising a computer processor and a memory, wherein the at least one image comprises an image captured while illuminating subjects in the image with a flood infrared illuminator located on the device;
encoding, by the computer processor, the at least one flood infrared image to generate feature vectors defining features of subjects in the image in a feature space, the feature space comprising a plurality of regions, wherein each feature vector defines features for one region in the feature space;
assessing the generated feature vectors for each region in the feature space, by the computer processor, to determine whether a face is present in the region;
in response to the face being determined to be present inn the region;
assessing one or more properties of the face in the region, wherein at least one of the properties is a distance from the camera of the face in the region; and
providing an output from the computer processor, the output comprising an indication that the face is present in the region and the assessed distance from the camera of the face in the region.

US Pat. No. 10,713,474

PERSON IDENTIFICATION APPARATUS

Bundesdrunkerei GmbH, Be...

1. A person identification apparatus for identifying a living person, comprising:a heat image camera configured to record a heat image of a facial area of the living person; and
a processor configured to:
determine a detection area in the heat image based on comparing the heat image to a heat pattern, comparing the heat image to a white light image of the living person, or masking the heat image, or any combination thereof;
detect a local heat inhomogeneity in the determined detection area of the heat image in order to identify the living person; and
detect a distance of the living person from the heat image camera by, detecting a feature geometry of the living person in the white light image.

US Pat. No. 10,713,473

METHOD FOR RECOGNIZING FACE USING MULTIPLE PATCH COMBINATION BASED ON DEEP NEURAL NETWORK WITH FAULT TOLERANCE AND FLUCTUATION ROBUSTNESS IN EXTREME SITUATION

STRADVISION, INC., Pohan...

1. A method for face recognition by using a multiple patch combination based on a deep neural network, comprising:(a) if a face image with a 1-st size is acquired, a face-recognizing device performing a process of inputting the face image into a feature extraction network, to thereby allow the feature extraction network to generate a feature map by applying at least one convolution operation to the face image with the 1-st size, and thus to generate multiple features by applying sliding-pooling operation to the feature map, wherein the feature extraction network has been learned to extract at least one feature using a face image for training having a 2-nd size and wherein the 2-nd size is smaller than the 1-st size; and
(b) the face-recognizing device performing a process of inputting the multiple features into a learned neural aggregation network, to thereby allow the neural aggregation network to aggregate the multiple features and thus to output at least one optimal feature for the face recognition,
wherein, at (a), the face-recognizing device performs a process of inputting the face image with the 1-st size into at least one convolutional layer of the feature extraction network, to thereby allow the at least one convolutional layer to generate the feature map with a (1_1)-st size by applying at least one convolution operation to the face image with the 1-st size, a process of inputting the feature map with the (1_1)-st size into a pooling layer, to thereby allow the pooling layer to generate the multiple features with a (2_1)-st size by applying sliding-pooling operation to the feature map with the (1_1)-st size, wherein the (2_1)-st size is a size of a feature map for training, corresponding to a face image for training with the 2-nd size, generated by the feature extraction network,
wherein, the feature extraction network has been learned by a 1-st learning device repeating more than once (i) a process of inputting the face image for training with the 2-nd size into the at least one convolutional layer, to thereby allow the at least one convolutional layer to apply at least one convolution operation using at least one previously learned convolution parameter of the at least one convolutional layer to the face image for training with the 2-nd size and thus to generate the feature map for training with the (2_1)-st size, and (ii) a process of updating the at least one previously learned convolution parameter of the at least one convolutional layer by referring to characteristic information for training and its corresponding ground truth wherein the characteristic information for training corresponds to the feature map for training with the (2_1)-st size, such that one or more 1-st losses are minimized which are created by a 1-st loss layer.

US Pat. No. 10,713,472

FACE LOCATION TRACKING METHOD, APPARATUS, AND ELECTRONIC DEVICE

Alibaba Group Holding Lim...

1. A computer-implemented method for tracking locations of a particular face across a plurality of images comprising a first image and a second image, the method comprising:determining a first face region within the first image, the first face region including the location of the particular face within the first image;
based on the determined first face region within the first image, determining a predicted face region within the second image;
setting a plurality of comparison regions within the predicted face region, each comparison region in the plurality of comparison regions being different;
determining, for each comparison region in the plurality of comparison regions, a degree of similarity between the respective comparison region and the first face region by performing calculations according to the following equations:

wherein leftori, leftdes, topori, and topdes respectively represent a left boundary location of the first face region, a left boundary location of the respective comparison region, an upper boundary location of the first face region, and an upper boundary location of the respective comparison region,
wherein width represents a width of the first face region and height represents a height of the first face region,
wherein f(i,j) represents a grayscale value of a pixel of the first image having coordinates (i,j) in the first face region of the first image and g(i,j) represents a grayscale value of a pixel of the second image having coordinates (i,j) in the respective comparison region, and
wherein x represents a preset threshold and dis is the degree of similarity between the first face region and the respective comparison region;
based on determining that a particular comparison region in the plurality of comparison regions has a higher degree of similarity to the first face region than corresponding degrees of similarity of the other comparison regions in the plurality of comparison regions and satisfies a predetermined degree of similarity to the first face region, selecting the particular comparison region among the plurality of comparison regions as a first region of similarity;
determining whether a second face region is present within the second image; and
determining the location of the face within the second image based on the first region of similarity, the determination of whether the second face region is present within the second image, and a face region selection rule.

US Pat. No. 10,713,471

SYSTEM AND METHOD FOR SIMULATING FACIAL EXPRESSION OF VIRTUAL FACIAL MODEL

Institute For Information...

1. A system for simulating facial expression of a virtual facial model, comprising:a storage, being configured to store a plurality of three-dimensional facial models corresponding to a plurality of preset sentiments one-to-one; and
a processor, being electrically connected to the storage and configured to identify a present sentiment according to an acoustic signal and select a selected model from the three-dimensional facial models according to the present sentiment, wherein the preset sentiment corresponding to the selected model is the same as the present sentiment;
wherein the processor predicts an upper half face image according to a lower half face image, combines the lower half face image and the upper half face image to form a whole face image, and generates a plurality of feature relationships by matching a plurality of facial features of the whole face image with a plurality of facial features of the selected model so that the virtual facial model is adjusted for simulating facial expression according to the feature relationships.

US Pat. No. 10,713,470

METHOD OF DETERMINING IMAGE BACKGROUND, DEVICE FOR DETERMINING IMAGE BACKGROUND, AND A NON-TRANSITORY MEDIUM FOR SAME

BEIJING KINGSOFT INTERNET...

1. A method of determining an image background, comprising:recognizing a face region in an image, and obtaining a face distance based on the face region;
obtaining a face distance parameter of each pixel in the image based on the face distance;
processing the face distance parameter and corresponding color parameter of each pixel in the image by applying a pre-trained image region segmentation model to determine an image region type corresponding to each pixel;
determining a background region of the image based on the image region type corresponding to each pixel and performing preset background image processing on the background region;
wherein obtaining the face distance based on the face region comprises:
detecting a width of a central horizontal axis of the face region to obtain a face horizontal axis distance; and/or,
detecting a length of a central vertical axis of the face region to obtain a face vertical axis distance; and
wherein obtaining the face distance parameter of each pixel in the image based on the face distance comprises:
detecting a first distance from each pixel in the image to the central horizontal axis of the face region and calculating a first ratio of the first distance to the face horizontal axis distance;
and/or,
detecting a second distance from each pixel in the image to the central vertical axis of the face region and calculating a second ratio of the second distance to the face vertical axis distance.

US Pat. No. 10,713,469

INTELLIGENT AUTO CROPPING OF DIGITAL IMAGES

Microsoft Technology Lice...

1. A machine-readable storage device, storing instructions, which when executed by a machine, cause the machine to perform operations for automatically cropping an image, the operations comprising:receiving a first digital image;
detecting a face in the first digital image;
determining that the detected face in the first digital image matches a face from a second digital image previously stored in a data store;
determining that a landscape landmark displayed in the first digital image matches a landscape landmark displayed in a plurality of images of landscape landmarks stored in the data store; and
responsive to determining that the detected face in the first digital image matches the face from the second digital image previously stored in the data store and that the landscape landmark displayed in the first digital image matches the landscape landmark displayed in the plurality of images of landscape landmarks stored in the data store, cropping the first digital image based upon the detected face such that the detected face and the landscape landmark remains part of the cropped first digital image.

US Pat. No. 10,713,468

CHECKING CREDENTIALS USING A DRONE

International Business Ma...

1. A method for checking credentials, using a drone, comprising:detecting a line of people and a beginning of the line of people using a drone, the drone having a base station and being in communication with the base station for checking credentials of the people in the line with respect to a purpose for forming the line;
the drone communicating with a device at a start point of the line to verify a start of the line;
detecting, using the drone, a person in the line of people;
capturing information about the person using the drone, in response to the drone requesting information from the person and the person providing the requested information;
the drone communicating an identification of itself to the person, and requesting the information from the person in the line;
the drone receiving the information provided by the person;
checking the information with data, at least in part, stored at the base station to verify the person's information with respect to required credentials being related to the purpose of the line; and
communicating a message, using the drone, to the person on the line, in response to the checking of the information of the person.

US Pat. No. 10,713,467

OPTICAL FINGERPRINT VERIFICATION METHOD AND MOBILE TERMINAL

GUANGDONG OPPO MOBILE TEL...

1. An optical fingerprint verification method, applied to a mobile terminal comprising an application processor (AP), an optical sensor, and an optical fingerprint identification component, wherein the method comprises:controlling, by the mobile terminal, the optical sensor to detect an external ambient light intensity when the mobile terminal acquires a fingerprint collecting instruction;
controlling, by the mobile terminal, the optical fingerprint identification component to collect fingerprint data;
determining, by the AP of the mobile terminal, whether the fingerprint data matches to a set of target fingerprint template data corresponding to the external ambient light intensity, and when the fingerprint data matches to the set of target fingerprint template data, determining by the mobile terminal that a fingerprint verification is passed.

US Pat. No. 10,713,466

FINGERPRINT RECOGNITION METHOD AND ELECTRONIC DEVICE USING THE SAME

Egis Technology Inc., Ta...

1. A fingerprint recognition method, applied in an electronic device, the electronic device comprising a processing unit and a fingerprint sensor, comprising:obtaining a plurality of swiping frames by the fingerprint sensor;
extracting a plurality of feature points respectively from the plurality of swiping frames to generate a plurality of pre-registered fingerprint datasets accordingly by the processing unit;
merging the plurality of pre-registered fingerprint datasets by the processing unit;
generating a registration template according to the merged pre-registered fingerprint datasets by the processing unit;
obtaining a pressing frame by the fingerprint sensor;
extracting a plurality of feature points from the pressing frame to generate a verifying fingerprint dataset by the processing unit;
comparing the verifying fingerprint dataset with the registration template by the processing unit, so as to determine whether the verifying fingerprint dataset matches the registration template; and
rectifying the plurality of swiping frames to generate a plurality of rectified frames according to a distribution curve by the processing unit, wherein the step of rectifying the plurality of swiping frames to generate the plurality of rectified frames according to the distribution curve by the processing unit comprises:
vertically splitting each of the plurality of swiping frames into a plurality of vertical parts; and
aligning each of the plurality of vertical parts with its neighboring vertical parts according to the distribution curve.

US Pat. No. 10,713,464

FINGERPRINT IDENTIFICATION SUBSTRATE AND FABRICATION METHOD THEREOF, DISPLAY PANEL AND DISPLAY APPARATUS

BOE TECHNOLOGY GROUP CO.,...

1. A fingerprint identification substrate, comprising a base substrate and a plurality of fingerprint identification units on the base substrate, wherein each fingerprint identification unit includes a photosensitive sense electrode and a thin film transistor which are positioned on the base substrate, the photosensitive sense electrode is positioned between the base substrate and the thin film transistor, the photosensitive sense electrode is configured to convert light to a current signal and the photosensitive sense electrode is electrically connected with a source electrode or a drain electrode of the thin film transistor, and the photosensitive sense electrode and a gate electrode, an active layer and the source electrode of the thin film transistor are located on the base substrate in sequence in a direction substantially perpendicular to the base substrate.

US Pat. No. 10,713,463

DISPLAY METHOD OF USER INTERFACE AND ELECTRONIC APPARATUS THEREOF

Egis Technology Inc., Ta...

1. A display method of user interface, applied to fingerprint registration, the display method of user interface comprising:obtaining a plurality of swiping images by a fingerprint sensor;
analyzing the plurality of swiping images to obtain a plurality of feature points of the plurality of the swiping images;
merging the plurality of feature points of the plurality of swiping images into a pre-registration dataset by the processor;
displaying a filled region of a reference image on a user interface according to the plurality of swiping images by the processor; and
analyzing the pre-registration dataset to determine whether to end the fingerprint registration by the processor,
for each of the plurality of the swiping images, further comprising:
analyzing the pre-registration dataset to obtain an image adjusting parameter by the processor; and
updating a range of the filled region of the reference image according to the image adjusting parameter for increasing a length of the filled region by the processor.

US Pat. No. 10,713,462

FINGERPRINT DETECTION DEVICE AND DISPLAY DEVICE

Japan Display Inc., Toky...

1. A fingerprint detection device, comprising:a substrate having a first surface and a second surface on an opposite side of the first surface, the first surface serving as a detection surface configured to detect an unevenness of a finger in contact or in proximity thereto;
a detection electrode provided on a second surface side of the substrate and configured to be applied with a drive signal that produces an electrostatic capacitance to detect the unevenness;
a switching element provided at a position corresponding to the detection electrode, the switching element comprising
a semiconductor layer,
a gate electrode opposed to the semiconductor layer,
a source electrode, and
a drain electrode;
a gate line configured to supply a scanning signal to the gate electrode; and
a first conductive wire configured to be supplied with a signal synchronized with the drive signal,
wherein,
in a vertical direction perpendicular to the second surface, a first distance from the detection electrode to the second surface is equal to or less than a second distance from the semiconductor layer to the second surface,
a third distance from the drain electrode to the second surface is equal to or greater than the second distance,
the drain electrode is in contact with the semiconductor layer through a first contact hole and in contact with the detection electrode through a second contact hole,
the gate line extends in a horizontal direction along the second surface,
the first conductive wire extends in the horizontal direction between the gate line and the detection electrode in a plan view, and
the gate electrode, the gate line, and the first conductive layer are in a same layer.

US Pat. No. 10,713,461

DOUBLE SIDED SENSOR MODULE SUITABLE FOR INTEGRATION INTO ELECTRONIC DEVICES

IDEX Biometrtics ASA, Os...

1. A sensor assembly comprising:a core having first and second surfaces;
a flexible substrate having opposed first and second surfaces;
first conductive traces formed on a first part of the first surface of the flexible substrate, wherein the first conductive traces are generally parallel to one another;
second conductive traces formed on a second part of the first surface of the flexible substrate, wherein the second conductive traces are generally parallel to one another, and wherein the second conductive traces are generally parallel to the first conductive traces; and
third conductive traces formed on the second surface of the flexible substrate, wherein the third conductive traces are oriented transversely to the first and the second conductive traces, and wherein a first portion of the third conductive traces overlies the first conductive traces and a second portion of the third conductive traces overlies the second conductive traces;
wherein the flexible substrate is at least partially wrapped around the core such that the first conductive traces and the first part of the third conductive traces overlie the first surface of the core and the second conductive traces and the second part of the third conductive traces overlie the second surface of the core.

US Pat. No. 10,713,460

DISPLAY PANEL, METHOD FOR MANUFACTURING THE SAME, AND DISPLAY DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A display panel, comprising:a display substrate;
a fingerprint recognition driving circuit on the display substrate;
an encapsulation thin film covering the fingerprint recognition driving circuit and the display substrate; and
a fingerprint recognition structure on the encapsulation thin film and a fingerprint recognition detection circuit on the encapsulation thin film, wherein the fingerprint recognition structure comprises a plurality of fingerprint recognition scan lines extending in a row direction, a plurality of fingerprint recognition detection lines extending in a column direction, and a plurality of fingerprint recognition circuits; the plurality of fingerprint recognition scan lines intersect the plurality of fingerprint recognition detection lines to define a plurality of fingerprint recognition regions;
wherein each of the plurality of fingerprint recognition circuits is in one of the plurality of fingerprint recognition regions corresponding to the fingerprint recognition circuit;
the fingerprint recognition driving circuit is connected to the plurality of fingerprint recognition scan lines;
the fingerprint recognition detection circuit is connected to the plurality of fingerprint recognition detection lines and is configured to recognize fingerprints according to fingerprint recognition electrical signals from the fingerprint recognition detection lines.

US Pat. No. 10,713,459

FINGERPRINT SENSING DISPLAY APPARATUS

LG Display Co., Ltd., Se...

1. A display device comprising:an electroluminescence display panel including a display area configured to output sound and recognize a fingerprint;
an ultrasonic fingerprint sensor at a first area of the display area;
a cushion member surrounding the ultrasonic fingerprint sensor; and
a film-type speaker at a second area of the display area that is distinct from the first area,
wherein the cushion member is between the electroluminescence display panel and the film-type speaker.

US Pat. No. 10,713,458

INTEGRATED LIGHT EMITTING DISPLAY AND SENSORS FOR DETECTING BIOLOGIC CHARACTERISTICS

InSyte Systems, Newark, ...

1. A bio-sensor device comprising:a display portion having a light passing panel, wherein the display portion comprises a two-dimensional pixel array containing light emitting diodes emitting a first set of peak wavelengths and configured to display a full color image;
a two-dimensional array of light sources, distributed within the pixel array, configured to emit light through the light passing panel so as to be partially reflected and absorbed by blood in a person's finger overlying the display portion, the light sources being co-planer with the pixels and emitting light having at least a peak wavelength not within the first set of peak wavelengths;
a two-dimensional array of photodetectors distributed within the pixel array and arranged to detect light reflected back by a surface of the finger and the blood in the finger, the photodetectors generating first signals corresponding to the light reflected back, the photodetectors being co-planer with the pixels;
a controller coupled to the display portion and the array of light sources,
the controller being configured to control pixels in the display portion to emit light of one or more peak wavelengths during a first period of time to detect a fingerprint of the finger and capture a first image of the fingerprint, wherein the array of light sources do not emit light during the first period of time, and
the controller bring configured to control the array of light sources during a second period of time to detect the blood in the finger and capture a second image of the blood in the finger; and
detection circuitry coupled to the photodetectors configured for analyzing the first signals to detect the fingerprint using only the pixels energized in the display portion during the first period of time and to detect the blood in the finger using light emitted by at least the array of light sources during the second period of time.

US Pat. No. 10,713,457

TWO-DIMENSIONAL CODE GENERATION AND PROCESSING

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:identifying original content to be encoded in a two-dimensional (2D) barcode structure, wherein the 2D barcode structure includes at least an identification field and a data field, the identification field indicating a presence or absence of one or more data elements in the data field, and the identification field including one or more bits as a bitmap field, wherein a particular bit of the one or more bits in the bitmap field having a first value indicates a presence of a corresponding data element of the one or more data elements in the data field, and the particular bit having a second value, different from the first value, indicates an absence of the corresponding data element in the data field;
generating a 2D barcode associated with the original content based on at least the 2D barcode structure and the original content;
scanning the generated 2D barcode;
obtaining a character string represented by the scanned 2D barcode;
parsing the character string based on the 2D barcode structure to obtain one or more data elements that match a current service scenario; and
executing a service in the current service scenario based on the obtained one or more data elements.

US Pat. No. 10,713,456

COORDINATED ILLUMINATION AND IMAGE SIGNAL CAPTURE FOR ENHANCED SIGNAL DETECTION

Digimarc Corporation, Be...

1. A method for watermark signal detection comprising:illuminating an object with pulsed LED illumination, the pulsed LED illumination comprising illumination with plural different LED light sources;
obtaining an image frame, captured under illumination of one of the plural different LED light sources corresponding to a color channel in which a digital watermark is detectable; and
performing digital watermark signal detection on the image frame, wherein the digital watermark signal detection comprises detection of a synchronization pattern followed by extraction of data from pixels of the image frame based on detection of the synchronization pattern.

US Pat. No. 10,713,455

POINT-OF-SALE TERMINAL WITH MIRRORS ARRANGED AROUND SCAN ZONE

Toshiba Global Commerce S...

1. A point-of-sale (POS) terminal comprising:a surface having a predefined scan zone arranged proximately thereto, wherein the scan zone is dimensioned to at least partly receive a receptacle containing one or more items;
a first visual sensor having a predefined disposition relative to the surface, wherein a first field of view of the first visual sensor includes a direct first view of the scan zone;
one or more mirrors disposed near the surface, wherein the one or more mirrors are arranged around the scan zone to provide at least an indirect second view of the scan zone within the first field of view, and wherein when the receptacle is disposed in a stationary position in the scan zone, the second view includes a view of the one or more items relative to a surface of the receptacle; and
one or more computer processors configured to identify the one or more items using image analysis of first image information acquired by the first visual sensor.

US Pat. No. 10,713,454

SYSTEM FOR MONITORING THE STATE OF A SCREEN BASKET

Voith Patent GmbH, Heide...

1. A system for monitoring the state of a screen basket of a screen for treating a fibrous suspension, the system comprising:a cable-free identification unit assigned to the screen basket and disposed in a housing of the screen, said identification unit being disposed on or in an end ring of the screen basket or in a region of an opening of the screen to be closed by a cover; and
an external reading unit for non-contact reading of technical data relating to the screen basket from said identification unit and for producing a connection to a further external database containing data relating to the screen.

US Pat. No. 10,713,453

PROXY-BASED READER AUTHENTICATION BY TRUSTED AUTHORITY

Impinj, Inc., Seattle, W...

1. A proxy configured to verify, using a verification authority, a tag response from a Radio Frequency Identification (RFID) tag, the proxy comprising:at least one interface configured to communicate with the verification authority and with a plurality of RFID readers;
a memory configured to store a proxy key; and
a processor block coupled to the memory and the at least one interface and configured to:
receive the tag response from at least one RFID reader of the plurality of RFID readers;
transmit, to the verification authority, a request to verify an authenticity of the tag response;
receive a proxy challenge;
determine a proxy response based on the proxy challenge and the proxy key;
transmit the proxy response to the verification authority; and
receive, from the verification authority, verification of the authenticity of the tag response, wherein the verification authority determines the verification based on at least a challenge sent to the tag, a key associated with the tag, and the tag response.

