US Pat. No. 10,922,533

METHOD FOR FACE-TO-UNLOCK, AUTHENTICATION DEVICE, AND NON-VOLATILE STORAGE MEDIUM

BEIJING KUANGSHI TECHNOLO...

1. A method for face-to-unlock, comprising:obtaining to-be-verified expression data of a to-be-verified expression of a to-be-verified object;
comparing the to-be-verified expression data with pre-stored expression data to obtain a comparison result; and
in the case where the comparison result indicates that the to-be-verified expression data matches the pre-stored expression data, releasing the lock,
wherein the to-be-verified expression data and the pre-stored expression data include a three-dimensional point coordinate sequence of a plurality of landmarks on a face.

US Pat. No. 10,922,532

INTERACTIVE SEATING SYSTEM AND METHOD FOR INTERACTING WITH A CROWD

INTERNATIONAL BUSINESS MA...

1. An interactive seating system, comprising:a first plurality of seats disposed within a first section of a venue;
a first sensor device directed towards the first section and configured to observe each of the first plurality of seats;
a second plurality of seats disposed within a second section of the venue;
a second sensor device directed towards the second section and configured to observe each of the second plurality of seats;
a first processing circuit configured to receive data from the first sensor device and the second sensor device and to interpret an emotional state of each of a first plurality of occupants of the first plurality of seats and each of a second plurality of occupants of the second plurality of seats based on the received data from the first sensor device and the second sensor device, respectively;
a second processing circuit configured to receive the interpreted emotional state of each of the first plurality of occupants, to receive the interpreted emotional state of each of the second plurality of occupants, and to compare the interpreted emotional state of each of the first plurality of occupants with the interpreted emotional state of each of the second plurality of occupants; and
an output device configured to automatically produce an output, that is observable at the venue by each of the first plurality of occupants and each of the second plurality of occupants, based on the comparison of the interpreted emotional state of each of the first plurality of occupants with the interpreted emotional state of each of the second plurality of occupants,
wherein the first processing circuit and the second processing circuit are computer systems,
wherein the output device includes an output unit disposed within each of the first plurality of seats disposed within the first section of the venue and each of the second plurality of seats disposed within the second section of the venue, and
an output of the output unit disposed within each of the first plurality of seats disposed within the first section of the venue is different from an output of the output unit disposed within each of the second plurality of seats disposed within the second section of the venue based on the comparison of the interpreted emotional state of each of the first plurality of occupants with the interpreted emotional state of each of the second plurality of occupants.

US Pat. No. 10,922,531

FACE RECOGNITION METHOD

PEGATRON CORPORATION, Ta...

1. A face recognition method, comprising:receiving an input image;
performing face recognition on the input image by using a first convolutional neural network (CNN) model to generate at least one first region of interest (ROI), wherein each first ROI comprises a suspicious image, and a proportion value of a pixel value of the suspicious image in a pixel value of the first ROI is greater than a proportion value of the pixel value of the suspicious image in a pixel value of the input image;
performing face recognition on each first ROI by using a second CNN model to generate at least one second ROI, wherein a quantity of convolution operation layers of the second CNN model is less than a quantity of convolution operation layers of the first CNN model; and
displaying, in the input image, a mark corresponding to a position of the second ROI.

US Pat. No. 10,922,530

DISPLAY DEVICE AND OPERATING METHOD THEREOF WITH ADJUSTMENTS RELATED TO AN IMAGE DISPLAY ACCORDING TO BENDING MOTION OF THE DISPLAY DEVICE

SAMSUNG ELECTRONICS CO., ...

1. A display device comprising:a display;
a camera configured to capture an image;
a sensor configured to detect a bending motion of the display device; and
a control unit configured to:
based on the sensor detecting the bending motion of the display device, control the camera to operate and control the display to display a preview image for capturing the image by operating the camera in a portion of a first area of the display, and
based on the sensor detecting the bending motion of the display device, control the display to display a user interface for using functions of the camera in a portion of a second area of the display,
wherein the display is divided into the first area and the second area based on a position at which the display is bent, wherein the first area and the second area face each other when the display device is bent.