US Pat. No. 10,713,452

SENSOR DATA CORRELATION SYSTEM

WashSense, Inc., Santa C...

1. A disambiguation method comprising:providing a station, the station including a station communication unit, a station control unit, and a station storage unit;
receiving transmissions of signals containing messages from beacons, the transmissions received with the station communication unit;
detecting IDs from the messages, the IDs detected by processing the messages with the station control unit;
detecting a received strength of the signals, the received strength detected with the station communication unit;
adding the IDs to a list, the list being stored in the station storage unit;
identifying one of the IDs as corresponding to an active user based on the list only having a single one of the IDs or based on a probability of the IDs being above a threshold, the active user being a user interfacing with the station; and
disambiguating the IDs on the list based on the probability of the IDs being below the threshold, the IDs being disambiguated with the station control unit, and wherein disambiguating the IDs includes instructing the beacons to include beacon sensor data within the messages of the signals, detecting station sensor data from a station sensor unit, and correlating the beacon sensor data with the station sensor data.

US Pat. No. 10,713,451

OPTICAL JUMPER

Hewlett Packard Enterpris...

1. An assembly comprising:an optical jumper including:
an optical cable;
a first connector optically coupled to a first end of the optical cable;
a second connector optically coupled to a second end of the optical cable; and
a tag coupled to the first connector at the first end of the optical cable and storing data identifying the optical cable, the first connector, and the second connector; and
a system including a tag reader to read the tag, the system disposed at the first end of the optical cable and communicatively coupled to the tag by the first connector with the first connector optically coupled to the system.

US Pat. No. 10,713,450

AMBIENT BACKSCATTER COMMUNICATION WITH DEVICES HAVING A CIRCUIT CARRIER WITH EMBEDDED COMMUNICATION EQUIPMENT

1. A communication device for participating in an ambient backscatter communication as a transmit communication device, the communication device, comprising:an antenna arrangement configured for scattering electromagnetic radiation, which has been emitted by a radio radiation source, towards a receive communication device;
an electronic circuit having a modulator unit coupled with the antenna arrangement and configured for modulating an impedance of the antenna arrangement in accordance with pieces of information to be transferred from the transmit communication device to the receive communication device; and
a component carrier, wherein at least a part of the antenna arrangement and/or at least a part of the electronic circuit is embedded within the component carrier;
wherein the antenna arrangement comprises:
a first antenna assembly being formed at a first surface of the component carrier; and
a second antenna assembly being formed at a second surface of the component carrier, wherein the second surface is opposite to the first surface,
wherein the first antenna comprises at least two first antenna elements and/or the second antenna assembly comprises at least two second antenna elements.

US Pat. No. 10,713,449

ANTENNA MODULE FOR A RFID READER

Elatec GmbH, Puchheim (D...

1. An antenna module for a RFID reader, wherein the antenna module is configured for operation with a plurality of transceivers of different impedance, and comprises:an antenna, implemented as a loop; and
at least two terminals for a transceiver,
wherein the antenna is contactable via at least a first terminal of the at least two terminals along at least two different contact points spaced apart from each other on the antenna along a conductor loop of the antenna,
wherein the transceiver is selectively connectable via the first terminal to one of the at least two contact points as a function of the impedance of the respective transceiver and/or the impedance of a RFID transponder to be read,
wherein all elements of the antenna module are arranged on a circuit board, and
wherein the circuit board further comprises a mounting site for the transceiver.

US Pat. No. 10,713,448

CONFIGURING SIGNAL DEVICES IN THERMAL PROCESSING SYSTEMS

Hypertherm, Inc., Hanove...

1. A plasma processing system, comprising:a torch comprising a torch consumable;
a fluid delivery system including a supply gas pressure regulator and a supply pressure sensor configured to sense a supply pressure of an inlet flow to the supply gas pressure regulator;
a gas supply line supplying gas from the gas pressure regulator to the torch; and
a controller comprising a processor and a memory, wherein the controller is operatively connected to the gas pressure regulator and the supply pressure sensor to receive a pressure signal from the supply pressure sensor and to provide a control signal to the gas pressure regulator to set an output pressure of the gas pressure regulator,
wherein the memory stores a lookup table establishing a correlation between supply pressures to the supply gas pressure regulator and respective levels of the control signal for one or more consumables, wherein the controller is configured to identify the consumable based on the supply pressure to the gas pressure regulator and the control signal provided to the gas pressure regulator.

US Pat. No. 10,713,447

BACKLIGHT POSITION CORRECTION DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A backlight position correction device, comprising:an assembly line; and
an alignment mechanism, configured to adjust a position of the backlight on the assembly line,
wherein the alignment mechanism comprises:
a fixing plate, disposed at a first side of the assembly line; and
a motion component, disposed at a second side of the assembly line opposite to the fixing plate, and configured to push a side of the backlight such that the backlight abuts against the fixing plate.

US Pat. No. 10,713,446

MULTIPLIER CIRCUIT, CORRESPONDING DEVICE AND METHOD

STMicroelectronics S.r.l....

17. A voltage-to-time converter circuit, comprising:a ramp generator configured to generate a periodic ramp waveform;
a comparator having a first input configured to receive said periodic ramp waveform and a second input configured to receive a first voltage signal; and
a gating circuit element coupled to an output of the comparator and gated by a clock signal, wherein an output from the gating circuit element produces a PWM-modulated signal having a duty-cycle proportional to the first voltage signal.

US Pat. No. 10,713,445

METHOD FOR PROVIDING TRANSLATION SERVICE, AND ELECTRONIC DEVICE THEREFOR

SAMSUNG ELECTRONICS CO., ...

1. A method for providing a translation service at an electronic device, the method comprising:receiving original text written in a first language;
displaying the original text in a first area of a display of the electronic device;
obtaining a translation created by translating the original text into a second language;
obtaining a first keyword of the second language based on the translation and a second keyword of the second language based on a user input, from the translation;
displaying the translation including the first keyword and the second keyword in a second area of the display in a manner that the first keyword and the second keyword are distinguished from other words in the translation;
obtaining first content of the second language related to the first keyword and second content of the second language related to the second keyword; and
displaying the obtained first content and the obtained second content in a third area of the display.

US Pat. No. 10,713,444

APPARATUS AND METHOD FOR PROVIDING TRANSLATIONS EDITOR

NAVER Webtoon Corporation...

1. An apparatus for providing a translations editor on a display screen of at least one user terminal, the apparatus comprising:a processor having a plurality of functional units for performing a plurality of corresponding functions, the functional units including a translations editor providing unit for transmitting the translations editor to the user terminal, the translation editor being configured to include,
a content data display unit configured to be displayed on the display screen of the user terminal for displaying text data and image data, which are extracted from content data, together, the content data display unit including an image data display unit on which the image data is displayed, and a text data display unit on which the text data is displayed; and
a text data editor unit configured to be displayed proximate to, and simultaneously with, the content data display unit on the display screen and including a first-language text display unit for displaying a first-language text included in the text data, a second-language text input unit in which a translation of the first-language text is input as a second-language text by a first user of the user terminal, and an other translations display unit, proximate the second-language text input unit, for displaying a translation of the first-language text submitted as a second-language text by at least one other user of at least one other user terminal,
wherein the translation input as the second-language text by the first user of the user terminal and the translation submitted as the second-language text by at least one other user of at least one other user terminal are in a same language,
wherein, the other translations display unit is displayed together with the first-language text display unit and the second-language text input unit, and when the second-language text is input in the second-language text input unit on the display screen by the first user, the input second-language text is reflected and displayed on the text data display unit of the content data display unit displayed on the display screen, and
wherein the content data display unit further comprises a font editor unit provided for each predetermined unit text of the second-language text for editing a font of the second-language text reflected and displayed on the text data display unit of the content data display unit.

US Pat. No. 10,713,443

MACHINE LEARNING MODEL FOR COMPUTER-GENERATED PATENT APPLICATIONS TO PROVIDE SUPPORT FOR INDIVIDUAL CLAIM FEATURES IN A SPECIFICATION

Specifio, Inc., Marina d...

1. A system configured to provide non-explicit support for individual claim features in computer-generated patent applications, the system comprising:one or more hardware processors configured by machine-readable instructions to:
obtain a plurality of patent documents, the plurality of patent documents including specifications and sets of claims, an individual patent document in the plurality of patent documents including an individual set of claims and an individual specification, the individual set of claims defining an individual claimed invention, the individual specification describing how to make and/or use the individual claimed invention;
parse the sets of claims into features, the features including main features and sub features, an individual main feature describing an individual primary element of the individual claimed invention, an individual sub feature providing additional description of an individual corresponding main feature;
identify individual features and corresponding descriptions in individual specifications of a same patent document as the individual sets of claims from which the individual features were parsed, wherein identifying the individual features includes identifying pairs of text spans, a given pair of text spans including a first text span and a second text span, the first text span covering one or more features of a claim, the second text span covering one or more portions of a given specification, the given pair of text spans describing or relating to same subject matter;
identify explicit support and non-explicit support in the descriptions in the specifications of the individual features of the claims, the explicit support including verbatim or near-verbatim recitation of the features in the specifications, the non-explicit support including description that is related to a given feature and lacks the verbatim or the near-verbatim recitation, wherein the explicit support is identified using one or more of an exhaustive comparison using Levenshtein distance, a locality-sensitive hashing with the Jaccard similarity metric or cosine similarity metric, or sum of word vectors;
train a machine learning model on input/output pairs derived from the plurality of patent documents, an individual input/output pair including an input and an output, the input including a given feature parsed from a given one of the plurality of patent documents, the output including a corresponding portion of the given one of the plurality of patent documents, the corresponding portion including the non-explicit support for the given feature, the corresponding portion lacking the explicit support for the given feature;
receive a previously unseen claim feature, the previously unseen claim feature being absent from the plurality of patent documents;
determine one or more sentences of never-been-seen-before computer-generated text using the machine learning model as trained and the previously unseen claim feature as input, the text conveying non-explicit support for the previously unseen claim feature; and
insert the one or more sentences of the non-explicit support for the previously unseen claim feature in a draft patent application proximal to explicit support for the previously unseen claim feature.

US Pat. No. 10,713,442

APPLIED ARTIFICIAL INTELLIGENCE TECHNOLOGY FOR INTERACTIVE STORY EDITING TO SUPPORT NATURAL LANGUAGE GENERATION (NLG)

NARRATIVE SCIENCE INC., ...

1. A method comprising:within an artificial intelligence (AI) natural language generation (NLG) system that automatically generates narrative stories about a data set, a processor (1) generating a narrative story using a story outline and an ontology, the story outline comprising at least one communication goal statement, wherein the ontology comprises a plurality of ontological objects that define a knowledge base for narrative story generation, wherein each of a plurality of the ontological objects are associated with an expression, wherein the narrative story expresses a communication goal associated with the at least one communication goal statement in natural language and comprises a first expression associated by the ontology with an ontological object that is referenced by the narrative story, (2) receiving an edit in the narrative story from a user to the first expression, wherein the edit replaces the first expression with a second expression, (3) tracing the edit to the referenced ontological object, (4) updating the ontology to associate the second expression with the referenced ontological object, and (5) generating another narrative story about a data set using the story outline and the updated ontology, wherein the step of generating the another narrative story includes selecting the second expression to express the referenced ontological object in the another narrative story.

US Pat. No. 10,713,441

HYBRID LEARNING SYSTEM FOR NATURAL LANGUAGE INTENT EXTRACTION FROM A DIALOG UTTERANCE

ServiceNow, Inc., Santa ...

1. An agent automation system, comprising:a memory configured to store a natural language understanding (NLU) framework and an intent/entity model that includes written sample utterances; and
a processor configured to execute instructions of the NLU framework to cause the agent automation system to perform actions comprising:
generating annotated utterance trees for a written user utterance and for the written sample utterances of the intent/entity model using a combination of rules-based and machine-learning (ML)-based components, wherein each annotated utterance tree includes nodes arranged in a dependency parse tree structure that represents a syntactic structure of a corresponding utterance, and wherein each of the nodes includes a word vector representing a semantic meaning of a word or phrase of the corresponding utterance;
generating a subtree vector for each subtree of the annotated utterance trees based on the word vectors of the nodes of each subtree of the annotated utterance trees; and
extracting an intent and/or entity from the written user utterance based on a comparison of the subtree vectors of the annotated utterance trees of the written user utterance to the subtree vectors of the annotated utterance trees of the written sample utterances.

US Pat. No. 10,713,440

PROCESSING TEXT WITH DOMAIN-SPECIFIC SPREADING ACTIVATION METHODS

1. One or more non-transitory electronic memory devices including computer instructions for performing a method comprising using a using a central processing unit (CPU) to create, from a text of one or more suicide notes containing natural language stored in a non-transitory electronic memory device, a semantic network having a plurality of nodes corresponding to sets of semantic and episodic concepts and weighted links between the sets of semantic and episodic concepts,the sets of semantic concepts consisting of a plurality of semantic concepts associated with a plurality of known words;
the sets of episodic concepts consisting of a plurality of episodic concepts associated with the semantic concepts; and
utilizing, using the CPU, spreading activation algorithms to refine the weighted links in the semantic network.

US Pat. No. 10,713,439

APPARATUS AND METHOD FOR GENERATING SENTENCE

Samsung Electronics Co., ...

1. A sentence generating apparatus comprising:a processor configured to:
generate a first sentence embedding vector by applying a first paraphrased sentence to a machine learning model;
extract, from the generated first sentence embedding vector, verification sentences in a first range;
compare the extracted verification sentences to an input sentence to determine a similarity between the first paraphrased sentence and the input sentence; and
selectively, based on a result of the determined similarity, output the first paraphrased sentence as a final paraphrased sentence similar to the input sentence.

US Pat. No. 10,713,438

DETERMINING OFF-TOPIC QUESTIONS IN A QUESTION ANSWERING SYSTEM USING PROBABILISTIC LANGUAGE MODELS

International Business Ma...

1. A computer-implemented method comprising:receiving, by a question answering system adapted to answer questions for a particular domain, an input question;
determining: (i) a first logarithm probability associated with the input question under an on-topic probabilistic language model for the particular domain, and (ii) a second logarithm probability associated with the input question under an off-topic probabilistic language model for the particular domain;
modelling, using a sigmoid function, a difference between the first logarithm probability and the second logarithm probability;
assigning, based, at least in part, on the modelled difference, a topic score to the input question; and
determining, based, at least in part, on the assigned topic score, whether the input question is off-topic with respect to the particular domain.

US Pat. No. 10,713,437

METHOD AND APPARATUS FOR IDENTIFYING QUESTIONABLE LINE BREAK CHARACTERS IN AN APPLICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for word detection in an application program, comprising:extracting a resource file from a multilingual application program installation package;
converting the resource file into a text file, the text file including characters corresponding to multiple language versions, wherein the characters are stored in the text file in an order corresponding to the multiple language versions, and each column of the text file corresponds to a language version;
disassembling the text file by extracting monolingual characters from the text file according to each of the multiple language versions, wherein the text file including the characters corresponding to the multiple language versions is divided into multiple texts including monolingual characters, and each of the multiple texts corresponds to one language version;
automatically storing the extracted monolingual characters as a language text file for each of the multiple language versions, wherein the language text file is automatically named based on the language version corresponding to the monolingual characters;
respectively invoking language detection tools associated with the multiple language versions;
respectively checking, by using a language detection tool associated with the language version corresponding to the monolingual characters in the language text file, the language text file to identify questionable character information;
obtaining resolution information of a terminal device;
determining whether a line break after a character in the language text file matches the resolution information based on a quantity of words included in each row or pixel length of characters included in each row; and
generating questionable line break character information corresponding to the character if the line break after the character in the language text file does not match the resolution information.

US Pat. No. 10,713,436

METHOD AND SYSTEM FOR SUGGESTING REVISIONS TO AN ELECTRONIC DOCUMENT

BLACKBOILER, LLC, Arling...

1. A method for suggesting revisions to text data, the method comprising:obtaining a text-under-analysis (“TUA”);
obtaining an original text from a plurality of original texts;
identifying an edit operation of the original text with respect to a final text associated with the original text, the edit operation having an edit-type classification;
selecting a similarity scoring metric from a plurality of similarity scoring metrics based on the edit-type classification;
generating a similarity score for the original text using the selected similarity scoring metric, the similarity score representing a degree of similarity between the TUA and the original text; and
creating an edited TUA (“ETUA”) by modifying the TUA consistent with the final text associated with the original text.

US Pat. No. 10,713,435

AUTOMATED ANALYSIS, CATEGORIZATION, AND BEHAVIOR PREDICTION OF COMPUTER SCRIPTS USING RULES-BASED PATTERN MATCHING

FMR LLC, Boston, MA (US)...

1. A system for automated analysis, categorization, and behavior prediction of computer scripts using rules-based pattern matching, the system comprising:a client computing device;
a server computing device coupled to the client computing device, the server computing device having a memory for storing computer-executable instructions and a processor that executes the computer-executable instructions to:
receive, from the client computing device, a request for analysis of a process flow decision;
identify one or more computer scripts that execute to generate the process flow decision, each computer script comprising one or more logical expressions, wherein at least one of the logical expressions comprises one or more sub-expressions and the logical expressions and the sub-expressions each comprise one or more parameters that return a true or false result when compared to each other using an operator;
for each identified computer script:
identify one or more text patterns in the computer script and categorize the computer script based upon the identified text patterns;
convert the computer script into an expression tree data structure;
traverse the expression tree data structure to determine one or more of the logical expressions that returns a true result;
parse each logical expression that returns a true result to identify one or more of the parameters of the logical expression that contributes to the true result;
generate a response to the request for analysis of the process flow decision, the response comprising a description of how the identified parameters of the logical expression contributed to the process flow decision; and
transmit the response to the request for analysis of the process flow decision to the client computing device.

US Pat. No. 10,713,434

TRANSFER OF CONTENT BETWEEN DOCUMENTS OF DIFFERENT STORAGE TYPES

Microsoft Technology Lice...

1. A computer-implemented method comprising:enabling display of a first version of a document stored in a first file type through a first endpoint, the document having a corresponding second version of the document stored in a second file type by a second endpoint, wherein the first and the second endpoints comprise different versions of a productivity application and are executed on distinct computing devices;
detecting a first operation applied to a first paragraph within the first version of the document;
computing a character count of an offset between a start of the first paragraph and a first position of the first operation;
after detecting the first operation applied to the first paragraph, processing content of the first paragraph to derive a conflict detection value usable by the second endpoint to detect a paragraph conflict; and
transmitting the first operation, an identifier of the first paragraph, the conflict detection value, and the character count to the second endpoint to prompt the second endpoint to apply the first operation to a second position in a second paragraph of the second version of the document subject to conflict detection using the conflict detection value, wherein the second position and the second paragraph correspond to the first position and the first paragraph in the first version of the document.

US Pat. No. 10,713,433

DOCUMENTATION DATA FILE WITH DETAIL LEVELS

BULL SAS, Les Clayes Sou...

1. A method of saving a file of documentation data intended for display on a screen, the method comprising:subdividing, via one or more processors, the documentation data into a plurality of data blocks;
associating, via one or more processors, first and second detail levels with a first of the plurality of data blocks, the second detail level with a second of the plurality of data blocks, and a third detail level with a third of the plurality of data blocks, wherein the third detail level is not associated with the first data block, wherein the third data block associated with the third detail level has different information than the first and second data blocks, and wherein the first, second, and third detail levels are different from one another; and
saving, via one or more processors, each of the first, second, and third data blocks with a respective level marker that relates to the associated one or more detail levels for the respective data block, each level marker to be compared with a display detail level that is selected by a user at least from a list comprising the first, second, and third detail levels for displaying data on the screen of a respective one or more data blocks corresponding to a detail level based on the comparison,
wherein, upon a user selecting either the first or second detail level, the user is not displayed the third data block and wherein, upon a user selecting the third detail level, the user is neither displayed the first nor the second data block,
wherein part of the documentation data file associated with the first data block associated with the first and second detail levels has a data structure that includes
a first data section that identifies the first data block within the file,
a second data section that stores a link marker of the first data block with at least two other blocks of the file, said second data section also including a data sub-section associated with said two other blocks of the file identifying a respective detail level of each of said two other blocks, said two other blocks associated with the respective detail level corresponding to the first data block associated with said first detail level and the first data block associated with the second detail level respectively, and
a third data section that stores content of the first data block.

US Pat. No. 10,713,432

CLASSIFYING AND RANKING CHANGES BETWEEN DOCUMENT VERSIONS

ADOBE INC., San Jose, CA...

1. In a digital medium environment for generating comparisons of digital document versions, a computer-implemented method of identifying substantive and non-substantive changes between digital document versions comprising:mapping a first plurality of sentences of a first version of a document to a second plurality of sentences of a second version of the document;
identifying changes between the first plurality of sentences and the second plurality of sentences as factual changes or paraphrasing changes by:
applying a deterministic classification algorithm to a plurality of mapped-sentence combinations; and
applying a supervised classification algorithm to unidentified mapped-sentence combinations of the plurality of mapped-sentence combinations, the unidentified mapped-sentence combinations comprising at least one change from the changes that the deterministic classification algorithm did not identify;
generating, for display within a graphical user interface, a document comparison of the first version and the second version that identifies the changes as factual changes or paraphrasing changes, the document comparison comprising a factual-change filter for identifying factual changes and a paraphrasing-change filter for identifying paraphrasing changes; and
based on receiving an indication of a selection of the factual-change filter or the paraphrasing-change filter, modifying the document comparison to identify factual changes using a first type of markings for changed text or paraphrasing changes using a second type of markings for changed text.

US Pat. No. 10,713,431

DIGITAL DOCUMENT PROCESSING BASED ON DOCUMENT SOURCE OR DOCUMENT TYPE

Accenture Global Solution...