US Pat. No. 10,922,529

HUMAN FACE AUTHENTICATION METHOD AND APPARATUS, AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A human face authentication method, comprising:at a computing device having one or more processors and memory:
receiving an image-based authentication request from a specified object for a respective transaction, the specified object being a human user; and
in response to receiving the image-based authentication request:
obtaining an identification photograph of a specified object and a daily photograph of the specified object, wherein the identification photograph of the specified object and the daily photograph of the specified object each include a region corresponding to a human face;
designating a glasses region on the daily photograph of the specified object by using a glasses segmentation model, wherein the glasses segmentation model has been trained to label pixels in the daily photograph that correspond to regions of the human face in the daily photograph that are obscured by glasses;
in accordance with a determination that the regions of the human face in the daily photograph that are labeled as being obscured by glasses exceed a first threshold amount, modifying the daily photograph by changing pixel values of the regions of the human face in the daily photograph that are labeled as being obscured by glasses;
in accordance with a determination that the regions of the human face in the daily photograph that are labeled as being obscured by glasses do not exceed the first threshold amount, forgoing modifying the daily photograph by changing the pixel values of the regions of the human face in the daily photograph that are labeled as being obscured by glasses;
extracting features of a daily human face from the daily photograph of the specified object and features of an identification human face from the identification photograph of the specified object by using a respective authentication model depending on whether the daily photograph has been modified; and
approving the authentication request in accordance with a determination that a matching degree between the features of the daily human face and the features of the identification human face is greater than a second threshold amount.

US Pat. No. 10,922,528

SYSTEMS AND METHODS FOR TAGGING IMAGES FOR PLACEMENT IN PORTIONS OF A GRAPHICAL LAYOUT BASED ON RELATIVE CHARACTERISTICS OF DEPICTED FACES

Rovi Guides, Inc., San J...

1. A method for determining optimal placement of an image in a graphical layout, the method comprising:identifying a plurality of faces depicted in the image using facial recognition;
determining the relative brightness of each respective face of the plurality of faces;
determining whether the relative brightness of each respective face is below a threshold level of brightness; and
in response to determining that the relative brightness of any face is below the threshold level of brightness:
determining that the image cannot be placed in a portion of the graphical layout that will be dimmed; and
tagging the image with a negative identifier, indicating that the image cannot be dimmed.

US Pat. No. 10,922,527

FACE SPATIAL POSITIONING METHOD, FACE SPATIAL POSITIONING SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

BEIJING KUANGSHI TECHNOLO...

1. A face spatial positioning method, comprising:obtaining a facial image acquired by an image acquisition device;
performing facial area detection on the facial image, to determine position information of a facial area in the facial image; and
determining spatial position information of a face according to the position information of the facial area,
wherein determining spatial position information of the face according to the position information of the facial area comprises:
determining a distance and an angle between the face and the image acquisition device according to the position information of the facial area,
wherein determining a distance between the face and the image acquisition device as:

determining an angle between the face and the image acquisition device as:

where w and h indicate a width and a height of the rectangular area respectively, W indicates a width of the facial image, x indicates an abscissa of the lower left corner or the upper left corner of the rectangular area, r0 indicates the longest distance within which the image acquisition device performs facial recognition, and T indicates an inverse proportional coefficient.

US Pat. No. 10,922,526

METHOD FOR 3D OBJECT RECOGNITION BASED ON 3D PRIMITIVES

APPLICATIONS MOBILES OVER...

1. A computer-implemented method of 3D object recognition, the method comprising:acquiring a plurality of pictures of a 3D object;
reconstructing, from the plurality of pictures, a 3D point cloud reconstruction of the 3D object;
splitting the 3D point cloud reconstruction into a plurality of 3D descriptors, the 3D descriptors being split into a plurality of 3D primitives spatially connected through a connectivity graph, the connectivity graph describing a spatial connectivity of the 3D primitives forming the 3D object; and
performing a 3D match search in a 3D database based on the plurality of 3D primitives and the connectivity graph to identify the 3D object.

US Pat. No. 10,922,524

OPTICAL PATH MODULATOR AND MANUFACTURING METHOD THEREOF, FINGERPRINT IDENTIFICATION APPARATUS AND TERMINAL DEVICE

SHENZHEN WEITONGBO TECHNO...