1. A system, comprising:one or more devices to:
receive a plurality of documents,
the plurality of documents being received from multiple, different sources and being associated with multiple, different file formats;
provide, to a machine learning model, at least one attribute associated with the plurality of documents,
the at least one attribute including information identifying at least one of:
the multiple, different sources, or
the multiple, different file formats;
receive, as output from the machine learning model, information identifying a plurality of operations to perform based on the at least one attribute;
perform the plurality of operations on the plurality of documents to at least one of:
prepare the plurality of documents for digital processing,
obtain data included in the plurality of documents, or
determine information describing the plurality of documents;
store status information corresponding to the plurality of documents,
the status information identifying results of performing the plurality of operations;
receive an instruction pertaining to a document of the plurality of documents,
the instruction identifying an action to perform with regard to the document;
perform the action based on the instruction;
update the status information, as updated status information, to identify the action or a result of performing the action; and
provide the updated status information.

US Pat. No. 10,713,430

SYSTEMS AND METHODS FOR APPLYING LAYOUT TO DOCUMENTS

Google LLC, Mountain Vie...

1. A computer-implemented method for providing a template for a document, the method comprising:providing the document for presentation;
detecting an addition of a first object to the document, the first object comprising a text;
identifying a theme of the document based on a subject matter of one or more words included in the text of the first object;
generating a score for each document template in a plurality of document templates by ranking the document templates based on the theme of the document;
providing, for selection, a first subset of the plurality of document templates based on the respective score for each document template, wherein the first subset of the plurality of document templates comprises a first portion of the plurality of document templates;
identifying a user interaction with the document;
providing, for selection, a second subset of the plurality of document templates based on the first subset of the plurality of document templates and the user interaction with the document, wherein the second subset of the plurality of document templates comprises a second portion of the plurality of document templates;
receiving a selection of a document template from the second subset of the plurality of document templates; and
applying the selected document template to the document, wherein applying the selected document template comprises creating one or more additional objects defined by the selected document template that are missing from the document, wherein the one or more additional objects comprise content items for insertion into the document.

US Pat. No. 10,713,429

JOINING WEB DATA WITH SPREADSHEET DATA USING EXAMPLES

MICROSOFT TECHNOLOGY LICE...

1. A method for integrating web data into a document, the method comprising:obtaining, for a first data entry in a table containing a plurality of related data entries, a website address corresponding to the first data entry;
determining, based on the first data entry and the website address corresponding to the first data entry, a string transformation program for generating website addresses corresponding to the remaining related data entries contained in the table;
using the string transformation program to generate the website addresses corresponding to the remaining related data entries, wherein, for each of the remaining related data entries, the string transformation program generates the corresponding website address based on (i) at least one constant string from the URL of the website address corresponding to the first data entry and (ii) the related data entry or a transformation of the related data entry;
receiving, from a user via a user interface device, a selection of data displayed on a web page associated with the website address corresponding to the first data entry;
determining, based on the received selection of data, a data type for data to be extracted from (i) the web page associated with the website address corresponding to the first data entry, and (ii) web pages associated with the website addresses corresponding to the remaining related data entries; and
performing data extraction from (i) the web page associated with the website address corresponding to the first data entry, and (ii) the web pages associated with the website addresses corresponding to the remaining related data entries, based on the determined data type, wherein the extracted data is for integration into the table.

US Pat. No. 10,713,428

IMAGES ASSOCIATED WITH CELLS IN SPREADSHEETS

Microsoft Technology Lice...

1. A method for associating a plurality of images with at least one cell of a spreadsheet, the method comprising:associating a plurality of images with a single cell of a spreadsheet;
causing display of a first image of the plurality of images within the single cell of the spreadsheet at a first time;
transitioning to display of a second image of the plurality of images within the single cell of the spreadsheet at a second time, wherein the transitioning is based on a timer;
causing display of a user interface that provides a plurality of controls for manipulating the plurality of images; and
in response to receiving a user selection, spilling each of the plurality of images into a different cell of a range of cells of the spreadsheet, wherein the range of cells does not include the single cell.

US Pat. No. 10,713,427

SYSTEMS AND METHODS FOR PROVIDING A COMMUNICATION PROGRAM INTERFACE WITH AN INTEGRATED TABULAR DATA MANAGEMENT INTERFACE

Smartsheet Inc., Bellevu...

1. A computer-implemented method for concurrently managing data from a communication server and a tabular data server using a combined interface, the method comprising:retrieving, by a communication program executing on a computing device, a message from the communication server;
generating, by the communication program, an interface for presenting the message;
extracting, by the communication program, information from the message;
obtaining, by a supplemental interface added to the communication program, tabular data from the tabular data server using the extracted information;
determining, by the supplemental interface, a set of columns present in the obtained tabular data;
generating, by the supplemental interface, a form interface based on the obtained tabular data that includes a field for each column in the set of columns determined to be present in the obtained tabular data;
presenting, by the supplemental interface, the generated form interface;
determining, by the supplemental interface, a data type of a column of the set of columns determined to be present in the obtained tabular data, wherein the data type is a currency data type;
detecting, by the supplemental interface, a value having the data type within the extracted information;
automatically inserting, by the supplemental interface, the value within a field of the form interface associated with the column; and
transmitting, by the supplemental interface, the value to the tabular data server to be saved;
wherein the communication server and the tabular data server are separate from each other and the computing device.

US Pat. No. 10,713,426

SYSTEMS, COMPUTER-PROGRAM PRODUCTS AND METHODS FOR ANNOTATING MULTIPLE CONTROLLED VOCABULARY-DEFINED CONCEPTS IN SINGLE NOUN PHRASES

Elsevier B.V., Amsterdam...

1. A method of annotating an electronic text document, the method comprising:searching, by a computing device, the electronic text document for instances of congruent compound noun phrases comprising a head and a modifier;
determining that a first congruent compound noun phrase is found;
determining a preceding word that precedes the modifier of the first congruent compound noun phrase;
searching a controlled vocabulary for a second congruent compound noun phrase comprising the preceding word and the head of the first congruent compound noun phrase;
determining that the second congruent compound noun phrase is found in the controlled vocabulary; and
annotating the electronic text document with the second congruent compound noun phrase comprising the preceding word and the head of the first congruent compound noun phrase.

US Pat. No. 10,713,425

SYSTEM AND METHOD FOR GENERATING A PROPOSAL BASED ON A REQUEST FOR PROPOSAL (RFP)

Palo Alto Research Center...

1. A method for generating a draft proposal, comprising:obtaining a schema that represents a general model of a request for proposal (RFP);
generating a structured RFP from an RFP document representing an RFP by structuring one or more elements of the RFP document in the structured RFP based on the schema, wherein a respective element indicates a requirement of the RFP;
generating, corresponding to the RFP, a proposal outline comprising one or more sections, wherein a respective one of the one or more sections corresponds to one of the one or more elements;
obtaining a piece of content for a respective section of the one or more sections based on a requirement specified in an element corresponding to the section; and
inserting the piece of content in the section of the proposal outline.

US Pat. No. 10,713,424

AUTOMATED DOCUMENT CONTENT MODIFICATION

Microsoft Technology Lice...

1. A method comprising:receiving, on a user interface, a user input including an edit task to a first portion of a document, the edit task including a change to text in the first portion of the document;
determining, using a processor, that a second portion of the document includes text changeable by the edit task by matching a pattern of text in the second portion of the document to the text in the first portion of the document, the text in the second portion of the document differing from the text in the first portion of the document, wherein the pattern of text for the second portion of the document is identified from the first portion of the document based on historical data; and
automatically performing the edit task on the second portion of the document within the user interface based on the determination.

US Pat. No. 10,713,423

CONTENT ADJUSTMENT AND DISPLAY AUGMENTATION FOR COMMUNICATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for content adjustment, the method comprising:receiving, by a processor, a message from a user;
receiving a desired sentiment level for the message;
analyzing a sentiment of the message;
comparing the sentiment of the message to the desired sentiment level for the message to determine one or more suggested edits for the message;
providing the one or more suggested edits for the message to the user;
receiving, by the processor, an indicia from the user, wherein the indicia includes an adjustment to the desired sentiment level for the message; and
wherein the adjustment to the desired sentiment level for the message is inputted by the user utilizing a sentiment level sliding scale;
based at least in part on the adjustment to the desired sentiment level for the message, modifying at least one of the one or more suggested edits to the message.

US Pat. No. 10,713,422

METHOD OF EDITING DOCUMENT IN MOBILE TERMINAL AND MOBILE TERMINAL USING THE SAME

Samsung Electronics Co., ...

1. A method of attaching data in a mobile terminal, the method comprising:storing a plurality of data including text data and image data corresponding to a copying event;
sensing a first input for selecting an entry window of a screen where at least one data of the plurality of data is to be attached;
determining, in response to the first input, attribute information of the entry window, the attribute information of the entry window comprising at least one of a letter and an image;
extracting and displaying the text data from the plurality of data in response to the attribute information indicating a letter and the image data from the plurality of data in response to the attribute information indicating an image, wherein the displayed text data or the image data is displayed in a list; and
attaching, in response to sensing a second input for selecting, one of the at least one data at the entry window of the screen, wherein the second input also includes a drag input defining a shape of an attachment input in the displayed list corresponding to a portion of the at least one data attached to the entry window.

US Pat. No. 10,713,421

SYSTEMS AND METHODS FOR CONVERTING STATIC IMAGE ONLINE CONTENT TO DYNAMIC ONLINE CONTENT

Google LLC, Mountain Vie...

1. A computer-implemented method for generating different-sized content items, the method comprising:retrieving one or more graphical elements and one or more textual elements of a content provider;
determining textual characteristics of the one or more textual elements;
determining image display characteristics and color characteristics of the one or more graphical elements;
identifying a first size from a plurality of predefined sizes;
generating, responsive to identifying the first size and using the textual characteristics, the image display characteristics and the color characteristics, a first content item of the content provider having the first size, the first content item including a first subset of the one or more textual elements and the one or more graphical elements;
identifying a second size from the plurality of predefined sizes, the second size different from the first size; and
generating, responsive to identifying the second size and using the textual characteristics, the image display characteristics and the color characteristics, a second content item of the content provider having the second size, the second content item including a second subset of the one or more textual elements and the one or more graphical elements different from the first subset of the one or more textual elements and the one or more graphical elements.

US Pat. No. 10,713,420

COMPOSITION AND DECLARATION OF SPRITED IMAGES IN A WEB PAGE STYLE SHEET

Box, Inc., Redwood City,...

1. A method comprising:identifying a first cascaded style sheet (CSS) folder and an image folder, the CSS folder comprising a CSS file, the image folder comprising referenced images that correspond to a subset of a set of images;
determining the referenced images from the set of images, wherein the referenced images are referenced in one or more rules;
assembling the referenced images into a sprited image;
augmenting the sprited image into a first sprited image by placing at least one high-resolution image into a sprited layout, the at least one high-resolution image corresponding to a referenced image of the referenced images;
generating a modified CSS file that references the first sprited image rather than the referenced images; and
in response to a request from a user device for displaying a webpage comprising contents of the first sprited image,
determining whether the first sprited image referenced in the modified CSS file is to be resampled into a different resolution; and
rendering the webpage for the user device with at least the modified CSS file based at least in part upon a result of determining whether the first sprited image is to be resampled into the different resolution.

US Pat. No. 10,713,419

MOBILE TERMINAL AND CONTROL METHOD THEREOF

LG ELECTRONICS INC., Seo...

1. A mobile terminal, comprising:a touch screen; and
a controller configured to:
cause the touch screen to display a first chat screen associated with a first party, of a plurality of parties, wherein the first chat screen includes a plurality of chat items;
receive, via the touch screen, a touch corresponding to a predetermined scheme for scrolling;
scroll the plurality of chat items of the first chat screen in response to the touch;
cause the touch screen to display a graphic object, after displaying a last chat item of the plurality of chat items;
divide a display area of the touch screen into a first region and a second region, in response to a first input being received during the displaying of the graphic object;
cause the touch screen to stop displaying the graphic object, after the first input is received;
cause the touch screen to display the first chat screen with only a portion of the plurality of chat items within the first region, after the first input is received;
cause the touch screen to display identifiers of respective other parties, from among the plurality of parties, within the second region and after the first input is received;
cause the touch screen to display a second chat screen associated with a second party of the other parties, in response to receiving a second input with regard to the displayed identifier of the second party, wherein the second chat screen includes a plurality of chat items associated with the second party; and
cause the touch screen to stop the displaying of the first chat screen within the first region, in further response to the receiving the second input with regard to the displayed identifier of the second party.

US Pat. No. 10,713,418

AUTO COMPLETING DOMAIN NAMES COMPRISING MULTIPLE LANGUAGES

Go Daddy Operating Compan...

1. A system comprising a server, comprising a first computing device coupled to a network and including at least one processor executing instructions within a memory which, when executed, cause the server to:store, within a database coupled to the network:
a plurality of tokens including a first token, a second token, and a top level domain (TLD), for each of a plurality of registered domain names identified within a domain name system (DNS) zone file; and
a language dictionary translating each of the plurality of tokens from a first language to a second language;
generate a sum of a running total, associated with each of the plurality of registered domain names, of:
a TLD for each domain name;
at least one token within each domain name;
at least one language determined by the at least one token; and
at least one adjacent token;
receive, from a graphical user interface (GUI) on a client computing device, a request to register a domain name including the first token;
generate a list of candidate domain names including a first domain name including the first token, and a second domain name including the second token translated into the second language from the first token; and
modify, in real time, a user interface control within the GUI to display the list of candidate domain names.

US Pat. No. 10,713,417

CONTEXTUAL FONT FILTERING IN A DIGITAL MEDIUM ENVIRONMENT

Adobe Inc., San Jose, CA...

1. In a digital media environment to contextually determine available font styles, a method implemented by at least one computing device, the method comprising:receiving, by the at least one computing device, an input selecting text displayed in a user interface;
identifying, by the at least one computing device, one or more of a plurality of font features included in the selected text, the plurality of font features are typographical features referring to respective design elements of a font used to render the selected text;
identifying, by the at least one computing device, one or more of a plurality of font attributes included in the selected text, the plurality of font attributes are structural elements of a font used to render the selected text;
displaying, by the at least one computing device in the user interface, the one or more font features of the plurality of font features and the one or more font attributes of the plurality of font attributes included in the selected text;
displaying, by the at least one computing device in the user interface, the one or more font features of the plurality of font features and the one or more font attributes of the plurality of font attributes that are not included in the selected text;
receiving, by the at least one computing device, a user input via the user interface as selecting at least one font feature of the plurality of font features or the one or more font attributes of the plurality of font attributes that are not included in the selected text or deselecting at least one font feature of the plurality of font features or the one or more font attributes of the plurality of font attributes that are included in the text;
filtering, by the at least one computing device, a plurality of candidate font styles based on at least in part on the received user input; and
displaying, by the at least one computing device, the filtered plurality of candidate font styles in the user interface that are user selectable to modify the text.

US Pat. No. 10,713,416

SYSTEMS, DEVICES AND METHODS FOR FONT SIZE SELECTION

ECHOSTAR UKRAINE, L.L.C.,...

1. A method performed by a font size selection machine, the method comprising:visually displaying on the font size selection machine a visual test to a user regarding selection of font size to display for the user within a user interface of a computer application, the visual test including at least some visual components for electronic display to the user;
electronically receiving, on the font size selection machine, results of the visual test;
electronically selecting, on the font size selection machine, a font size to be displayed for the user within the user interface of the computer application based on the electronically receiving results of the visual test;
electronically selecting a font to be displayed for the user within user interfaces for a plurality of different devices based on the electronically receiving the results of the visual test provided on the font size selection machine that is one of the plurality of devices, enabling the user to be able to complete the visual test one time on the font size selection machine that is one of the plurality of devices and corresponding fonts selected as a result of the visual test to be applied or communicated for the user to all devices of the plurality of devices, without the user having to repeat the visual test on each device of the plurality of devices; and
before the visually displaying the visual test to the user regarding selection of font size, receiving, on the font size selection machine, an indication that the user is in a process of installing the computer application, and wherein the visually displaying the visual test to the user is performed by the font size selection machine at least in part in response to the receiving the indication that the user is installing the computer application.

US Pat. No. 10,713,415

AUTOMATED TESTING MATERIALS IN ELECTRONIC DOCUMENT PUBLISHING

Chegg, Inc., Santa Clara...

1. A method for delivering a testing document associated with an electronic document, the electronic document configured for rendering by browser applications executing on client devices of a plurality of users, the method comprising:extracting, from the electronic document, a set of testing elements, wherein the electronic document comprises a plurality of content layers, wherein the plurality of content layers includes related content, advertising content, social content, and user-generated content, and wherein the extracting the set of testing elements includes extracting from the plurality of content layers;
populating a template with the testing elements to generate the testing document, the template comprising a plurality of available regions and the testing document comprising a plurality of regions each populated with a testing element, wherein the regions of the testing document are configured for delivery to the users through the browser applications in association with the electronic document;
associating a set of delivery conditions with the regions of the testing document, the delivery conditions comprising a specified location in the electronic document at which one or more regions of the testing document are to be delivered to the users;
storing the testing document and the associated delivery conditions in an extended catalog database associated with the electronic document;
sending at least a portion of the electronic document for display to a user by a browser application executing on a device of the user; and
responsive to the user accessing the specified location in the electronic document associated with regions of the testing document, modifying a display of the electronic document to display one or more of the regions of the testing document to the user in association with the electronic document.

US Pat. No. 10,713,414

WEB PAGE DISPLAY METHOD, TERMINAL, AND STORAGE MEDIUM

Tencent Technology (Shenz...

1. A web page display method, comprising:sending by a terminal device having a processor and a memory, a web page access request to a first server, and obtaining a first web page data sent by the first server in response to the web page access request, wherein the memory stores computer readable instructions executed by the processor;
displaying the first web page data on a display screen of the terminal device using a first WebView component; and
triggered by detecting a user action of dragging the first WebView component to a bottom of the display screen while the first web page data is displayed:
creating a first display area at the bottom of the display screen;
sending a general request for supplemental information of the first web page data specifying a general preference for the supplemental information to a second server, wherein the general preference comprises a type of the supplemental information or a type of content of the first web page data;
obtaining second web page data from a second server that is different from the first server wherein the second web page data is determined by the second server based on the general preference, wherein the first web page data contains no linking reference to the second web page data; and
displaying the second web page data in the first display area at the bottom of the display screen by using a second WebView component that is independent of the first WebView component, wherein the first web page data and the second web page data are independent, and are displayed simultaneously on the display screen in a manner that simulates displaying the first web page data and second web page data as a single web page view.

US Pat. No. 10,713,413

IMAGE PROCESSING APPARATUS AND RECORDING MEDIUM

KONICA MINOLTA, INC., Ch...

1. An image processing apparatus comprising:an acquisition part for acquiring information on a pixel size of a display screen of said image processing apparatus;
a receiving part for receiving a display content of a web page that is to be displayed on the display screen of said image processing apparatus, the display content being all the content to be displayed on the display screen at one time;
a determination part for determining whether the display content is a size-fixed content that includes an attribute that fixes a display size of the display content to a specified fixed number of pixels; and
a display control part for displaying said display content on said display screen, on the basis of a determination result on the type of said display content,
wherein said display control part automatically overrides the display content attribute and enlarges said display content in conformity with the pixel size of said display screen to use the entire size of said display screen and displays said enlarged display content, when said display target content is determined to have a size-fixed content, and
said display control part displays said display content in accordance with a size specification included in said display content when said display target content is determined not to include an attribute that fixes a display size of the display content to a specified fixed number of pixels.

US Pat. No. 10,713,411

PHOTOLITHOGRAPHY MASK DESIGN-RULE CHECK ASSISTANCE

MARVELL ASIA PTE, LTD., ...

1. A computer-implemented method comprising:performing, by a computer processor of a computing device, a design-rule check on a photolithography-mask design file, the design-rule check comparing, to a set of design rules, geometric dimensions of a feature to be rendered onto a photolithography mask using the photolithography-mask design file;
determining, by the computer processor and responsive to performing the design-rule check, a violation of a rule contained within the set of design rules;
presenting, by the computer processor and via a display of the computing device, a list of one or more user-selectable solutions applicable to resolving the determined violation;
receiving, by the computer processor, a user input indicating a user-selected solution from the list of one or more user-selectable solutions;
resolving, by the computer processor, the violation of the rule contained within the set of design rules by updating the photolithography-mask design file, wherein updating the photolithography mask design file comprises adjusting the feature in accordance with the user-selected solution; and
outputting, by the computer processor, the updated photolithography-mask design file, the updated photolithography-mask design file enabling rendering of the feature onto the photolithography mask in conformance with the rule.

US Pat. No. 10,713,410

METHOD FOR LEGALIZING MIXED-CELL HEIGHT STANDARD CELLS OF IC

TAIWAN SEMICONDUCTOR MANU...

1. A method related to legalize mixed-cell height standard cells of an integrated circuit (IC), comprising:obtaining a global placement of the IC, wherein a plurality of standard cells of the IC are placed in the global placement;
moving each of the standard cells from a position to a nearest row in the global placement;
obtaining a displacement value of each of the moved standard cells in the global placement;
dividing the global placement of the IC into a plurality of windows according to the displacement values of the moved standard cells in each of the windows and a dead space corresponding to each of the moved standard cells in each of the windows, wherein the dead space is incapable of placing the standard cell;
removing all overlapping areas among the standard cells of each of the windows to obtain a detailed placement; and
manufacturing the IC according to the detailed placement,
wherein the standard cells have different cell heights in each of the windows.

US Pat. No. 10,713,409

INTEGRATED CIRCUIT DESIGN SYSTEM WITH AUTOMATIC TIMING MARGIN REDUCTION

Movellus Circuits, Inc., ...

1. An integrated circuit (IC) device comprising:a global clock source to generate a global clock signal;
multiple local clock sources, each local clock source providing a local clock signal for clocking a partitioned sub-design block in the IC device, each local clock source comprising a frequency generator to locally create a local clock signal within a respective sub-design block, the local clock signal based on the global clock signal, each local clock source comprising a local skew measurement circuit to measure local skew between the local clock signal and the global clock signal; and
a clock controller having inputs from the global clock source and the multiple local clock sources, the clock controller to (1) estimate skew, based on the measured local skew between each local clock source and the global clock source, and (2) generate respective control signals to adjust respective phases of each local clock signal to reduce the measured skew.

US Pat. No. 10,713,408

AWARE VARIABLE FILL PATTERN GENERATOR

TEXAS INSTRUMENTS INCORPO...

1. An integrated circuit, comprising:functional structures of a physical layer of the integrated circuit; and
a plurality of fill structures of the physical layer, each fill structure being conductively isolated from the functional structures and others of the fill structures, the fill structures including:
first fill structures having a first size, located in a first region having a first region area and a first fill density, the first fill density defined by a ratio of a first fill area divided by the first region area, the first fill area being an area occupied by the first fill structures in the first region; and
second fill structures having a second size, located in a second region different from the first region, the second region having a second region area and a second fill density, the second fill density defined by a ratio of a second fill area divided by the second region area, the second fill area being an area occupied by the second fill structures in the second region,
wherein the first size is different from the second size, or the first fill density is different from the second fill density.

US Pat. No. 10,713,407

STANDARD CELL AND SEMICONDUCTOR DEVICE INCLUDING ANCHOR NODES

TAIWAN SEMICONDUCTOR MANU...

1. A standard cell for a semiconductor device, the standard cell comprising:a plurality of features for performing a functionality of the standard cell;
a first sensitivity region adjacent to a first edge of the standard cell; and
anchor nodes linked to corresponding features of the plurality of features, wherein a number of anchor nodes linked to each feature of the corresponding features is based on a position of an end of each feature of the corresponding features relative to the first sensitivity region.

US Pat. No. 10,713,406

MULTI-DIE IC LAYOUT METHODS WITH AWARENESS OF MIX AND MATCH DIE INTEGRATION

The Regents of the Univer...

1. A method for optimizing a multi die implementation flow that in view of a mix-and-match die integration context for implementing a multi-die integrated circuit, the method comprising the steps of:partitioning a netlist of the mix-and-match die integration context into partitions using a priori process information of speed classifications of individual dies in the die integrations, wherein each partition will be assigned to a die;
placing each partition on a corresponding die;
synthesizing a clock tree of the integrated circuit; and
routing nets of the integrated circuit in accordance with said placing and synthesizing.

US Pat. No. 10,713,405

PARAMETER GENERATION FOR SEMICONDUCTOR DEVICE TRAPPED-CHARGE MODELING

SYNOPSYS, INC., Mountain...

1. A method for execution in at least one processor of at least one computer, the method for generating semiconductor device model parameters, the method comprising:(a) receiving semiconductor device performance data of a plurality (ns) of statistical instances of semiconductor devices, for each areal trapped charge density in a plurality (nq) of areal trapped charge densities, wherein at least some of the semiconductor device performance data is obtained, at least in part, from a data set acquired by measurement;
(b) extracting np model parameters from the semiconductor device performance data to produce a plurality (np*ns) of individual model instances each corresponding to the respective statistical instances for the plurality (nq) of areal trapped charge densities, thereby providing np×n×nq values that can be represented in a 3-D matrix and that characterizes response of a subject transistor to time-dependent degradation;
(c) modeling statistics of the extracted model parameters by processing the individual model instances to determine, for each areal trapped charge density:
moments describing non-normal marginal distributions of the extracted model parameters and
correlations between the extracted model parameters;
(d) generating semiconductor device model parameters using the moments determined and the correlations determined, for a selected areal trapped charge density; and
(e) using the semiconductor device model parameters generated to simulate a circuit to be fabricated with designs based on simulation.

US Pat. No. 10,713,404

CUSTOMIZABLE DEBUG AND PROFILE MONITORING OF RECONFIGURABLE SYSTEMS

XILINX, INC., San Jose, ...

1. A method, comprising:compiling source code corresponding to a kernel to form binary object code;
determining monitoring circuitry to form in logic based on received at least one of debug or profile preferences;
linking the monitoring circuitry and the kernel in a hardware design representing a reconfigurable integrated circuit (IC); and
generating, based on the hardware design, a bitstream for configuring the logic in the reconfigurable IC to implement the monitoring circuitry.

US Pat. No. 10,713,403

SELECTIVELY BYPASSING DESIGN PROCESS STEPS FOR A REGISTER-TRANSFER LOGIC (RTL) DESIGN IN AN ELECTRONIC DESIGN AUTOMATION (EDA) DEVELOPMENT ENVIRONMENT

XILINX, INC., San Jose, ...

13. A computer-implemented method comprising:tagging a circuit parameter in a set of circuit parameters with a design process tag in a plurality of design process tags, each design process tag being associated with a corresponding design process step in a plurality of design process steps;
receiving, by a state management engine, tagging information associated with the tagged circuit parameter in the set of circuit parameters;
determining, by the state management engine, whether alterations have been made to the tagged circuit parameter;
if alterations have been made to the tagged circuit parameter, then determining, by the state management engine, whether the tagged circuit parameter is fresh or stale for the associated design process step based on the design process tag;
if the tagged circuit parameter is determined to be fresh for the associated design process, then bypassing the associated design process before writing a device image.

US Pat. No. 10,713,402

MOLDING SYSTEM FOR PREPARING INJECTION-MOLDED ARTICLE

CORETECH SYSTEM CO., LTD....

1. A molding system for preparing an injection-molded article, comprising:a molding machine;
a mold disposed on the molding machine and having a mold cavity for being filled with a molding resin;
a processing module configured to generate an extension rate distribution and a shear rate distribution of the molding resin in the mold cavity based on a molding condition for the molding machine; wherein the extension rate distribution and the shear rate distribution of the molding resin are generated based in part on consideration of a geometry variation of the mold cavity; and
a controller coupled to the processing module and configured to control the molding machine with the molding condition using the generated extension rate distribution and the generated shear rate distribution of the molding resin,
wherein the controller is configured to control the molding machine to form the injection molded article based on the generated extension rate distribution and the generated shear rate distribution.

US Pat. No. 10,713,401

SURFACE SHAPE DEFECT GENERATING REGION ESTIMATING METHOD, SURFACE SHAPE DEFECT SOURCE REGION ESTIMATING METHOD, SURFACE SHAPE DEFECT GENERATING REGION ESTIMATING DEVICE, SURFACE SHAPE DEFECT SOURCE REGION ESTIMATING DEVICE, PROGRAM, AND RECORDING MEDIUM

NIPPON STEEL CORPORATION,...

1. A surface shape defect generating region estimating method for estimating generating regions of a surface shape defect of a deformation-processed product obtained by performing deformation processing with respect to a workpiece from a deformation processing starting point of time TSTART to a deformation processing ending point of time TEND, the method comprising:a first stress distribution obtaining process of obtaining first stress distribution ?(T1) which is distribution of a stress of the workpiece at a first working point of time T1 that is after the deformation processing starting point of time TSTART and before the deformation processing ending point of time TEND, by a finite element method;
a second stress distribution obtaining process of obtaining a second stress distribution ?(T2) which is distribution of a stress of the workpiece at a second working point of time T2 that is after the first working point of time T1 and before or at the same time as the deformation processing ending point of time TEND, by the finite element method;
a comparative stress distribution obtaining process of obtaining comparative stress distribution ?(T1, T2) which is distribution of a comparative stress of the workpiece based on comparison of the first stress distribution ?(T1) and the second stress distribution ?(T2);
a division comparative stress distribution obtaining process of obtaining division comparative stress distribution ?DIV(T1, 12) which is distribution of comparative stresses of each of divided regions DK, by dividing the comparative stress distribution ?(T1, T2) into a plurality of divided regions DK;
a surface shape defect generating region estimating process of estimating whether or not each of the divided regions DK is a generating region of the surface shape defect, based on a surface shape defect generation evaluation index ? acquired with respect to each of the divided regions DK, by using the division comparative stress distribution ?DIV(T1, T2); and
a process of performing a deformation process on the workpiece based on the estimating whether or not each of the divided regions DK is the generating region of the surface shape defect.

US Pat. No. 10,713,400

SYSTEM AND METHOD FOR EXECUTING A SIMULATION OF A CONSTRAINED MULTI-BODY SYSTEM

CMLABS SIMULATIONS INC., ...

1. A computer-implemented method for executing a simulation of a constrained multi-body system, the method comprising:simulating the constrained multi-body system by using a physics engine, the constrained multi-body system comprising articulated constraints;
associating the articulated constraints with a geometric stiffness matrix; the geometric stiffness matrix defining a geometric stiffness, wherein the geometric stiffness defines how a direction of forces in the constrained multi-body system changes due to instantaneous motion of one or more links associated with the constrained multi-body system; and
using the geometric stiffness matrix as part of a stability analysis in order to determine damping values, the damping values being calculated at each time step of the simulation, the damping values being determined so as to achieve stability of the simulation of the constrained multi-body system.

US Pat. No. 10,713,398

ITERATIVE AND REPEATABLE WORKFLOW FOR COMPREHENSIVE DATA AND PROCESSES INTEGRATION FOR PETROLEUM EXPLORATION AND PRODUCTION ASSESSMENTS

Saudi Arabian Oil Company...

1. A computer-implemented method, comprising:initializing a workflow of a plurality of model simulation processes, wherein the plurality of model simulation processes comprise, in order: structural modeling, stratigraphic modeling, petroleum system modeling, fluid flow modeling, petro-elastic modeling, and forward seismic modeling, wherein the model simulation process are associated with a plurality of workflow parameters, wherein each model simulation process is associated with a respective local objective function, and wherein the respective local objective functions combine to form a global objective function for the workflow;
starting with a first model simulation process and for each of the plurality of model simulation processes in order:
preparing input data for the model simulation process, wherein the prepared input data comprises at least one of raw measured data or an output of a previous model simulation process in the workflow;
executing the model simulation process using the prepared input data;
computing a mismatch value by using the respective local function to compare an output of the model simulation process to the raw measured data for the model simulation process;
updating the global objective function with the computed mismatch; and
sending the prepared input and the output of the model simulation process to a subsequent model simulation process in the workflow; and
executing an optimization process to predict new values for at least one of the workflow parameters of the plurality of model simulation processes to reduce the value of the global objective function.

US Pat. No. 10,713,397

METHOD AND APPARATUS FOR MODELING A TARGET OBJECT BASED ON PARTICLES

Samsung Electronics Co., ...

1. A method of modeling a target object, the method comprising:obtaining attribute values of each target particle of a plurality of target particles corresponding to the target object;
generating a coarse particle by combining sets of target particles where in each set the target particles are positioned within a predetermined distance of each other,
wherein course attribute values of the coarse particle are generated based on a weighted sum with respect to attribute values of the target particles included in respective sets;
modeling a movement of the target object based on the coarse particle to generate updated coarse attribute values of the coarse particle;
redefining the target particles of the set based on a result of the modeling, by identically transferring the updated attribute values of the coarse particle to the target particles of the set; and
generating a visualization of the target object based on the updated attribute values transferred to the target particles of the set.

US Pat. No. 10,713,396

METHOD OF ALIGNING INTRA-ORAL DIGITAL 3D MODELS

3M INNOVATIVE PROPERTIES ...

1. A method for modifying and aligning a digital 3D model of teeth, comprising steps of: receiving a digital 3D model of teeth with associated gingiva represented by a 3D mesh in random alignment; aligning the digital 3D model of teeth with associated gingiva with a desired axis within a 3D coordinate system; after the aligning step, removing the associated gingiva from the digital 3D model, comprising steps of: detecting a gum line in the digital 3D model; fitting a surface to the detected gum line; and removing vertices of the mesh on a side of the surface corresponding with the gingiva to remove the gingiva from the digital 3D model; and re-aligning the digital 3D model without the gingiva with the desired axis within the 3D coordinate system;wherein the detecting step comprises using a classification function based on mesh surface shape properties of the mesh to detect the gum line.

US Pat. No. 10,713,395

METHOD FOR DESIGNING AND MANUFACTURING CUSTOM-MADE FURNITURE USING COMPUTER, SYSTEM, AND PROGRAM THEREFOR

DOMANS, INC., Tokyo (JP)...

1. A method for designing part members of a furniture product formed by combining a plurality of part members by using a computer, the method comprising:reading out data of part members stored in a memory to display a first part member and a second part member, each having a rectangular parallelepiped shape, and locating the first part member and the second part member on a screen such that a first face of the first part member and a second face of the second part member face in parallel with each other;
setting a XY coordinate on each face of the first part member and the second part member such that a corner of a rectangle of each face of the first part member and the second part member is set as an origin, and two sides extending orthogonally from the corner are set as a X axis and Y axis, wherein a first position on the first face is designated by the XY coordinate;
perpendicularly projecting the first face of the first part member onto the second face of the second part member and calculate a two dimensional positional relationship between the first face and the second face, and, based on the calculated positional relationship between the two faces, calculate a position on the second face that corresponds to the first position on the first face and designate the calculated position as a second position by the XY coordinate on the second face;
inputting a selected machining on the first position on the first face to transfer and input the input machining to the second position on the second face; and
outputting data of dimensions of the first part member and the second part member together with the data of machining that are provided on the six faces of the first part member and the second part member.

US Pat. No. 10,713,394

FILTERING COMPONENTS COMPATIBLE WITH A COMPUTER-MODELED STRUCTURE

1. A method of assisting a designer with selecting a component compatible with a feature of a structure represented in a computer model, said method being carried out by a compatible components system programmed to carry out the steps of the method, the method comprising:receiving a computer assisted design (CAD) model containing a representation of the structure, the representation of the structure further including the feature;
receiving, from a designer, an identification of the feature of the structure with which the component is to be associated;
interrogating the CAD model to extract first attribute information of the feature from the CAD model, the first attribute information belonging to a first type of attribute information;
retrieving, from at least a candidate component library a plurality of component types, wherein each component type of the plurality of component types is compatible with the first attribute information;
displaying the plurality of component types to the designer;
receiving, from the designer:
a selection of a component type of the plurality of component types;
an identification of a second attribute type; and
a command to filter components according to the second attribute type;
interrogating the CAD model to extract second attribute information of the feature from the CAD model, the second attribute information belonging to the second attribute type;
retrieving, from at least a candidate component library, a plurality of candidate components belonging to the component type;
from among the plurality of candidate components, identifying at least one component compatible with the feature of the structure, wherein identifying the at least one component further comprises:
performing a filtering operation, wherein performing the filtering operation further comprises, for each candidate component of the plurality of candidate components:
identifying component attribute information of the candidate component, wherein the component attribute information belongs to the second attribute type;
comparing the component attribute information to the second attribute information; and
eliminating the candidate component from the plurality of candidate components if the first component attribute information is not compatible with the second attribute information;
displaying the at least one compatible component compatible with the feature of the structure to a designer;
receiving, from the designer, a selection of a chosen component from the at least one component compatible with the feature of the structure; and
modifying the CAD model to include the chosen component combined with the feature, wherein modifying the CAD model further comprises:
identifying at least a dimension of the feature that does not match at least a dimension of the component;
modifying the CAD model to match the at least a dimension of the feature of the structure to the at least a dimension of the component;
identifying a plurality of matching features, each matching feature of the plurality of features matching the feature of the structure;
modifying the CAD file to indicate the plurality of matching features by modifying a display color of each feature of the plurality of matching features to a first color;
receiving from the user a selection of at least a matching feature, of the plurality of matching features, to modify;
modifying the CAD file to indicate the at least a matching feature by modifying a display color of the at least a matching feature to a second color;
receiving a user command to modify the at least a matching feature; and
modifying the CAD file to match at least a dimension of the at least a matching feature to at least a dimension of the component and to combine a component matching the component with each feature of the at least a matching feature.

US Pat. No. 10,713,393

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An information processing system having a first information processing apparatus for transmitting, by using VNC (Virtual Network Computing), image information of a screen displayed on a display unit of the first information processing apparatus, and a second information processing apparatus for receiving and displaying the transmitted image information,wherein the first information processing apparatus comprises:
a first memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
store the image information into a memory;
receive a connection request from the second information processing apparatus;
combine an image of a pointer with the image information and cause the memory to store image information with which the image of the pointer has been combined in a case where the connection request has been received from the second information processing apparatus;
transmit the image information with which the image of the pointer has been combined;
display the image information with which the image of the pointer has been combined; and
when a screen for inputting information having confidentiality is displaying on the display unit of the first information processing apparatus, transmit image information of the screen for inputting the information having confidentiality to the second information processing apparatus and display the image information of the screen for inputting the information having confidentiality on the display unit without displaying the image of the pointer, wherein the transmitted image information does not include the image of the pointer, and
wherein the second information processing apparatus comprises:
a second memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
transmit to the first information processing apparatus an input event resulting from an operation by a user;
receive the image information transmitted from the first information processing apparatus; and
cause a display unit of the second information processing apparatus to display the image information.

US Pat. No. 10,713,392

NETWORK INTERFACE DEVICE AND METHOD

XILINX, INC., San Jose, ...

1. A network interface device comprising:an integrated circuit device comprising at least one processor; and
at least one memory comprising:
a first memory area for storing computer code instructions comprising operations performable by the at least one processor;
a second memory area for storing dynamic state comprising run time variables updated in response to execution of the computer code instructions in the first memory area, wherein the first memory area is partitioned from the second memory area,
wherein said integrated circuit device is configured to execute a hash function over at least some of the computer code instructions in the first memory area; and
wherein said integrated circuit device comprises a resistant part configured to store code associated said hash function.

US Pat. No. 10,713,391

TAMPER PROTECTION AND VIDEO SOURCE IDENTIFICATION FOR VIDEO PROCESSING PIPELINE

Ricoh Co., Ltd., Tokyo (...

1. A computer-implemented method comprising:receiving, at a producer, a video object;
computing, at the producer, a digital signature based on content of the video object;
adding, at the producer, identification information of the producer to the digital signature of the video object, the producer being identified as a source of the video object that transmits the video object to a destination;
transmitting the video object along with the digital signature from the producer to a first consumer;
authenticating, at the first consumer, the content and source of the video object based on the digital signature;
generating, at the first consumer, a second digital signature based on the content of the video object;
adding, at the first consumer, identification information of the first consumer to the second digital signature of the video object, the first consumer being identified as the source of the video object that transmits the video object to a destination; and
transmitting the video object along with the second digital signature to a second consumer, wherein the video object is authenticated, at the second consumer, based on the second digital signature to determine whether the source of the video object is the first consumer.

US Pat. No. 10,713,390

REMOVING SENSITIVE CONTENT FROM DOCUMENTS WHILE PRESERVING THEIR USEFULNESS FOR SUBSEQUENT PROCESSING

Microsoft Technology Lice...

1. One or more computing devices comprising:a data store that maps different selection factors to different document modification strategies, the different document modification strategies specifying different document modification rules for automated transformation of sensitive content;
a processing device; and
a storage resource storing machine-readable instructions which, when executed by the processing device, cause the processing device to:
initiate a document processing function in response to receipt of one or more triggering events, to provide an initiation instruction;
retrieve one or more original documents for processing in response to the initiation instruction;
based at least on a particular selection factor associated with a type of machine-trained model to be produced by a recipient entity, select, from the data store, a particular document modification strategy for use in transforming sensitive content in the one or more original documents, the particular document modification strategy specifying one or more particular document modification rules that preserve information in the one or more original documents that is suitable for producing the type of machine-trained model;
transform sensitive content in the one or more original documents in accordance with the one or more particular document modification rules associated with the particular document modification strategy to provide one or more modified documents that preserve formatting and structure associated with the one or more original documents; and
forward the one or more modified documents to the recipient entity over a communication conduit.

US Pat. No. 10,713,389

CONTROL INPUT FILTERING

Lenovo (Singapore) Pte. L...

1. A method, comprising:accepting, at a natural user interface input component of an information handling device, input of a user within proximity of the natural user interface input component;
identifying, using a processor, the input of the user as controlling input, wherein the controlling input controls an application running on the information handling device;
determining that the controlling input comprises a permissible control action for an application running on the information handling device by determining that the user providing the controlling input has control over the application as compared to another user within proximity of the natural user interface input component providing controlling input, wherein the determining comprises classifying the controlling input based upon the nature of the controlling input, and, determining, from the classification, that the controlling input must be provided by a user having control over the application in order to commit the permissible control action;
the determining comprising (i) identifying the user and the another user, (ii) determining which of the user and the another user has control over the application utilizing one or more control factors associated with the controlling input, the control factors being previously set within the application and identifying a controlling user from between the user and the another user, who has control over the application and (iii) that the controlling input is provided by the controlling user, wherein the control factors are determined from natural user information obtained by the natural user interface input component;
committing, using a processor, the permissible control action; and
re-assigning controlling user status to the another user upon no longer detecting the controlling user within proximity to the natural user interface input component.

US Pat. No. 10,713,388

STACKED ENCRYPTION

Polyport, Inc., Atlanta,...

14. A method for reading a stacked file having an encrypted file portion and an unencrypted file portion, the method comprising:creating a sandbox within portion of volatile memory and nonvolatile memory of a machine;
encapsulating an instance of an application within the sandbox;
decrypting, using a kernel driver installed on the machine, the encrypted file portion; and
allowing communications into and out of the sandbox with the use of an application programming interface.