1. A method of manufacturing an optical path modulator, wherein the optical path modulator is applicable to a fingerprint identification apparatus, for directing reflected light from a surface of a finger to an optical detection unit disposed below the optical path modulator, wherein the method comprises:forming an etch barrier layer on an etch slice according to an etch pattern;
fixing the etch slice to a tilt surface of a tilt groove in a carrier, the tilt surface of the tilt groove having a predetermined tilt angle with respect to a surface of the carrier, wherein the etch slice is cut according to a size of the tilt groove before fixing the etch slice within the tilt groove in the carrier, so as to enable the etch slice to be placed within the tilt groove;
performing etching on the etch slice using the etch barrier layer to manufacture an array of through holes having a plurality of tilt through holes on the etch slice, wherein each tilt through hole has a tilt angle that is the same as the predetermined tilt angle of the tilt surface, and the tilt angle is an angle between an axial direction of the tilt through hole and a normal direction perpendicular to a surface of the optical path modulator; and
forming the optical path modulator based on the etch slice having the array of through holes.

US Pat. No. 10,922,523

AUTHENTICATION USING PRISM

NEC CORPORATION, Tokyo (...

1. An apparatus comprising:a prism including a large surface at least a portion of which is a placing region for a finger, a small surface parallel to the large surface, a first inclined lateral surface and a second inclined lateral surface;
a light source that emits light to the first inclined lateral surface;
a first infrared light source arranged such that a first infrared ray light is incident on a portion of the finger not having contacted with the placing region for the finger, the first infrared light source emitting the first infrared ray light;
a second infrared light source arranged on a side opposite to the first infrared light source with respect to the prism and such that a second infrared ray light is incident on the portion of the finger not having contacted with the placing region for the finger, the second infrared light source emitting the second infrared ray light;
a first imaging sensor arranged below the small surface, the first imaging sensor receiving a light transmitted from the light source through the small surface to obtain a first image of finger;
a second imaging sensor receiving light transmitted from the light source, the first infrared light source and the second infrared light source through the second inclined lateral surface to obtain a second image of finger of which fingerprint pattern contrast is enhanced more than fingerprint pattern contrast of the first image; and
wherein the second imaging sensor receives the first infrared ray light and the second infrared ray light transmitted from the first infrared light source and the second infrared light source through the second inclined lateral surface to obtain a third image for a blood vessel of the finger.

US Pat. No. 10,922,522

FINGER VEIN RECOGNITION SYSTEM

NXP USA, Inc., Austin, T...

1. A finger vein recognition system, comprising:an image capture device attached to a first surface;
an array of lights attached to a second surface that is in facing arrangement with the first surface and the image capture device; and
a microprocessor electrically connected to the image capture device and the array of lights, wherein
an intensity of each of the lights of the array of lights is adjustable by the microprocessor,
the microprocessor receives first image data from the image capture device and processes the first image data to determine finger positions,
the microprocessor receives second image data from the image capture device and processes the second image data to detect finger vein patterns therein, and
the second image data comprises
a plurality of image frames captured by the image capture device while simultaneously adjusting brightness of individual lights of the array of lights,
said simultaneously adjusting the brightness is performed such that a gray histogram of finger positions have a uniform distribution, and
the plurality of image frames are averaged to generate the second image data.

US Pat. No. 10,922,521

DISPLAY DEVICE, METHOD FOR OPERATING DISPLAY DEVICE AND ELECTRONIC DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A display device comprising: a display panel, a photosensitive image sensor for pinhole imaging, and a pressure sensing sensor, wherein the display panel comprises a display area and has a display side and a back side opposite to the display side, the photosensitive image sensor and the pressure sensing sensor are stacked in the display area of the display panel and are located on the back side of the display panel, the pressure sensing sensor is configured to sense a pressing action on the display side of the display panel, the photosensitive image sensor is configured to detect an image of a texture on the display side of the display panel, wherein the pressure sensing sensor is stacked between the photosensitive image sensor and the back side of the display panel, and wherein the pressure sensing sensor comprises a first electrode, a second electrode, and a pressure sensing layer,the first electrode, the second electrode, and the pressure sensing layer are disposed in a stack,
the pressure sensing layer is disposed between the first electrode and the second electrode,
the first electrode is closer to the display panel than the second electrode,
wherein a refractive index of the first electrode, a refractive index of the pressure sensing layer, and a maximum imaging angle of the pinhole imaging comply with:

in which n1 is the refractive index of the first electrode, n2 is the refractive index of the pressure sensing layer, and ?1 is the maximum imaging angle of light incident from the display side of the display panel through apertures to be imaged on the photosensitive image sensor.