US Pat. No. 10,713,387

CONSENT CONVERSION OPTIMIZATION SYSTEMS AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A computer-implemented data processing method for optimizing provision of consent to the use of one or more cookies at a particular web domain by one or more users accessing the particular web domain, the method comprising:receiving, by one or more processors, a request to initiate a cookie consent interface consent conversion test for the particular web domain, the request comprising:
the domain name;
a first selection of a first consent interface template variant;
a second selection of a second consent interface template variant; and
at least one success criteria;
in response to receiving the request, initiating, by one or more processors, the cookie consent interface consent conversion test for the particular web domain by:
presenting, to a first portion of the one or more users accessing the particular web domain, the first consent interface template variant;
presenting, to a second portion of the one or more users accessing the particular web domain, the second consent interface template variant;
receiving, by one or more processors, for each respective user of the first portion of the one or more users accessing the particular web domain, first consent data via the first consent interface template variant, wherein the first consent data comprises:
data indicating that a first user has not consented to the use of at least one of the one or more cookies;
receiving, by one or more processors, for each respective user of the second portion of the one or more users accessing the particular web domain, second consent data via the second consent interface template variant;
analyzing, by one or more processors, the first consent data and the second consent data to determine a more successful consent interface template of the first consent interface template variant and the second consent interface template variant based at least in part on the at least one success criteria;
in response to determining the more successful consent interface template of the first consent interface template variant and the second consent interface template:
completing the cookie consent interface consent conversion test; and
presenting, by one or more processors, the more successful consent interface template to any subsequent user that accesses the particular web domain after completing the cookie consent interface consent conversion test for at least a particular length of time;
receiving, by one or more processors, a first request from the first user to perform one or more functions at the particular web domain, the one or more functions requiring consent to the use of the at least one of the one or more cookies; and
in response to receiving the first request:
determining that the one or more functions are not possible based on the first consent data indicating that the first user has not consented to the use of the at least one of the one or more cookies; and
automatically re-prompting the first user to provide the consent to use the at least one of the one or more cookies via the more successful consent interface template.

US Pat. No. 10,713,386

METHOD AND SYSTEM FOR PROTECTING USER PRIVACY

Arrive Group, Inc., Lexi...

1. A method comprising the following steps:a. reading one or more data records, each referencing at least one of {users and other persons};
b. identifying, responsive to the reading, connected users wherein any of the users is connected to any other of the users, and, optionally, connected persons wherein any of the users is connected to any of the other persons;
c. reading personal data of the connected users and/or receiving updates comprising personal data of the connected users;
d. comparing the personal data of a first user (User1) and the personal data of at least one of the connected users connected to the User1;
e. identifying, responsive to the comparing, matching users wherein the personal data of the User1 partially or completely matches the personal data of one or more of the connected users connected to the User1;
f. adding, responsive to the identifying, at least one of the matching users to a MatchingList1;
g. creating a NonMatchingList1 of elements chosen from at least one of: {the connected users connected to the User1 and the connected persons connected to the User1}, optionally exclusive of the MatchingList1;
h. transmitting an electronic communication to the User1;
i. presenting to the User1, responsive to the transmitting, an ObfuscationList1 comprising one or more elements from the MatchingList1 mixed indistinguishably with one or more elements from the NonMatchingList1, wherein the User1 is unable to identify which elements in the ObfuscationList1 came from the MatchingList1 and which came from the NonMatchingList1;
j. receiving, from the User1, an electronic communication comprising a selection of zero or more elements from the ObfuscationList1;
k. performing, for each of one or more of the matching users in the selection, at least one operation chosen from: {repeating one or more of the preceding steps, identifying that the matching user pre-approved the User1, and identifying that the matching user pre-approved an affiliation in common with the User1};
l. identifying, responsive to the performing, mutually-selected users;
m. transmitting one or more electronic communications to one or more of the mutually-selected users: the receiving users; and
n. presenting, responsive to the transmitting, to at least one receiving user an identifying attribute of at least one of their mutually-selected users.

US Pat. No. 10,713,385

POSITION DATA PSEUDONYMIZATION

International Business Ma...

1. An apparatus for position data pseudonymization, the apparatus comprising:a processor with programmable circuitry, and
one or more computer readable mediums collectively including instructions that, when executed by the processor or the programmable circuitry, cause the processor or the programmable circuitry to:
generate a sequence of relative positions from a sequence of absolute positions of a moving object;
randomize the sequence of relative positions using at least a sequence of random numbers generated from at least one seed;
in response to receiving an analytical job comprising the at least one seed, restore the sequence of relative positions from the randomized sequence of relative positions; and
in response to receiving an analytical job comprising both the at least one seed and the at least one absolute position derived from the sequence of absolute positions, restore the sequence of absolute positions from the randomized sequence of relative positions.

US Pat. No. 10,713,384

METHODS AND APPARATUS FOR TRANSFORMING AND STATISTICALLY MODELING RELATIONAL DATABASES TO SYNTHESIZE PRIVACY-PROTECTED ANONYMIZED DATA

Massachusetts Institute o...

1. A computer-implemented method for storing and retrieving data in a computer memory to improve the functionality of a computer comprising the computer memory by protecting the privacy of first data contained in a relational database stored in the computer memory, the method comprising:A) transforming the relational database to provide a restructured relational database and generate, via at least one first processor of the computer, a statistical model of the restructured relational database; and
B) synthesizing, via the at least one first processor of the computer or another processor of another computer, anonymized data based on the statistical model generated in A) of the restructured relational database, wherein the anonymized data statistically mimics but does not duplicate at least a portion of the first data in the relational database and thereby protects the privacy of at least the portion of the first data.

US Pat. No. 10,713,383

METHODS AND SYSTEMS FOR ANONYMIZING GENOME SEGMENTS AND SEQUENCES AND ASSOCIATED INFORMATION

1. A method for safeguarding at least some associated information that is associated with at least some of one or more genome sequences by processing the at least some of the one or more genome sequences and the at least some of the associated information, wherein the method comprises the steps of:(a) receiving the at least some of the one or more genome sequences and the at least some of the associated information; wherein the one or more genome sequences and the associated information are denoted as original data;
(b) segmenting the at least some of the one or more genome sequences into one or more segments of nucleic acid sequences;
(c) organizing aspects of the at least some of the associated information into organizational units by one or more of: dividing the at least some of the associated information into subfields, categorizing the at least some of the associated information into categories, or generalizing the at least some of the associated information into different subfields;
(d) generating a linkage record or updating an existing linkage record; wherein the linkage record or the existing linkage record comprises a plurality of unique linkage record identifiers, wherein each unique linkage record identifier selected from the plurality of unique linkage record identifiers points to a specific organizational unit selected from the organizational units or points to a given segment of nucleic acid sequence selected from the one or more segments of nucleic acid sequences; the linkage record or the existing linkage record is a set of instructions for mapping one or more of the at least some of the one or more genome sequences, or the one or more segments, to the at least some of the associated information, the organizational units, the subfields, the categories, or the different subfields; and
(e) non-transitory storing in one or more storage units the linkage record or the existing linkage record and also one or more of: the at least some of the one or more genome sequences, the at least some of the associated information, the one or more segments, or at least some of the organizational units.

US Pat. No. 10,713,382

ENSURING CONSISTENCY BETWEEN CONFIDENTIAL DATA VALUE TYPES

Microsoft Technology Lice...

1. A system comprising:a non-transitory computer-readable medium having instructions stored thereon, which, when executed by a processor, cause the system to:
obtain an anonymized set of confidential data values of a first confidential data type;
obtain an anonymized set of confidential data values of a second confidential data type;
determine a multiplier following a log-normal distribution for the anonymized set of confidential data values of the first confidential data type;
perform smoothing independently for the anonymized set of confidential data values of the first confidential data type and the multiplier, wherein the smoothing comprises modification of at least one confidential data value of the first confidential data type and the multiplier; and
compute percentiles for the anonymized set of confidential data values of the second confidential data type using the smoothed anonymized set of confidential data values of the first confidential data type and the smoothed multiplier.

US Pat. No. 10,713,381

METHOD AND APPARATUS FOR SECURELY CALLING FINGERPRINT INFORMATION, AND MOBILE TERMINAL

GUANGDONG OPPO MOBILE TEL...

1. A method for securely calling fingerprint information, comprising:generating a first unique identification of an application corresponding to a unique identification public key of the application when installing the application;
storing, using a TrustZone application having administrator rights required to access a security zone of a TrustZone environment, the first unique identification in the security zone of the TrustZone environment;
receiving a request for calling the fingerprint information sent by a requesting application;
accessing, using the TrustZone application, the security zone of the TrustZone environment to obtain the first unique identification, and matching a second unique identification, received from the requesting application, with the first unique identification, and determining that the requesting application is a legitimate application when the second unique identification is matched with the first unique identification successfully; and
allowing the requesting application to call the fingerprint information when it is determined that the requesting application is the legitimate application.

US Pat. No. 10,713,380

SECURE DATA JOINS IN A MULTIPLE TENANT DATABASE SYSTEM

Snowflake Inc., San Mate...

1. A system, comprising:a memory; and
one or more processors operatively coupled to the memory, the one or more processors to:
determine data stored in a first account to be compared with data stored in a second account;
determine a function for generating a secure join key, wherein the secure join key comprises a hash string that hashes a first salted value from the first account and a second salted value from a second account, and wherein the secure join key is based on:
a data entry of the first account and a salt string associated with the first account, the data entry of the first account and the salt string associated with the first account included in the first salted value; and
a data entry of the second account and a salt string associated with the second account, the data entry of the second account and the salt string associated with the second account included in the second salted value, wherein original non-hashed or non-salted data cannot be identified by the first account or the second account based on the secure join key; and
provide the secure join key to at least one of the first account or the second account.

US Pat. No. 10,713,379

DISTRIBUTED STORAGE SYSTEM FOR LONG TERM DATA STORAGE

1. A system for facilitating efficient long-term data storage system, the system comprising:at least one storage site, the at least one storage site comprising:
one or more processing devices; and
a non-transitory computer readable storage medium storing program instructions that are executed by the one or more processing devices, causing the one or more processing devices to implement the following:
a storage delegate configured to:
receive a data object from a first at least one of a user or a client;
store the data object associated with the first at least one of a user or a client on one or more of a plurality of data storage nodes, and
a site control application configured to:
receive a request from the storage delegate to authenticate the storage delegate request;
associate the storage delegate request with the first at least one of a user or a client;
route the storage delegate request and data object to a second at least one of a user or client to be validated;
receive the storage delegate request and data object from the second at least one of a user or client and authenticate the validation by the second at least one of a user or client;
queue operational requests for data object management;
manage operational request queues granting ordered continuity for requests, and
wherein the second at least one of a user or client is further configured to:
discover an encryption key that is associated with the data object;
read the contents of the storage delegate request and the data object with any encryption removed;
authenticate that the storage delegate request and the data object is valid and contains proof of origination by the first at least one of a user or client;
augment the data object by writing the encryption key to the data object in such a manner that the encryption key can only be discovered by other users and/or clients that by policy should be privy to the data object; and
apply proof of validation to the data object by the second at least one of a user or client.

US Pat. No. 10,713,378

TECHNIQUES FOR EVENTUALLY CONSISTENT INHERITANCE PROPAGATION FOR NESTED CONTENT ITEM NAMESPACES

DROPBOX, INC., San Franc...

1. A method comprising:receiving a request from a client computer to update an access permission associated with a specific namespace in a nested namespace structure for a user,
the specific namespace being associated with a group of users,
wherein the nested namespace structure includes one or more child namespaces of the specific namespace,
the request including a requested level of the access permission;
causing updating of the access permission associated with the specific namespace for the user;
identifying the specific namespace as a current namespace; and
performing an iterative process having the following steps until a termination criterion is satisfied:
determining an updated level of the access permission associated with the current namespace for the user for propagation to each of the one or more child namespaces based on comparing a current level of the access permission associated with the current namespace for the user and the requested level;
for each of one or more child namespaces nested directlty within the current namespace, causing execution of a job for updating a child access permission associated with the child namespace for the user based on the updated level of the access permission, unless the termination criterion is satisfied,
the execution of at least one of one or more jobs corresponding to the one or more child namespaces of the current namespace comprising automatically re-executing the at least one of the one or more jobs in response to unsuccessful execution of the at least one of the one or more jobs while maintaining at least eventual consistency of the one or more child namespaces with respect to updates; and
for each of the one or more child namespaces, identifying the child namespace as the current namespace with the updated level now as the requested level and restarting the iterative process,
wherein the method is performed by one or more computing devices.

US Pat. No. 10,713,377

SYSTEM OF SHARED SECURE DATA STORAGE AND MANAGEMENT

IXUP IP PTY LTD, Sydney,...

1. A method for sharing confidential data between a first data provider and a second data provider, the method comprising:determining a correspondence between one of multiple first data records from the first data provider and one of multiple second data records from the second data provider,
the multiple first data records being stored on a first data store being accessible by the first data provider and protected by encryption from the second data provider, each of the multiple first data records comprising an identifier that references a respective first data record,
the multiple second data records being stored on a second data store being accessible by the second data provider and protected by encryption from the first data provider, each of the multiple second data records comprising an identifier that references a respective second data record; and
creating a third data record on a third data store, the third data record comprising the identifier that references the respective first data record as a first reference to the one of the multiple first data records and the third data record comprising the identifier that references the respective second data record as a second reference to the one of the multiple second data records, wherein
the identifier that references the first data record is accessible by the second data provider and the identifier that references the second data record is accessible by the first data provider.

US Pat. No. 10,713,376

FINE GRAIN SECURITY FOR ANALYTIC DATA SETS

salesforce.com, inc., Sa...

1. A method comprising:extracting fields of data from one or more secured, primary database sources on a batch basis;
assigning field level security to the fields, wherein the assigning comprises:
identifying a first subset of the fields with user selectable inheritance, wherein the field level security for each field of the first subset of the fields is determined based at least in part on inheriting security from one or more source fields associated with the first subset of the fields extracted from the one or more secured, primary database sources; and
identifying a second subset of the fields with pinnable inheritance, wherein the field level security for each field of the second subset of the fields is determined based at least in part on a user pinning inheritance of field level security for the second subset of the fields to reference fields, wherein the reference fields are bound to one or more attributes in the one or more secured, primary database sources and are distinct from the second subset of the fields;
compiling the fields with the assigned field level security to obtain compiled fields, wherein the compiled fields support real-time querying by a dashboard for display in a graphical user interface (GUI);
storing the compiled fields in one or more analytical, read-only databases, wherein the one or more analytical, read-only databases are distinct from the one or more secured, primary database sources;
receiving a request for query results from a user; and
producing, for display in the GUI, the query results from the compiled fields supporting the real-time querying based at least in part on the assigned field level security and subject to field level security permissions of the user.

US Pat. No. 10,713,375

DATABASE PUBLIC INTERFACE

SAP SE, Walldorf (DE)

1. A computerized method for facilitating access in a database system, the database system comprising a first schema providing a first persistency component for a first application and a second schema providing a second persistency component for a second application, the computerized method comprising:generating a first persistency interface in the database system, the first persistency interface comprising a first table link, the first table link comprising an updatable projection view of a first table of the first schema in the second schema, the database system comprising one or more hardware processors and one or more hardware data structures;
receiving, from the first application, a role for the first persistency interface, the role for first the first persistency interface describing a type of access to the first table for the second application via the first table link for a first user;
generating a second persistency interface in the database system, the second persistency interface comprising a second table link, the second table link comprising an updateable projection view of the first table of the first schema in the second schema;
receiving, from the first application, a role for the second persistency interface, the role for the second persistency interface describing a type of access to the first table for the second application via the second table link for a second user, wherein the type of access for the first table for the second application via the second table link is different than the type of access to the first table for the second application via the first table link;
receiving, by the database system, a request from the second application to perform an operation on the updatable projection view of the first table for the first user; and
responsive to the request, executing the operation on the first table at the first schema using the first table link.

US Pat. No. 10,713,374

RESOLVING DETECTED ACCESS ANOMALIES IN A DISPERSED STORAGE NETWORK

PURE STORAGE, INC., Moun...

1. A method for execution by a storage unit that includes a processor, the method comprises:receiving an access request from a requestor;
detecting an access anomaly of the access request;
queueing the access request for processing in response to detecting the access anomaly;
issuing a first anomaly detection indicator to a plurality of other storage units;
initiating a secondary authentication process with the requestor;
receiving a secondary authentication response from the requestor; and
processing the access request when the secondary authentication response is favorable;
wherein queuing the access request includes:
storing the access request in a local memory; and
associating the access request with at least one other queued access request, wherein the at least one other queued access request includes a request for a same encoded data slice;
wherein processing the access request includes:
extracting the at least one other queued access request associated with the access request; and
processing the access request and the at least one other queued access request in a sequence in accordance with a request type of the access request; and
wherein the access request and the at least one other queued access request include a write request, a commit request, and a finalize request of a three-phase storage process.

US Pat. No. 10,713,373

COMPUTING SYSTEM WITH INFORMATION STORAGE MECHANISM AND METHOD OF OPERATION THEREOF

LifeSite, Inc., Mountain...

1. A computing system comprising:a control unit configured to:
receive user information through a vault user account;
process the user information for storage in an information vault including generating an information chunk by dividing, the user information;
implement a security protocol for the vault user account including to determine a security breach to the vault user account based on receiving an electronic communication from a user electronic contact address addressed to a breach detection contact address; and
a storage unit, coupled to the control unit, configured to store the information chunk of the user information.

US Pat. No. 10,713,372

SYSTEM FOR MONITORING INCONTINENT PATIENTS

BioLink Systems, LLC, Co...

1. A method of structuring and coordinating a residential and patient management system, comprising:a plurality of access points continually receiving a plurality of resident data sent by a plurality of modules in which there is one module per resident;
the plurality of access points continually sending the resident data to a server;
the server analyzing the data and continually updating a database, the database containing a variety of information about each resident as well as about a facility containing the residents; and
a web interface formatting and displaying the information read from the database;
safeguarding HIPAA (Health Insurance Portability and Accountability Act) and medical information such that from a patient garment through the module through the access points to the server there is no information transmitted that can be related to any specific patient, instead where everything is abstracted; thereby
avoiding HIPAA violations and/or private medical data breaches.

US Pat. No. 10,713,371

COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS WITH COMMENTS

DROPBOX, INC., San Franc...

1. A method comprising:generating, by a content management system, a link to a collection folder;
distributing, by the content management system, the link to the collection folder to a submitter client device associated with a submitter;
receiving, by the content management system, a file selected by the submitter and a first comment input by the submitter based on the submitter accessing the link to the collection folder on the submitter client device;
associating the first comment with the file within the content management system by generating metadata referencing a first storage location of the first comment and associating the metadata with the file; and
storing the file associated with the metadata in the collection folder.

US Pat. No. 10,713,370

INFORMATION RIGHTS MANAGEMENT THROUGH EDITORS IMPLEMENTED IN A BROWSER

Seclore Technology Privat...

1. A computer implemented system for enforcing or managing information right management (IRM) capability, comprising:at least one user device, wherein the user device is a wireless telecommunications device, comprising:
a browser having an editor module, wherein the editor module includes IRM capabilities configured to view digital content, edit the digital content, print the digital content, share the digital content and watermark a user's identity, unprotect the digital content if protected, protect the digital content if unprotected and record the user's activity on the digital content corresponding to a user permission; and
a server, comprising:
a database to store a plurality of IRM rights data and corresponding user permissions;
an identifier system to identify the user;
an editor module control software to allow the user to view, edit, copy, paste and print the digital content based on the user permissions defined for any protected document within the user device or downloaded through the Internet;
a delivery system to deliver to the editor module of the browser IRM capabilities corresponding to the user permission within the browser;
wherein, when the user edits the digital content, the edited digital content is uploaded to and stored in a data storage system;
wherein the IRM capabilities are enforced through any one of a browser, a modified browser, a plugin in browser, a script running on a browser, an embedded browser control, and a remote screen replication;
wherein the user device is connected to the server over a network.

US Pat. No. 10,713,369

METHOD AND DEVICE FOR ACCESS CONTROL

ZTE CORPORATION, Shenzhe...

1. A method for access control which is performed by a hardware processor, and the method comprises:a group of tasks are executed, controlling an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks;
wherein before the group of tasks are executed, the method further comprises: obtaining the operation permission corresponding to each of the tasks in the group of tasks according to a preset correspondence relationship between each of the tasks in the group of tasks and the operation permission;
wherein obtaining the operation permission corresponding to each of the tasks in the group of tasks according to the preset correspondence relationship between each of the tasks in the group of tasks and the operation permission comprises:
obtaining a role corresponding to the subject executing each of the tasks according to a preset correspondence relationship between the subject and the role;
obtaining a first operation permission corresponding to the role according to a preset correspondence relationship between the role and the operation permission; and
taking an intersection of a second operation permission corresponding to the task in the preset correspondence relationship between each of the tasks in the group of tasks and the operation permission, and the first operation permission corresponding to the obtained role corresponding to the subject executing the task as the operation permission for each of the tasks.

US Pat. No. 10,713,368

APPLICATION OF SECURITY PARAMETERS FOR CONTENT

Alfresco Software, Inc., ...

1. A method comprising:receiving, through a graphical user interface on a display device associated with a content management system, a selection to create a restriction group to be added to a set of restriction groups, the created restriction group being associated with a graphical representation in the graphical user interface;
in response to selecting the graphical representation, displaying, on the graphical user interface on the display device, an option to create one or more restriction marks associated with the created restriction group,
the restriction group identifying an attribute associated with a user of one or more content items stored in the content management system, and
a restriction mark identifying one or more categories for the attribute identified by the restriction group, the one or more categories being configured to allow or limit user access to one or more content items associated with the restriction mark;
receiving, through the graphical user interface on the display, a selection of one or more restriction marks for being assigned to a content item stored in the content management system, the content item having associated metadata stored in the content management system;
updating metadata associated with the content item, the updated metadata indicating that the selection of the one or more restriction marks is assigned to the content item; and
updating a profile associated with a user to include the one or more restriction marks.

US Pat. No. 10,713,367

SECURE ELECTRONIC MAIL SYSTEM

AppRiver Canada ULC, Hal...

1. A computer-implemented method of securely communicating e-mail messages, comprising:receiving, from a server system providing a secure e-mail service, an e-mail message from a sender;
receiving, from a user, an input to either forward or reply to the e-mail message;
providing data corresponding to the user input to the server system;
receiving a determination, by the server system, whether the user input comprises a request to forward or reply to the e-mail message via the secure e-mail service; and
receiving a determination, by the server system, whether the user input comprises a request to forward or reply to the e-mail message via an e-mail service different from the secure e-mail service, the different e-mail service lacking security features of the secure e-mail service, wherein
based on a determination that the user input comprises a request to forward or reply to the e-mail message via the secure e-mail service, the server system proceeds with forwarding or replying to the e-mail message; and
based on a determination that the user input comprises a request to forward or reply to the e-mail message via the different e-mail service, when enforcing a service-level option, the server system prevents the forwarding or replying via the different e-mail service and allows the forward or reply to the e-mail message to be sent via the secure e-mail service; and
based on a determination that the user input comprises a request to forward or reply to the e-mail message via the different e-mail service, when not enforcing the service-level option, the server system notifies the sender that the security features of the secure-email service will be lost and sends the forward or reply to the e-mail message via the different e-mail service.

US Pat. No. 10,713,366

SYSTEMS AND METHODS FOR AUTOMATED THREAT MODEL GENERATION FROM THIRD PARTY DIAGRAM FILES

ThreatModeler Software In...

1. A threat modeling method, comprising:providing one or more databases, the one or more databases comprising:
a plurality of threat model components stored therein; and
a plurality of threats stored therein, wherein each of the threats is associated with at least one of the threat model components through the one or more databases;
providing one or more mapping files communicatively coupled with the one or more databases, the one or more mapping files correlating the threat model components with visual diagram components of a third party software application (hereinafter “third party diagram components”); and
in response to receiving one or more user inputs, using one or more user interfaces displayed on one or more computing devices communicatively coupled with the one or more databases:
using the one or more computing devices, reading a data file generated by the third party software application, the data file comprising a subset of the third party diagram components, the data file defining one or more relationships between the subset of third party diagram components;
determining using the one or more computing devices, for the subset of third party diagram components, correlated threat model components as defined in the one or more mapping files;
displaying on the one or more user interfaces a relational diagram of one of a system, an application, and a process, using visual representations of the threat model components correlated with the subset of third party diagram components, the relational diagram defining a threat model; and
generating, using the one or more computing devices, and displaying, on the one or more user interfaces, a threat report displaying each threat that is associated through the one or more databases with one of the threat model components included in the threat model.

US Pat. No. 10,713,365

TESTING CLOUD APPLICATION INTEGRATIONS, DATA, AND PROTOCOLS

ORACLE INTERNATIONAL CORP...

1. A computer-implemented method comprising, at a computer system of a security management system:obtaining activity data from a service provider system, wherein the activity data includes a list of actions performed during use of a cloud service, wherein actions in the list of actions are performed by one or more users associated with a tenant, wherein the service provider system provides the tenant with a tenant account, and wherein the tenant account enables the one or more users to use the cloud service;
parsing an action from the list of actions to determine a list of fields included in the action;
identifying a field from the list of fields, wherein an identity of the field describes data included in the field;
generating a template for the action, the template including a data structure storing the identity of the field, wherein the template further includes a data structure describing a format of the action;
generating a configuration associated with a test scenario, the configuration including a reference to the template and a description of an action associated with the test scenario;
generating a simulated action for the action described in the configuration, wherein generating the simulated action includes using the template to determine fields for the action and an output structure for the action, and wherein generating the simulated action includes using a test description to select values for the fields;
generating simulated activity data that includes the simulated action, wherein the simulated activity data has a same format as the activity data; and
inputting the simulated activity data into the security management system, wherein the security management system operates on the simulated activity data to determine whether actions included in the simulated activity data include use of the cloud service that constitutes a security risk, and wherein the simulated action causes the security management system to perform a particular operation, wherein the particular operation is associated with the test scenario.

US Pat. No. 10,713,364

SYSTEM AND METHOD FOR IDENTIFYING VULNERABILITIES IN CODE DUE TO OPEN SOURCE USAGE

WHITESOURCE LTD., (IL)

1. A computer-implemented method comprising:obtaining computer code;
determining from the computer code a collection of components reachable from the computer code;
providing information about the components to a server;
identifying using information retrieved from a database accessible to the server, reachable components associated with the collection of components, wherein each of the reachable components has at least one stored vulnerability;
repeating:
determining from the computer code and components identified as having at least one stored vulnerability, a collection of reachable finer resolution components; and
identifying from the collection of reachable finer resolution components, reachable finer resolution components which have at least one stored vulnerability, using information retrieved from the database, until
no information exists in the database for further finer resolution reachable components; and
outputting information about the reachable components which have at least one stored vulnerability, and reachable finer resolution components which have at least one stored vulnerability,
wherein the computer code cannot be reconstructed from the information about the collection of components and information provided to the server about the collection of reachable finer resolution components.

US Pat. No. 10,713,363

SYSTEM AND METHOD OF CONFIGURING INFORMATION HANDLING SYSTEMS

Dell Products L.P., Roun...

1. An information handling system, comprising:at least one processor;
a memory medium that is coupled to the at least one processor and that stores information handling system firmware, executable by the at least one processor; and
a remote access controller that is coupled to the at least one processor;
wherein the remote access controller is configured to:
receive a digital signature, signed by a signing authority, for a request for utilization of an information handling system firmware application programming interface (API) of the information handling system firmware, signed based at least on information associated with a certificate signed by a certificate authority;
decrypt the digital signature, utilizing a public key associated with the certificate, to determine a first hash value;
determine a second hash value of the request for utilization of the information handling system firmware API;
determine that the first hash value matches the second hash value;
determine that the signing authority is authorized for the request for utilization of the information handling system firmware API;
determine that the signing authority is authorized for the request for utilization of the information handling system firmware API on a platform model of the information handling system;
permit utilization of the information handling system firmware API; and
permit, without authentication, utilization of another information handling system firmware API.

US Pat. No. 10,713,362

DYNAMICALLY ADAPTIVE FRAMEWORK AND METHOD FOR CLASSIFYING MALWARE USING INTELLIGENT STATIC, EMULATION, AND DYNAMIC ANALYSES

FireEye, Inc., Milpitas,...

1. A system for adjusting malware analysis of a specimen received as input, the system comprising:a data storage device being hardware that is configured to store control information that identifies (i) a first plurality of analyses and (ii) an order of the first plurality of analyses to be conducted on the specimen;
a first analysis module being software that is configured, upon execution, to conduct, in accordance with the control information, at least one or more analysis of a first type of analysis on the specimen, wherein the one or more analysis of the first type of analysis included as a portion of the first plurality of analyses;
a second analysis module being software that is configured, upon execution, to conduct, in accordance with the control information, at least one or more analysis of a second type of analysis on the specimen, wherein the one or more analysis of the second type of analysis included as a portion of the first plurality of analyses; and
a controller communicatively coupled to the data storage device, the first analysis module, and the second analysis module, the controller to modify the control information in response to feedback information based on results from at least one of the first plurality of analyses conducted by the first analysis module or the second analysis module, the modified control information to change the malware analysis of the specimen from being conducted in accordance with the first plurality of analyses to being conducted in accordance with a second plurality of analyses different from the first plurality of analyses in analysis type or in order of analyses.

US Pat. No. 10,713,359

SYSTEM AND METHOD OF IDENTIFYING A MALICIOUS INTERMEDIATE LANGUAGE FILE

AO Kaspersky Lab, Moscow...

1. A method for detecting malicious intermediate language files comprising:selecting a set of resources from a file being analyzed, wherein the file is an intermediate language file and wherein the resources are lines of code from the file, the lines comprising ANSI characters;
calculating a perceptive hash of a the set of resources; identifying a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files;
determining a harmfulness of the file being analyzed based on the degree of similarity; and
removing or quarantining the file being analyzed when the harmfulness exceeds a predetermined threshold.

US Pat. No. 10,713,358

SYSTEM AND METHOD TO EXTRACT AND UTILIZE DISASSEMBLY FEATURES TO CLASSIFY SOFTWARE INTENT

FireEye, Inc., Milpitas,...

1. A method to extract and utilize disassembly features to classify an intent of a software program, the method comprising:generating a model based, at least in part, on features associated with at least (i) one or more samples from labeled malicious software, and (ii) one or more samples from labeled benign software extracted from training files, the model to maintain statistics associated with each particular type of sample; and
classifying an unknown sample being a software program in accordance with the model being utilized by a classifier, the classifying of the software program comprises
disassembling the unknown sample being a software program selectable via a user interface, the disassembling includes parsing the software program, identifying machine code instructions within the parsed software program, and analyzing a structure of the software program by identifying at least one of code blocks, function boundaries, and stack frames, wherein at least one or more of the identified code blocks, function boundaries or stack frames corresponding to at least one feature of the unknown sample;
analyzing the at least one feature by a machine-learning algorithm operating in accordance with the model by comparing the at least one feature to features contained in the model, the machine-learning algorithm being executed by a hardware processor; and
classifying the software program based on a result yielded from the analyzing of the at least one feature.

US Pat. No. 10,713,357

DETECTING LATERAL MOVEMENT USING A HYPERVISOR

NICIRA, INC., Palo Alto,...

1. A system for hypervisor detection of attempted arbitrary code execution in zero-day exploits, said system comprising:at least one physical processor; and
at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one physical processor, cause the physical processor to at least:
detect, by a hypervisor via a hidden breakpoint, a request from a current process in a guest operating system (OS) to create a thread, the request including a process identifier (ID) for the thread;
in response to detecting the request, determine whether a process ID for the current process is different from the process ID for the thread and different from a process ID for a parent process of the thread; and
upon determining that the process ID for the current process is different from the process ID for the thread and different from the process ID for the parent process of the thread:
obtain a thread context for the thread and a process context for the current process, the thread context identifying an entry point for the thread, the process context identifying a set of modules associated with the current process; and
upon the entry point being outside an address space of the identified set of modules or associated with a function that loads other code, classify the request as attempted lateral movement associated with malware.

US Pat. No. 10,713,355

METHOD AND SYSTEM FOR ADAPTIVE SECURITY IN CLOUD-BASED SERVICES

QATAR UNIVERSITY, Doha (...

1. A method for controlling access to data held in the cloud, comprising:determining, at a cloud server, the validity of user credentials received from a user device;
receiving context data related to the user device based on the validity of the user credentials;
synchronizing the context data with the cloud server; and
enforcing context-sensitive security checks on requests made by a user for resources based on sensor data collected by the user device,
wherein the context data comprises data about a state of a physical world outside of the user device,
wherein the context data comprises data about a state of the user device itself,
wherein the context data about the state of the physical world outside of the user device comprises a user identity, a global positioning system location of the user device, and an accelerometer reading, and
wherein the context data about the state of the user device itself comprises applications running on the user device at a given time, a battery level of the user device, and screen brightness of the user device.

US Pat. No. 10,713,354

METHODS AND APPARATUS TO MONITOR PERMISSION-CONTROLLED HIDDEN SENSITIVE APPLICATION BEHAVIOR AT RUN-TIME

1. An apparatus for resource access monitoring comprising:a display;
a processor coupled to the display; and
a memory coupled to the processor, the memory comprising instructions executable by the processor to:
identify an access attempt to a monitored resource by an application, the identification occurring after an access permission check is performed,
implement a monitor on a critical access path to the monitored resource, the monitor configured to identify the access attempt to the monitored resource by the application,
implement a permission monitor, the permission monitor configured to receive, via the monitor, a call reporting the access attempt to the monitored resource by the application,
authenticate the call to the permission monitor by a caller authenticator,
responsive to the caller authenticator authenticating the call to the permission monitor, determine whether the access attempt involves suspicious activity by evaluating a potential risk associated with the application accessing the monitored resource, and
in response to determining that the access attempt involves suspicious activity, provide a graphical user interface (GUI) to the display, the GUI providing a notification of the access attempt.

US Pat. No. 10,713,353

SEPARATE CORES TO SECURE PROCESSES FROM SPECULATIVE ROGUE CACHE LOADS

VMware, Inc., Palo Alto,...

1. A method for executing an application on a computing system, the method comprising:executing an operating system (OS) on a first processing core selected from among a plurality of processing cores in the computing system;
translating virtual addresses in a first virtual address space of an application received from the first processing core using a first set of page tables that maps an entire user address space of the application and an entire kernel address space of the OS to a physical memory shared by the plurality of processing cores;
executing the application on a second processing core selected from among the plurality of processing cores in the computing system; and
translating virtual addresses in a second virtual address space of the application received from the second processing core using a second set of page tables that maps the entire user address space of the application and at most only a portion of the kernel address space of the OS to the physical memory.

US Pat. No. 10,713,352

METHOD AND APPARATUS FOR TRUSTED MEASUREMENT

Huawei Technologies Co., ...

1. A method for trusted measurement, comprising:obtaining, when start-up of a system is completed, a first processing result by performing a first-manner processing on a code segment in a memory, and using a result obtained by performing a platform configuration register (PCR) extending operation on the first processing result as a first reference value, wherein the performing the first-manner processing on the code segment in the memory comprises performing a hash calculation on the code segment in the memory, and the performing the PCR extending operation on the first processing result comprises obtaining the first reference value by performing the hash calculation on the first processing result and a preset first value;
obtaining, at a first moment when the system is running, a second processing result by performing the first-manner processing on the code segment in the memory, and obtaining a first measurement value by performing the hash calculation on the second processing result and the first preset value;
determining whether the first measurement value and the first reference value are equal;
determining, when the first measurement value and the first reference value are equal, that the system is trusted, or determining, when the first measurement value and the first reference value are not equal, that the system is not trusted; and
when the first measurement value and the first reference value are equal, using a result obtained by performing the PCR extending operation on the second processing result as a first expected value, and the first expected value is used as a second reference value for a next trusted measurement when the system is still running;
wherein the code segment in the memory is a code segment that does not change with normal running of the system during one start-up and a running process of the system.

US Pat. No. 10,713,351

AUTHENTICATION AND CONTROL OF ENCRYPTION KEYS

Apple Inc., Cupertino, C...

1. An apparatus comprising:one or more peripherals configured to use a cryptographic keyword in a cryptographic operation in compliance with one or more policies that define allowable usage of the cryptographic keyword; and
a security processor configured to:
generate the cryptographic keyword based on a fixed value and a received seed value;
determine the one or more policies that define allowable usage of the cryptographic keyword;
generate a policy value based on the one or more policies, including an indication that the cryptographic keyword is allowed for use with a particular encryption algorithm;
generate a message including the cryptographic keyword and the policy value; and
send the message to at least one of the one or more peripherals.

US Pat. No. 10,713,350

UNLOCK AND RECOVERY FOR ENCRYPTED DEVICES

Microsoft Technology Lice...

1. A computing device, comprising:a trusted platform module (TPM) configured to receive and authenticate a first recovery password and provide a second recovery password in response to authenticating the first recovery password, wherein the first recovery password is shorter in length than the second recovery password; and
a processor configured to;
cause the computing device to operate in a recovery mode;
receive credentials associated with an account;
access the account using the credentials;
obtain the first recovery password from the account;
provide the first recovery password to the TPM;
receive the second recovery password from the TPM; and
retrieve a key using the second recovery password, wherein the key is configured to encrypt or decrypt data stored in the computing device.

US Pat. No. 10,713,349

AUTHENTICATION MANAGEMENT

International Business Ma...

1. A method for authentication management, the method comprising:establishing, with respect to access enablement to a computing asset, a valid authentication input which has a first value;
receiving, via a graphical user interface, the valid authentication input including the first value and a second value which differs from the first value;
authenticating, in response to receiving the valid authentication input and based on the first value, access enablement with respect to the computing asset; and
executing, in response to receiving the valid authentication input and based on the second value, a command indicated by the second value.

US Pat. No. 10,713,348

SYSTEM, METHOD, AND APPARATUS FOR TOUCH PANEL SECURITY

Microchip Technology Inco...

26. A method of verifying a touch panel, the method comprising:retrieving user keys and operand instructions from secure memory of a host device;
providing the user keys and operand instructions with a verification request to a touch panel requesting to provide input data to the host device;
receiving a result data from the touch panel responsive to the verification request, the result data at least partially based on one or more security features present at the touch panel;
comparing the result data to a pre-calculated result byte stored in the secure memory of the host device; and
verifying the result data responsive to the comparison.

US Pat. No. 10,713,347

MOBILE, PORTABLE APPARATUS FOR AUTHENTICATING A SECURITY ARTICLE AND METHOD OF OPERATING THE PORTABLE AUTHENTICATION APPARATUS

SICPA HOLDING SA, Prilly...

1. A mobile, portable apparatus for authenticating, verification and certification of a security article, the apparatus comprising:(a) an enclosure securely housing components of the apparatus;
(b) an authentication device operable to authenticate the security article;
(c) a power source;
(d) an imaging device set comprising at least two imaging devices for simultaneously imaging in opposing directions for facilitating monitoring and collection of a visual record of an interaction between an operator of the apparatus and a security article user;
(e) a programmable and configurable control panel;
(f) an information processing unit; and
(g) a printing device for printing and/or making a special marking on the security article,
wherein the imaging device set is coupled to the authentication device and is operable to capture images of the use of the authentication device and of the operator using the authentication device; and
wherein the control panel is arranged as an interface command and control center connected to the information processing unit and the other components of the apparatus.

US Pat. No. 10,713,346

SYSTEM FOR USER AUTHENTICATION BASED ON LOCK SCREEN AND THE METHOD THEREOF

SEOWOOSNC CO., LTD., Seo...

1. A method for authenticating a user for accessing an authentication request server based on a lock screen of a user terminal through a communication network, the method comprising:(a) receiving, by a push server, identification information of the user requesting access to the authentication request server and identification information of the authentication request server;
(b) generating, by the push server, a push message for requesting authentication of the user based on the identification information of the user and the identification information of the authentication request server, and transmitting the push message to the user terminal corresponding to the identification information of the user, wherein the user terminal is separate from the authentication request server and from the push server;
(c) displaying, by the user terminal, the transmitted push message on the lock screen of the user terminal;
(d) performing, by the user terminal, the authentication of the user by receiving biometric information of the user and comparing the received biometric information with pre-stored biometric information; and
(e) receiving, by the push server, authentication result information for the user from the user terminal and transmitting the received authentication result information to the authentication request server,
wherein in (c) the displaying of the push message on the lock screen of the user terminal, the push message is overlaid on the lock screen, and
wherein in (d) the performing of the authentication of the user, when the authentication of the user is completed, the overlaid push message is closed, the user terminal is returned to a lock screen state, and the user can access the authentication request server.

US Pat. No. 10,713,345

SECURE BIOMETRIC AUTHENTICATION WITH CLIENT-SIDE FEATURE EXTRACTION

CA, Inc., New York, NY (...

1. A method, comprising:obtaining, with one or more processors, a repository of user authentication records, each record having a user identifier and set of features detected in a biometric measurement of a respective corresponding user;
receiving, with one or more processors, from a remote computing device, a first encrypted value and an identifier of a user to be authenticated based on the first encrypted value;
retrieving, with one or more processors, from the repository, a user authentication record corresponding to the received identifier of the user to be authenticated;
determining, with one or more processors, a second encrypted value based on the set of detected features in the retrieved authentication record, the set of detected features being obtained before receiving the first encrypted value;
determining, with one or more processors, that the first encrypted value matches the second encrypted value; and
based on the determination that the first encrypted value matches the second encrypted value, sending, with one or more processors, a message over a network indicating that the user is authenticated, wherein the detected features in the retrieved authentication record are obtained from the remote computing device that receives the biometric measurement and detects the features before sending the detected features to a computing device with access to the repository without sending the biometric measurement itself.

US Pat. No. 10,713,344

SYSTEM AND METHOD FOR SECURE FIVE-DIMENSIONAL USER IDENTIFICATION

LEXTRON SYSTEMS, INC., L...

1. A method for secure user identification, comprising:creating a first user identification, using an identification device comprising at least a processor, a memory, and a plurality of programming instructions stored in the memory and operating on the processor, the identification comprising:
a video recording of a user's head, recorded from a range of positions and using illumination in different wavelengths;
a point cloud model of the user's head, based on at least a portion of the video recording;
a three-dimensional mesh model of the user's head, based on at least a portion of the video recording;
a first motion signature comprising a plurality of head movements measured during the creation of the video recording, the first motion signature being uniquely identifiable to the user; and
a second motion signature comprising a plurality of hand movements measured during the creation of the video recording, the second motion signature being uniquely identifiable to the user;
uniquely associating the user identification with the user,
recording, using the identification device, an unknown user's head from a range of positions and using illumination in different wavelengths;
retrieving a second user identification; and
comparing, using the identification device, the second user identification against the recording of the unknown user's head and a plurality of measured movements of the unknown user's head and hand to identify the unknown user.

US Pat. No. 10,713,343

METHODS, DEVICES AND SYSTEMS FOR AUTHENTICATED ACCESS TO ELECTRONIC DEVICE IN A CLOSED CONFIGURATION

LENOVO (SINGAPORE) PTE. L...

1. A portable electronic device, comprising:a display;
a body having:
a first physical configuration in which the display is not fully accessible by a user, and
a second physical configuration in which the display is fully accessible by the user;
an authentication system having a biometric sensor on an outer surface of the device that is user accessible in the first physical configuration;
a voice engine enabled to access predetermined secure functions in response to a successful biometric authentication of the user by the authentication system and to access unsecure functions without biometric authentication; and
a controller that monitors whether processing of a requested function by the user has finished;
the controller, upon determining that processing of the requested function has finished, disables voice access to the voice engine and returns the device to a secured state;
the disabling of voice access occurring in the absence of deactivation of a biometric sensor.

US Pat. No. 10,713,342

TECHNIQUES TO DETERMINE DISTINCTIVENESS OF A BIOMETRIC INPUT IN A BIOMETRIC SYSTEM

INTEL CORPORATION, Santa...

1. An apparatus, comprising:memory to store a plurality of biometric inputs of two or more input types; and
a processor coupled with the memory, the memory comprising instructions that when executed by the processor cause the processor to:
receive a biometric input of a first input type of the two or more input types,
simulate a number of authentication attempts,
determine a distinctiveness value for the biometric input based on a number of failed simulated authentication attempts,
update a biometric profile for a user based the distinctiveness value, the biometric profile to identify at least one input type to use for authentication or training,
determine an input type of the two or more input types to use to perform a training operation based on the distinctiveness value,
perform the training operation,
determine a distinctiveness factor based on the training operation, and
adjust the training operation based on the distinctiveness factor.

US Pat. No. 10,713,341

SYSTEM, METHOD AND APPARATUS FOR GENERATING ACOUSTIC SIGNALS BASED ON BIOMETRIC INFORMATION

25. A device comprising:(a) a sensor configured to detect an individual's biometric identifier information comprising facial features;
(b) a processor configured to analyze the individual's detected biometric identifier information and generate a signal derived from and representative of the detected biometric identifier information;
(c) a memory in communication with the processor and configured to store the signal derived from and representative of the detected biometric identifier information;
(d) a transmitter configured to output an acoustic signal corresponding to the signal derived from and representative of the detected biometric identifier information; and
(e) a communication interface configured to enable access to the signal derived from and representative of the detected biometric identifier information.

US Pat. No. 10,713,339

BUILD SYSTEM WITH PLUGINS FOR ENCRYPTION OF APPLICATION COMPONENTS

GUARDSQUARE NV, Leuven (...

1. A build system for generating an enhanced application comprising at least one encrypted application component during a build operation, said build system comprising:a build tool configured to receive an application comprising application code and a plurality of application components; and
two or more build tool plugins coupled to said build tool during a build operation, the two or more build tool plugins each comprising an encryption module and a corresponding decryption module,
the build tool, during the build operation, configured to generate an enhanced application making use of the two or more build tool plugins, such that the enhanced application comprises enhanced application code and a plurality of at least partly encrypted application components, and:
the plurality of at least partly encrypted application components generated from the plurality of corresponding application components by the encryption modules of the build tool plugins, such that:
at least one first at least partly encrypted application component is generated by the encryption module of a first build tool plugin;
at least one second at least partly encrypted application component is generated by the encryption module of a different, second build tool plugin, and
the enhanced application code generated by the build tool from the application code by respectively adding the corresponding decryption modules as corresponding added decryption modules, such that, during execution, when accessed by the enhanced application code:
the corresponding at least one first at least partly encrypted application component is automatically decrypted by the corresponding first added decryption module of the first build tool plugin; and
the corresponding at least one second at least partly encrypted application component is automatically decrypted by the corresponding second added decryption module of the second build tool plugin.

US Pat. No. 10,713,338

SOURCE-BASED AUTHENTICATION FOR A LICENSE OF A LICENSE DATA STRUCTURE

Microsoft Technology Lice...

1. A computing apparatus comprising:one or more computer readable storage media;
a processing system operatively coupled with the one or more computer readable storage media; and
program instructions stored on the one or more computer readable storage media for authenticating a user license for an application that, when executed by the processing system, direct the processing system to, responsive to a launch of the application, at least:
when an online licensing service is available:
obtain an instance of a license file from the online licensing service, the instance of the license file comprising the user license, available features of the application, and a public key specific to the online licensing service; and
determine authentication of the user license using the public key specific to the online licensing service;
when the online licensing service is not available:
obtain a different instance of the license file from one of a network storage location and a local storage location, the different instance of the license file comprising the user license, the available features of the application, and a public key specific to the one of the network storage location and the local storage location; and
determine authentication of the user license using the public key specific to the one of the network storage location and the local storage location; and
in response to determining that the user license is authenticated:
enable a set of features of the available features of the application based on the user license; and
initiate presentation of the application in accordance with the set of features.

US Pat. No. 10,713,337

SYSTEMS AND METHODS FOR PAYLOAD ENCODING AND DECODING

The Nielsen Company (US),...

1. An apparatus to decode audio, the apparatus comprising:a processor; and
a storage device in communication with the processor, the storage device including instruction which, when executed, cause the processor to at least:
process a license file to obtain information to access a message encoded in audio, the information obtained from the license file including at least one of decoding information, message codes, a decoding algorithm or diagnostic information;
detect the message encoded in the audio based on the information obtained from the license file; and
output the detected message.

US Pat. No. 10,713,336

INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD

SONY CORPORATION, Tokyo ...

1. An information processing device, comprising:a central processing unit (CPU) configured to:
execute a copy process of recording data from a first memory to a second memory, wherein the first memory records the recording data, and
the recording data includes encrypted content;
record the encrypted content on the second memory as encrypted data, without decryption of the encrypted content;
acquire a media key block (MKB) from a server;
record the acquired MKB on the second memory;
read a CPS unit key(unit key) file recorded on the first memory, wherein the unit key file stores a decryption key for the encrypted content;
convert the read unit key file based on the recorded MKB;
generate the converted unit key file for acquisition of the decryption key, wherein the acquisition of the decryption key is performed without application of key conversion data (KCD) recorded on the first memory; and
record the generated unit key file on the second memory.

US Pat. No. 10,713,335

SYSTEM, METHOD, AND APPARATUS FOR DETECTING UNLICENSED PERFORMANCES OF COPYRIGHTED CREATIVE WORKS

Visa International Servic...

1. A computer-implemented method of detecting a performance of a creative work, comprising:receiving, by a server, a digital representation of an occurrence of multimedia data from a mobile device enabled to capture multimedia data;
determining, by the server, that the digital representation is part of a copyrighted work;
determining, by the server, a time-length associated with the copyrighted work and/or a remainder of time associated with the copyrighted work;
generating, by the server, a message comprising the time-length and/or the remainder of time associated with the copyrighted work;
communicating, by the server, the message to the mobile device to cause the mobile device to disable the capture of multimedia data for the remainder of time and, after the remainder of time has elapsed, re-enable the mobile device to capture multimedia data;
receiving, by the server, information relating to a physical location of the occurrence; and
determining, by the server, whether a license exists for a performance of the copyrighted work, based upon the information relating to the physical location.

US Pat. No. 10,713,334

DATA PROCESSING SYSTEM WITH A SCALABLE ARCHITECTURE OVER ETHERNET

EMC IP HOLDING COMPANY LL...

1. A data processing system, comprising:a plurality of central processing unit (CPU) subsystems, wherein each CPU subsystem includes a plurality of CPUs and a plurality of memory controllers, each memory controller corresponding to one of the CPUs;
a plurality of memory complexes, each memory complex being associated with one of the CPU subsystems, wherein each memory complex comprises one or more branches, and
a plurality of memory leaves to store data, wherein each of the branches is coupled to one or more of the memory leaves and to provide access to the data stored in the memory leaves; and
an Ethernet switch fabric coupled to each of the memory controllers of the CPU subsystems and each of the branches of the memory complexes, wherein each of the memory controllers is communicatively connected with each of the branches of any of the memory complexes via the Ethernet switch fabric over an Ethernet to access data stored in any of the memory leaves associated with the corresponding branch,
wherein a first memory controller associated with a first CPU of a first CPU subsystem is communicatively connected with a second memory controller associated with a second CPU of the second subsystem via the Ethernet switch fabric over the Ethernet and each of the branches provides access to data stored in local memory leaves by a remote CPU via a remote branch of the remote CPU over the Ethernet, without having to invoke a local CPU.

US Pat. No. 10,713,333

FAST FOURIER TRANSFORM ARCHITECTURE

Apple Inc., Cupertino, C...

1. A calculation circuit for calculating a transform of an input sequence, the calculation circuit comprising:a plurality of butterfly computation circuits configured to:
perform a plurality of butterfly computations,
produce a plurality of outputs during each computation stage of a plurality of computation stages, and
selectively execute a bypass mechanism with a butterfly computation circuit of the plurality of butterfly computation circuits, such that the butterfly computation circuit provides an unaltered input of the butterfly computation circuit as an output of the butterfly computation circuit;
a wired routing network configured to route a first plurality of outputs of the plurality of butterfly computation circuits from a first computation stage of the plurality of computation stages as input to the plurality of butterfly computation circuits during a second computation stage of the plurality of computation stages according to a reconfigurable routing configuration; and
routing control circuitry configured to modify the reconfigurable routing configuration for a third computation stage of the plurality of computation stages.

US Pat. No. 10,713,332

HARDWARE ACCELERATED LINEAR SYSTEM SOLVER

University of Dayton, Da...

1. An system for solving a system of linear equations, the system comprising:a host computer;
a linear solver apparatus in communication with the host computer, the linear solver apparatus comprising an input data sampling block, a real-time computational solver, and a solution update and data output block, and configured to implement parallel processing hardware, pipelining, and reusable memory blocks;
wherein the linear solver apparatus applies a Gauss-Jordan Elimination method on the system of linear equations.

US Pat. No. 10,713,331

CREATE AND PUBLISH A WEBSITE USING A USER SATISFACTION

Go Daddy Operating Compan...

1. A method for creating a website using a customer satisfaction derived from customer service text communications, comprising the steps of:receiving by a website hosting provider a plurality of customer service voice communications from a corresponding plurality of hosting customers,
wherein the website hosting provider comprises:
i) a communication center configured to receive the plurality of customer service voice communications from the plurality of hosting customers,
ii) a database configured to store the plurality of customer service voice communications,
iii) a website hosting server configured to host a plurality of websites for the plurality of hosting customers, and
iv) a machine learning algorithm,
wherein each hosting customer in the plurality of hosting customers is hosting a website in the plurality of websites with the website hosting provider and has a customer account with the website hosting provider;
storing by the website hosting provider the plurality of customer service voice communications in the database;
converting by the website hosting provider the plurality of customer service voice communications into a corresponding plurality of customer service text communications;
storing by the website hosting provider the plurality of customer service text communications in the database;
deriving by the website hosting provider a score for each customer service text communication in the plurality of customer service text communications based on a customer satisfaction derived from the customer service text communication;
deriving by the website hosting provider a topic for each customer service text communication in the plurality of customer service text communications based on an analysis of the customer service text communication;
deriving by the website hosting provider a plurality of hosting customer variables of the hosting customer for each customer service text communication in the plurality of customer service text communications;
storing by the website hosting provider the score, the topic and the plurality of hosting customer variables for each customer service text communication in the plurality of customer service text communications in the database;
aggregating by the website hosting provider all of the customer service text communications in the plurality of customer service text communications that have a first derived topic into a first cluster;
aggregating by the website hosting provider all of the customer service text communications in the plurality of customer service text communications that have a second derived topic into a second cluster, wherein the first derived topic is different from the second derived topic;
determining by the website hosting provider a first plurality of hosting customer variables for a current hosting customer;
applying by the website hosting provider the machine learning algorithm to the first cluster of customer service text communications to determine an optimal set of questions based on the first plurality of hosting customer variables for the current hosting customer and the score for each customer service text communication in the first cluster of customer service text communications;
receiving by the website hosting provider a plurality of responses to the optimal set of questions from the current hosting customer;
transmitting by the website hosting provider a recommendation to the current hosting customer based on the plurality of responses from the current hosting customer; and
publishing by the website hosting provider a website of the current hosting customer on the website hosting server, wherein the website is created or published, at least in part, based on the recommendation to the current hosting customer.

US Pat. No. 10,713,330

OPTIMIZED BROWSER RENDER PROCESS

GOOGLE LLC, Mountain Vie...

1. A system comprising:at least one processor;
memory storing a data store that identifies URLs that are content neutral, wherein the URLs identified in the data store are each linked to rendered content determined to be similar with scripting turned on and with scripting turned off; and
memory storing instructions that, when executed by the at least one processor, cause the system to:
receive a request to render a web page identified by a URL;
prior to rendering, determine that the URL is identified as content neutral in the data store; and
responsive to determining that the URL is identified as content neutral, render the web page with scripting turned off, regardless of browser settings for scripting.

US Pat. No. 10,713,329

DERIVING LINKS TO ONLINE RESOURCES BASED ON IMPLICIT REFERENCES

LONGSAND LIMITED, Cambri...

1. A method performed by a system comprising a hardware processor, comprising:determining that text of a web page refers to a web resource, and in response to determining that the text refers to the web resource, identifying the text as an implicit reference to the web resource;
invoking a classifier that classifies text in web pages;
applying the classifier to the text of the web page in an attempt to derive a link to the web resource based on the implicit reference;
determining whether the classifier was able to derive the link to the web resource,
in response to determining that the classifier was not able to derive the link to the web resource:
determining, based on analyzing information describing a structure of a website, a search interface comprising an input field;
in response to identifying the text of the web page as the implicit reference to the web resource, performing a search based on inputting a search term into the input field of the search interface of the website;
obtaining a search result referring to the web resource in response to the search; and
using a hyperlink of the search result as the link to the web resource; and
in response to determining that the classifier was able to derive the link to the web resource, using the link to the web resource derived by the classifier in accessing the web resource.

US Pat. No. 10,713,328

AUTOMATED TAGGING APPLICATION FOR MAINTAINING UP-TO-DATE WEB ANALYTICS

Mastercard International ...

7. A computerized method for updating website tags based on detected link changes comprising:collecting, by an auto-tagger application, link metadata associated with at least one link on a website, the at least one link having one or more tags associated therewith;
accessing, by the auto-tagger application, previously collected link metadata associated the at least one link on the website;
comparing the collected link metadata with the previously collected link metadata;
upon detecting, based on the comparing, a link change between the collected link metadata and the accessed previously collected link metadata, identifying, by the auto-tagger application, at least one auto-tagging rule associated with the detected link change, wherein the identified at least one auto-tagging rule determines one or more instructions corresponding to the detected link change; and
updating, by the auto-tagger application, at least one tag of the one or more tags based on application of the one or more instructions determined by the identified at least one auto-tagging rule, the updated at least one tag enabling accurate tracking of user interactions with the at least one link.

US Pat. No. 10,713,327

GEO-BASED DATA PROVISION, SEARCH AND ACCESS SYSTEM AND METHODS

1. An automated onsite information search and multimedia system for independent short-range wireless broadcasting comprising:an onsite wireless communication apparatus comprising:
a first short range wireless transceiver operatively generating a wireless signal to be received by users of mobile devices;
an input device for receiving input from a user of the onsite wireless communication apparatus; and
a processor storing computer executable software in a memory, wherein execution of the software generates a graphical user interface that prompts a user of the onsite wireless communication apparatus to specify media content to be uploaded to the memory; and
a mobile application operatively installed on a user mobile device and in operative communication with the onsite wireless communication apparatus via a second short range wireless transceiver when the user device is within a coverage area of the first short range wireless transceiver; and
wherein the onsite wireless communication apparatus directly transmits an authorization code to the mobile application via the first short range wireless transceiver and the mobile application determines whether to authorize the onsite wireless communication apparatus in response to comparing the authorization code to a set of known access codes stored in a memory of the mobile device; and
wherein once authorized, the onsite wireless communication apparatus directly communicates with the mobile application via the first and second short range wireless transceivers without requiring a connection to the internet or other networks.

US Pat. No. 10,713,326

SEARCH AND NOTIFICATION IN RESPONSE TO A REQUEST

eBay Inc., San Jose, CA ...

1. An apparatus comprising:hardware processing circuitry;
hardware memory storing instructions that when executed cause the hardware processing circuitry to perform operations, the operations comprising:
receiving input defining an image of a search item,
receiving input indicating an instruction to search a plurality of sensor data for the image of the search item, each sensor data generated by a corresponding imaging sensor and including a respective image captured by the corresponding imaging sensor, and
displaying a location of an identified item matching the searched item in a user interface, the location corresponding to a location of one of the imaging sensors that generated an image-representing the identified item.

US Pat. No. 10,713,325

REAL ESTATE ACTIVITY ANALYTICS SYSTEM AND METHOD

1. A computer-implemented method of analyzing real property data, the real property data consisting of electronic data related to real property stored in a plurality of independent databases, comprising:receiving one or more filters related to real property and real property sales transactions from a User via a user system;
collecting electronic real property data from plurality of independent databases based on the received one or more filters related to real property and real property sales transactions;
creating a plurality of subsets of real properties based on the collected electronic real property data based on one or more of the received one or more filters related to real property and real property sales transactions;
analyzing each of the plurality of subsets of real properties to determine a score,. wherein the determined score for each of the plurality of subsets of real properties is a weighted combination of at least three attributes, the attributes including three of the number of properties sold in a predetermined time interval divided by the total number of properties in one of plurality of subsets of real properties, the average property price of listed and sold in the one of plurality of subsets of real properties; the percentage of active properties represented by one of a single real estate agent, groups of real estate agents, a real estate brokerage, and groups of real estate brokerages in one of plurality of subsets of real properties, and the average number of days on market for active properties in one of plurality of subsets of real properties; and
forwarding a user interface to a user system enabling a User to view the plurality of subsets of real properties and the determined score for each of the plurality of subsets of real properties.

US Pat. No. 10,713,324

SEARCH RESULTS FOR NATIVE APPLICATIONS

Google LLC, Mountain Vie...

1. A computer-implemented method performed by data processing apparatus comprising one or more computers in data communication, the method comprising:accessing, for each of a plurality of native applications, a compressed collection of files that are used to distribute and install the native application on a user device, and for each native application:
determining, from one or more of the files of the compressed collection of files, an application name of the native application, the determining comprising:
determining an application icon for the native application from one or more of the files of the compressed collection of files;
indexing the application icon for the native application in the index; and
selecting, from one or more of the files of the compressed collection of files, a text string defining the application display name for the application icon as the application name;
accessing, at the data processing apparatus, application pages of the native application, and for each of the application pages, generating application page data describing content of the application page, and an application page name of the application page; and
indexing the application page data and the application name for the native application in an index that is searchable by a search engine.

US Pat. No. 10,713,322

FIELD MAPPINGS FOR PROPERTIES TO FACILITATE OBJECT INHERITANCE

Facebook, Inc., Menlo Pa...

1. A method comprising:by one or more computing devices, determining a field mapping for a property of an object from a native system, wherein determining the field mapping comprises:
determining a third party object, from a third party system, that matches the object from the native system based on one or more similar other properties;
determining that the third party object has a third party value for a third party property that corresponds to the property;
determining an incompatibility between a data type of the third party property and the property; and
determining one or more routines to resolve the incompatibility, wherein at least one of the routines transforms the third party value into a normalized value that conforms to the property specification for the property;
by one or more computing devices, in response to receiving a request for the property in the native system, retrieving the third party value of the third party property from the third party system;
by the one or more computing devices, modifying the retrieved third party value of the third party property of the third party object by executing the one or more routines according to the field mapping; and
by one or more computing devices, providing, as a response to the request in the native system, the object with the value for the property as modified according to the field mapping to provide access to the normalized value from the third party property in the native system through a native call to the property on the object.

US Pat. No. 10,713,321

EFFICIENT IDENTIFICATION OF ANOMALIES IN PERIODICALLY COLLECTED DATA

Microsoft Technology Lice...

1. A method for generating alerts, the method comprising:storing in a database, a plurality of records, each record associated with a user, each record storing user profile attributes describing the user;
determining a plurality of user populations, each user population corresponding to a set of records, each population specified using values of one or more user profile attributes;
performing data collection, the collected data representing user responses;
identifying a set of anomalies based on the collected data, each anomaly associated with a population;
determining a subset of anomalies, the determining comprising:
identifying from the set of anomalies, a first anomaly for a first population and a second anomaly for a second population;
determining that the first population is a subset of the second population and the first anomaly and the second anomaly are associated with a same category of anomalies;
responsive to determining that the first population is a subset of the second population and the first anomaly and the second anomaly are associated with the same category of anomalies, excluding the first anomaly from the subset of anomalies being determined; and
transmitting alerts based on the subset of anomalies.

US Pat. No. 10,713,320

DE-DUPING EVENTS ON ONLINE SOCIAL NETWORKS

Facebook, Inc., Menlo Pa...

1. A method comprising, by one or more computing systems of an online social network:receiving, at the one or more computing systems, a first event listing corresponding to a first event, wherein the first event listing comprises one or more items of event information associated with the first event, wherein the items of event information include at least a time of the first event and a geographic location of the first event;
bucketizing, by the one or more computing systems, the first event listing based on the time of the event and the location of the event, wherein the first event listing is placed in a first bucket of an array, wherein a first dimension of the array corresponds to time increments, and wherein a second dimension of the array corresponds to geographic map tiles, and wherein the first bucket corresponds to the time increment including the time of the first event and the geographic map tile including the geographic location of the first event;
identifying, by the one or more computing systems, one or more second event listings corresponding to one or more second events, respectively, wherein each second event listing comprises one or more items of event information associated with the respective second event, wherein the items of event information include at least a time of the respective second event and a geographic location of the respective second event, wherein each second event listing has a time and geographic location placing each second event listing in the first bucket of the array or one of the buckets of the array adjacent to the first bucket;
computing, by the one or more computing systems, for each of the second event listings, a similarity score between the first event listing and the second event listing, wherein the similarity score is based on a comparison of the event information of the first event listing and the event information of the second event listing; and
updating, by the one or more computing systems, each second event listing having a similarity score greater than a threshold score to include redirection information to the first event listing to de-duplicate events on a social-networking system, wherein the redirection information identifies the second event listings as being in an event cluster with the first event listing, the redirection information further identifying a canonical event listing in the event cluster to which the other event listings in the cluster are redirected.

US Pat. No. 10,713,319

SYSTEMS AND METHODS TO DETERMINE TRENDING TOPICS FOR A USER BASED ON SOCIAL GRAPH DATA

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:calculating, by a computing system, one or more terms associated with a topic, each term based on a degree of separation between a user and a connection of the user on a social networking system, a value of affinity between the user and the connection, and a weight reflecting a value of interest similarity between the user and the connection;
combining, by the computing system, the one or more terms associated with the topic to generate a composite score associated with the topic; and
ranking, by the computing system, a plurality of topics based on their associated composite scores to select at least a portion of the plurality of topics for presentation to the user in the social networking system.

US Pat. No. 10,713,318

OPTIMIZING LISTING EFFICIENCY AND EFFICACY FOR A DELIVERY COORDINATION SYSTEM

Uber Technologies, Inc., ...

1. A method for selecting listings for a listings request from a client device comprising:storing, by a networked system, a plurality of listings associated with a plurality of establishments from which an order may be placed;
receiving a listings request from a client device, the listings request identifying a user of a networked system who is associated with the client device;
determining, by the networked system, filtering criteria, wherein the filtering criteria comprise a threshold popularity applied to the establishments in the plurality of listings and are adjusted based at least in part on computational resources used by the networked system, such that a reduced number of listings of the plurality of listings is selected responsive to the networked system using more than a threshold amount of computational resources;
selecting a filtered set of listings of the plurality of listings by applying the determined filtering criteria to the plurality of listings;
generating a conversion score for each listing of the filtered set of listings, each conversion score representing a likelihood that the user will order from the establishment associated with the listing using the networked system;
selecting one or more listings of the filtered set of listings for presentation to the user based on selection factors associated with the one or more listings, the selection factors including the generated conversion scores; and
transmitting the selected one or more listings to the client device.

US Pat. No. 10,713,317

CONVERSATIONAL AGENT FOR SEARCH

ADOBE INC., San Jose, CA...

1. A computer system comprising:one or more processors; and
one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to:
generate a user model using session logs from a search engine, the session logs comprising user activities during search sessions that do not include conversation data, the user model generated by:
employing a set of rules with mappings between certain types of session log entries to specific user actions defined by a user action space understandable by a reinforcement learning agent to represent entries from the session logs as user actions from the user action space and each search session within the session logs as a series of user actions from the user action space, and
using the mapped entries from the session logs to compute conditional probabilities for user actions from the user action space for each of a plurality of different sets of previous user actions;
train the reinforcement learning agent using the user model by iteratively performing dialog turns of selecting an agent action and selecting a user action, wherein the user actions are selected during the dialog turns based at least in part on the conditional probabilities from the user model; and
employing the reinforcement learning agent as a conversational agent in a conversational search system.

US Pat. No. 10,713,316

SEARCH ENGINE USING NAME CLUSTERING

Microsoft Technology Lice...

1. A system comprising:a machine-readable medium having instructions stored thereon, which, when executed by a processor, causes the processor to perform operations comprising:
receiving a plurality of names;
generating a plurality of phonetic cluster identifiers according to a phonetic spelling of the names using a database of phonetic associations and not including vowel sounds;
forming a plurality of name clusters by grouping the names having an equivalent cluster id into a corresponding name cluster of the plurality of name clusters;
removing names from respective name clusters that differ from a root name by more than either particular spelling of a phonetic sound or a specific member's reformulation according to a reformulation dictionary; and
suggesting, in response to receiving a name from a member of an online social networking system, one or more names by generating a phonetic cluster id for the received name and returning names found in the name cluster that matches the phonetic cluster id.

US Pat. No. 10,713,315

PERSONALIZED TARGETING OF MEDIA STATIONS

Apple Inc., Cupertino, C...

1. A method comprising:providing an online media player to a client device, wherein the online media player includes a plurality of slots and a plurality of media station queues, each slot associated with a category of media content;
monitoring usage of the online media player to detect one or more user interactions with the online media player;
based on the one or more detected user interactions, determining one or more user media preferences;
ranking media stations in a queue of the plurality of media station queues based on the one or more user media preferences;
determining an amount of screen time for presenting a media station in a slot of the plurality of slots based on the ranking of the media stations via the online media player; and
based on the one or more user media preferences and the category, selecting the media station from the queue to present for the amount of screen time, via the online media player, in the slot of the plurality of slots.

US Pat. No. 10,713,314

FACILITATING DATA MODEL ACCELERATION IN ASSOCIATION WITH AN EXTERNAL DATA SYSTEM

SPLUNK INC., San Francis...

1. A computer-implemented method comprising:receiving, at a core engine, a search request associated with a data model, the data model designating one or more fields, from among a plurality of fields, that are of interest for subsequent searches;
determining that an accelerated data model summary, of a dataset stored in an external data system, and associated with the data model is stored at the external data system, the external data system not under management of the core engine that received the search request, the accelerated data model summary organized into a columnar format comprising a plurality of data blocks, each data block adjacently storing values of a column of data from a subset of rows of the dataset, for a set of columns of the dataset corresponding to the one or more fields designated by the data model;
triggering the external data system to generate a set of search results relevant to the search request by causing the external data system to read data from the accelerated data model summary and execute a search of the data from the accelerated data model summary;
receiving the set of search results from the external data system; and
providing the set of search results to a user device for display to a user.

US Pat. No. 10,713,313

INTERNET QUESTION ANSWERING SYSTEM AND METHOD, AND COMPUTER READABLE RECORDING MEDIA

INDUSTRIAL TECHNOLOGY RES...

1. An internet question answering method for an internet question answering system having a display, the internet question answering method including:receiving and displaying a current-turn user question on the display of the internet question answering system;
labeling a discourse of the current-turn user question as “discourse continue (DC)” or “discourse end (DE)” online and real-time based on a discourse labeling model;
determining whether to clear at least one discourse of an old boundary based on the discourse of the current-turn user question;
on-line feeding back an answer to the current-turn user question on the display by the internet question answering system; and
evaluating a degree of matching between a next-turn user question and the old boundary to determine whether the discourse of the current-turn user question is correct, whether to correct the discourse of the current-turn user question, and whether to adjust the discourse labeling model by using the current-turn user question,
wherein when the discourse of the current-turn user question is corrected based on the degree of matching between the next-turn user question and the old boundary evaluated by said evaluating, the discourse labeling model is on-line adjusted based on the corrected discourse of the current-turn user question;
when the discourse of the current-turn user question is labeled as DE, the discourses in the old boundary are cleared, and a dialog log and the discourses in the old boundary are ignored in answering the next-turn user question; and
DE is determined by the internet question answering system, or DE is triggered by a user discourse end event and detected by the internet question answering system.

US Pat. No. 10,713,312

SYSTEM AND METHOD FOR CONTEXT-LAUNCHING OF APPLICATIONS

DOAT Media Ltd., Tel Avi...

1. A method for executing actions based on contextual scenarios related to a user device, comprising:determining at least one variable based on at least one signal captured by at least one sensor of the user device, wherein at least one of the at least one variable is a personal variable;
generating at least one insight based on the at least one variable;
generating a weight factor for at least one of the at least one insight, wherein each generated weight factor indicates a level of confidence in each insight;
generating a context for the user device based on the at least one insight and the generated weight factors, wherein the context represents a current state of the user as demonstrated by the at least one insight;
determining, based on the context, a user intent, wherein the user intent includes at least one action; and
causing execution of the at least one action on the user device based on the determined context and the determined user intent.

US Pat. No. 10,713,311

AUDIENCE ON NETWORKED DEVICES

ADELPHIC LLC, Irvine, CA...

1. A computer-implemented method comprising:receiving information from a source, the information associated with a device identifier, wherein the source corresponds to a networked device;
determining, based on the device identifier, a unique user identifier, wherein the unique user identifier identifies a user independent of network, media, and location;
identifying at least one user attribute based on the received information;
associating the user attribute with the unique user identifier;
storing the user attribute in a repository, wherein the repository stores a plurality of other user attributes associated with the unique user identifier, the other stored user attributes being received from a plurality of different sources, wherein the plurality of different sources correspond to a plurality of different devices;
scoring the user based on a model, wherein the model is an inference model computed using a learning algorithm, wherein the model is based on an inferred user attribute, wherein the inferred user attribute comprises a prediction attribute that comprises a propensity of a user performing a user action indicating interest for an event, and wherein the propensity comprises a likelihood of the user performing the user action in response to being presented with a particular advertisement, wherein the propensity is based on the user attributes from multiple different sources stored in the repository, and wherein the inference model is used to create inferred attributes for users without such attributes; and
targeting the user at one or more of the different devices based on the scoring.

US Pat. No. 10,713,310

INTERNET OF THINGS SEARCH AND DISCOVERY USING GRAPH ENGINE

SAP SE Walldorf, (DE)

1. A system comprising:at least one hardware processor; and
a computer-readable medium storing instructions that, when executed by the at least one hardware processor, cause the at least one hardware processor to perform operations comprising:0
obtaining, from a database, a graph structure and flat data corresponding to the graph structure, the graph structure containing a plurality of nodes, each node corresponding to a data type of the flat data and corresponding to one or more pieces of data in the flat data of the corresponding data type, the graph structure containing at least one node corresponding to a first data type and at least one node corresponding to a second data type different than the first node type, the graph structure further containing a plurality of edges connecting one or more of the plurality of nodes, each edge corresponding to a link between an attribute of a node at one side of the edge and an attribute of a node at another side of the edge;
receiving a search query, the search query containing one or more search terms;
removing stop words from the one or more search terms to obtain modified search terms;
for each of the modified search terms, searching the pieces of data from the flat data to locate one or more matching pieces of data from the flat data, wherein a piece of data from the flat data matches if it contains at least one attribute with a value that is similar to the modified search term;
for each matching piece of data from the flat data:
calculating a fuzzy match score, wherein the fuzzy match score indicates how similar the at least one attribute in the matching piece of data is to the corresponding search term; and
calculating a match frequency score, wherein the match frequency score indicating how many attributes in the matching piece of data are similar to the corresponding search term;
for each node in the graph structure, calculating a ranking score based on a combination of the fuzzy match score and the match frequency score for a corresponding piece of data from the flat data, if such a fuzzy match score and match frequency score exist for the corresponding piece of data from the flat data, as well as based on combinations of fuzzy match scores and match frequency scores for all matching pieces of data in the flat data, weighted based on distance along a shortest possible path between the node and a node corresponding to the corresponding matching piece of data in the flat data; and
returning one or more search results based on the ranking scores of nodes corresponding to pieces of data for the one or more search results.

US Pat. No. 10,713,309

RESULTS FROM SEARCH PROVIDERS USING A BROWSING-TIME RELEVANCY FACTOR

INTERNATIONAL BUSINESS MA...

1. A method for searching Web pages comprising:identifying query criteria entered into a search provider;
determining a plurality of Web pages that satisfy the query criteria;
ascertaining a page ranking for each of the plurality of Web pages, wherein each page ranking is based upon at least one relevancy factor; and
presenting ordered results for the query criteria, which are ordered by the ascertained page rankings,
wherein the at least one relevancy factor includes a browsing-time factor,
wherein the browsing-time factor is determined based upon a behavioral event of a user at the plurality of Web pages gathered by a behavioral capture engine, an elapsed time taken by the user before the user returns to the search provider gathered by a return-to-engine timer, and a cumulative score calculated from a first set of scores and a second set of scores,
wherein the first set of scores correspond to types of behavioral actions performed by the user on a browsed Web page gathered by the behavioral capture engine,
wherein the second set of scores correspond to time spent by the user at the browsed Web page and the elapsed time taken by the user to return to the search provider from the browsed Web page gathered by the return-to-engine timer, and
wherein the browsing-time factor disregards input from a computing device in response to a fixed number of accesses which have occurred from the computing device per a predetermined time period.

US Pat. No. 10,713,308

METHOD AND SYSTEM FOR GENERATING AN OFFLINE SEARCH ENGINE RESULT PAGE

YANDEX EUROPE AG, Lucern...

1. A method of processing a search query, the method executable at an electronic device, the electronic device storing, in its permanent storage, an offline query result database that has been generated and pre-loaded into the permanent storage by a search engine server via a communication network prior to execution of the method, the offline query result database comprising:an offline query index storing one or more offline search queries, each of the one or more offline search queries being associated with a respective offline search engine result page (SERP) template pointer;
an offline SERP template index storing one or more offline SERP templates, each of the one or more offline SERP templates comprising a list of one or more element pointers, the one or more offline SERP templates comprising a pre-defined number of offline SERP templates, the pre-defined number having been determined by an operator of the search engine server to satisfy a certain number of search queries from a user;
at least one SERP elements index storing a plurality of SERP elements, each SERP element associated to at least one of the one or more element pointers, the plurality of SERP elements having been organized by a respective SERP element type;the method comprising:receiving a search query from the user associated with the electronic device;
determining whether the search query is stored in the offline query index by comparing the search query against the one or more offline search queries stored therein;
responsive to determining that the search query matches a given offline search query, determining the offline SERP template pointer associated with the given offline search query;
determining, based on the offline SERP template pointer, an associated offline SERP template stored within the offline SERP template index;
accessing the list associated with the associated offline SERP template;
retrieving, for each one or more element pointers of the list, a respective SERP element, from the at least one SERP elements index;
generating an offline SERP by compiling the retrieved SERP elements; and
displaying the offline SERP on the electronic device.

US Pat. No. 10,713,307

DYNAMIC SEARCH ENGINE FOR AN INDUSTRIAL ENVIRONMENT

Rockwell Automation Techn...

1. A system for searching industrial data, comprising:a memory that stores executable components; and
a processor, operatively coupled to the memory, that executes the components, the components comprising:
an indexing component configured to discover available data items distributed across multiple data sources of an industrial environment and to generate a federated data model that records respective locations of the data items, wherein the data items comprise at least data tags of one or more control programs stored on one or more industrial controllers;
a device interface component configured to render a graphical display on a client device associated with a first user, wherein the graphical display renders graphical icons of respective industrial assets that are part of the industrial environment;
a search component configured to, in response to selection of a graphical icon, of the graphical icons, via interaction with the graphical display, initiate a search of the federated data model using an industrial asset represented by the graphical icon as a search criterion; and
a notification component configured to, in response to the selection of the graphical icon,
generate a work order to investigate a performance issue relating to the industrial asset, wherein the performance issue is indicated by results of the search of the federated data model,
select a second user, from a set of available users, based on a relevance of the second user's experience relative to the industrial asset and the performance issue, and
send notification information to another client device associated with the second user, wherein the notification information defines the work order and contains the results of the search of the federated data model.

US Pat. No. 10,713,306

CONTENT PATTERN BASED AUTOMATIC DOCUMENT CLASSIFICATION

Microsoft Technology Lice...

1. A computer-implemented method for content pattern based document classification in a file management system having a network storage containing multiple documents accessible to multiple members via a computer network, the method comprising:receiving, from the network storage, data representing a first document and a second document, both the first and second documents containing words in sequences;
in response to receiving the data representing the first and second documents,
computing a longest common subsequence of words of the first and second documents, the longest common subsequence having a number of words shared by the first and second documents; and
upon determining that the number of words of the computed longest common subsequence is above a threshold,
indicating that the first document and the second document belong to a document class having the computed longest common subsequence as a content pattern; and
automatically classifying, using the content pattern having the computed longest common subsequence between the first and second documents, additional documents in the network storage as belonging to the same document class when a longest common sequence between the individual additional documents relative to the content pattern is above the threshold; and
modifying metadata of the classified additional documents in the network storage of the file management system to apply a class label corresponding to the document class.

US Pat. No. 10,713,305

METHOD AND SYSTEM FOR DOCUMENT SEARCH IN STRUCTURED DOCUMENT REPOSITORIES

EMC IP Holding Company LL...

1. A method for document search in a structured document repository, comprising:obtaining, from a client, a request, wherein the request comprises:
a document search query that specifies document content; and
a location constraint;
selecting, in a document search index associated with the structured document repository, a first index entry;
making a first determination that the document content matches a first index term of the first index entry; and
making a second determination, based on the first determination, that a first document location of the first index entry does not satisfy the location constraint;
selecting, based on the second determination, a second index entry in the document search index;
making a third determination that the document content matches a second index term of the second index entry;
making a fourth determination, based on the third determination, that a second document location of the second index entry satisfies the location constraint; and
providing, based on the fourth determination, information associated with the second index entry to the client.

US Pat. No. 10,713,304

ENTITY ARRANGEMENT BY SHAPE INPUT

International Business Ma...

1. A method, the method comprising:receiving, by the one or more processors, input from a user, wherein the user defines a portion of text data in a document associated with a shape;
responsive to receiving input from a user that defines a shape, generating, by one or more processors, a visual representation of the shape within a graphical user interface, wherein (a) a border of the shape defines an organizational structure for a given plurality of target entities that are placeable within the shape and (b) wherein the visual representation is associated with (i) a type of hierarchy, (ii) a data repository and (iii) a set of organized data;
determining, by the one or more processors, that the set of organized data (i) is associated with a computing device, (ii) indicates a document that includes a plurality of entities, and (iii) indicates a text content that includes the plurality of target entities;
determining, by the one or more processors, that a pattern of input in the visual representation matches a pattern for a given organizational structure stored in the data repository; and
generating, by the one or more processors, a modified organizational structure by modifying the given organizational structure stored in the data repository, wherein the modifying includes populating the visual representation with the plurality of target entities based, at least, in part on the text content.

US Pat. No. 10,713,303

DUAL INTERACTIVE VISUALIZATION SYSTEM FOR SENSITIVITY ANALYSIS TO RISK PREFERENCES FOR DECISION SUPPORT

International Business Ma...

1. A computer-implemented method for providing a risk preference visualization over a set of alternatives and over which an individual has a preference ordering, the method comprising:a) accessing at least one utility function that ranks the set of alternatives according to their utility to an individual;
b) receiving a selection of at least one probability distribution function from a database of stored probability distribution functions, in which each probability distribution function is a different family of probability distribution functions to define a particular probability distribution;
c) computing a certain equivalent based upon the utility function and the at least one probability distribution function, wherein the certain equivalent is defined as a risk-free amount of outcome rather than taking a chance on a higher risky amount;
d) graphically superimposing a plot of the certain equivalent that has been computed along with a plot of the at least one probability distribution function to create a simultaneous dual visualization thereof;
e) presenting the simultaneous dual visualization on a display device;
f) receiving another selection to at least one of:
one or more parameters of the probability distribution function,
accessing another at least one probability distribution function from the database, and
an over-ride the certain equivalent computed in response to receiving a selection of the at least one probability distribution function; and
g) in response to receiving the another selection, repeating steps c through f, otherwise in response to not receiving another selection then ending a processing of the steps c through f.

US Pat. No. 10,713,302

SEARCH PROCESSING METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A searching processing method, comprising:obtaining, when a first preset time interval arrives, a plurality of historical searching character strings collected within the first time interval;
generating at least one searching character variable sentence pattern corresponding to each of the plurality of historical searching character strings according to a preset searching character variable set;
accumulating a quantity of generating times corresponding to a searching character variable sentence pattern not belonging to a preset common searching sentence pattern set in the generated searching character variable sentence pattern;
adding a searching character variable sentence pattern whose quantity of generating times reaches a first preset threshold of a quantity of times to the preset common searching sentence pattern set;
obtaining a current searching character string sent by a client; and
in response to the current searching character string:
determining a searching character variable sentence pattern belonging to the preset common searching sentence pattern set in at least one searching character variable sentence pattern corresponding to the current searching character string as a target searching character variable sentence pattern,
performing a search query against a database of search templates for media content, the search query including the target searching character variable sentence pattern, and
sending searching result data corresponding to the target searching character variable sentence pattern to the client, the search result data including one or more content items matching the target searching character variable sentence pattern.

US Pat. No. 10,713,301

FLEXIBLE BASELINES IN AN OPERATING PLAN DATA AGGREGATION SYSTEM

RIGHT90, INC., Santa Cla...

1. A computer implemented method of maintaining information in multiple OLAP cubes data structures of a database of a computer and propagating information in real-time through the OLAP cubes to reduce delays in generating an updated baseline forecast, comprising:for each of multiple organizations, dedicating an instance of one of the OLAP cubes to each of the organizations;
for each of the multiple organizations, performing by the computer programmed with code stored in a memory and when the code is executed by a processor of the computer to configure the computer into a machine for:
partitioning each of the OLAP cubes of the database into at least a first partition and a second partition;
receiving a set of initial forecast data representing a prediction or judgment for a future event by the computer;
for each organization, storing the forecast data in the first partition of the OLAP cube of the database dedicated to the organization;
incorporating the set of initial forecast data into the database through the instance of the OLAP cube for analytical processing dedicated to the organization;
processing the initial forecast data by the computer to determine the prediction or judgment for the future event and generating an initial baseline forecast from information stored in the database, including the initial forecast data;
receiving updates to the information stored in the database on an asynchronous or random basis, the updates including changes to the initial forecast data and comments about the initial forecast data;
for each organization, updating the first partition of the OLAP cube of the computer database every time T1, wherein T1 is an amount of time;
identifying some updated information as private and remaining updated information is non-private;
identifying some updated information as allowed and the remaining updated information as denied;
processing the updates by the computer to incorporate the non-private and allowed updates into the database, the database including updates to the initial forecast data for any changes to the initial forecast data;
associating any comments about the initial forecast data including any comments about the updated forecast data, with the forecast data;
propagating the processed updates, the received comments, and the received changes to the initial forecast data in essentially real-time throughout the database through the instance of the OLAP cube dedicated to the organization to (i) associate the received comments and changes with the forecast information and (ii) asynchronously update the baseline forecast with the received updated non-private information changes of the forecast information in essentially real-time;
associating the received comments and changes with the forecast information;
asynchronously updating the baseline forecast with the received changes of the forecast information in essentially real-time;
for each organization, storing the updates in the second partition of the OLAP cube dedicated to the organization;
for each organization, updating the second partition of the OLAP cube dedicated to the organization every time T2, wherein T2 is an amount of time and T2 is less than T1 for each organization; and
generating an updated baseline forecast from the updated OLAP cube and the initial baseline forecast.

US Pat. No. 10,713,300

USING DISTRIBUTED STATE MACHINES FOR HUMAN-TO-COMPUTER DIALOGS WITH AUTOMATED ASSISTANTS TO PROTECT PRIVATE DATA

GOOGLE LLC, Mountain Vie...

1. A method implemented by one or more processors within a security zone, comprising:receiving, at an automated assistant client implemented by one or more of the processors of a client device within the security zone, a free form natural language query from a user, wherein the free form natural language query is answerable based on private information that is available from one or more resources within the security zone, wherein the one or more resources are not stored on the client device, and wherein the security zone comprises a plurality of networked computing devices behind a firewall;
providing, via the firewall, first data indicative of the free form natural language query to a semantic processor, wherein the semantic processor is outside of the security zone and cannot directly access the one or more resources within the security zone;
receiving, via the firewall and at one or more of the processors within the security zone, from the semantic processor, second data indicative of a state machine, wherein the state machine is implementable to obtain the private information from one or more of the resources within the security zone;
implementing, by one or more of the processors within the security zone, the state machine to obtain the private information from one or more of the resources within the security zone;
generating, based on the state machine and the obtained private information, natural language output that conveys information responsive to the free form natural language query; and
providing, by the automated assistant client, at one or more output components, the natural language output.