US Pat. No. 10,922,518

CHIP PACKAGE STRUCTURE, CHIP PACKAGE METHOD AND TERMINAL DEVICE

SHENZHEN GOODIX TECHNOLOG...

1. A chip package structure, comprising:an optical sensing chip, comprising a first surface and a second surface, wherein the first surface is provided with a first pad, the second surface is provided with a connecting end, a Through Silicon Via (TSV) is disposed between the first pad and the connecting end, and the first pad is electrically connected to the connecting end through a Redistribution Layer (RDL) in the TSV, and the connecting end is configured to implement an electrical connection between the chip package structure and exterior; and
an optical path modulating structure, disposed above the first surface, and configured to perform an optical path modulation on an optical signal reflected from a human finger and make the signal incident on the first surface, or perform an optical path modulation on an optical signal emitted from the first surface and make the signal exit to the human finger.

US Pat. No. 10,922,517

PIXEL CIRCUIT AND DISPLAY PANEL

CHENGDU BOE OPTOELECTRONI...

1. A pixel circuit, comprising: a driving sub-circuit, a writing sub-circuit, a light-emitting device and a fingerprint information output sub-circuit, whereinthe writing sub-circuit is coupled to the driving sub-circuit, a first signal terminal and a data signal terminal, and the writing sub-circuit is configured to write a data signal from the data signal terminal to the driving sub-circuit under control of a signal from the first signal terminal;
the driving sub-circuit is further coupled to an anode of the light-emitting device and a first voltage terminal, and the driving sub-circuit is configured to drive the light-emitting device to emit light by using a voltage from the first voltage terminal, and is configured to provide a coupling capacitance to acquire fingerprint information; and
the fingerprint information output sub-circuit is coupled to the anode of the light-emitting device, a third signal terminal and a signal reading line, and the fingerprint information output sub-circuit is configured to output a signal acquired at the anode of the light-emitting device as the fingerprint information to the signal reading line under control of a signal from the third signal terminal;
wherein the driving sub-circuit includes a display driving sub-circuit and an acquisition sub-circuit;
the display driving sub-circuit is coupled to the anode of the light-emitting device and the first voltage terminal, and the display driving sub-circuit is configured to drive the light-emitting device to emit light by using the voltage from the first voltage terminal; and
the acquisition sub-circuit is coupled to the display driving sub-circuit and a second signal terminal, and the acquisition sub-circuit is configured to acquire the fingerprint information under control of a signal from the second signal terminal and the display driving sub-circuit; wherein
the acquisition sub-circuit includes an acquisition capacitor and a gating transistor;
a gate of the gating transistor is coupled to the second signal terminal, a first electrode of the gating transistor is coupled to the display driving sub-circuit, and a second electrode of the gating transistor is coupled to one end of the acquisition capacitor;
another end of the acquisition capacitor is coupled to the anode of the light-emitting device; and
one end of both ends of the acquisition capacitor serves as an electrode for providing the coupling capacitance;
or
wherein the driving sub-circuit includes a driving transistor and a multiplex capacitor;
a gate of the driving transistor is coupled to the writing sub-circuit, a first electrode of the driving transistor is coupled to the first voltage terminal, and a second electrode of the driving transistor is coupled to the anode of the light-emitting device;
one end of the multiplex capacitor is coupled to the first electrode of the driving transistor, and another end is coupled to the gate of the driving transistor; and
one end of both ends of the multiplex capacitor serves as an electrode for providing the coupling capacitance.

US Pat. No. 10,922,516

DISPLAY DEVICE WITH FINGERPRINT AREA

Samsung Display Co., Ltd....

1. A display device having a display area comprising a first area in which a fingerprint is recognized and a second area in which a fingerprint is not recognized, and a non-display area disposed on the outside of the display area, the display device comprising:a fingerprint sensing unit disposed to overlap with the first area;
a first pixel set disposed to overlap with the first area; and
a second pixel set disposed to overlap with the second area,
wherein the display device is configured to provide a first voltage signal as a first scan signal to the first pixel set and a second voltage signal as a second scan signal to the second pixel set with different frequency periods than the first voltage signal, the first voltage signal being a variable frequency signal comprising:
a first period during which the first voltage signal is a first frequency signal;
a second period during which the first voltage signal is a second frequency signal having a lower frequency than the first frequency signal; and
a third period during which the first voltage signal is the first frequency signal.

US Pat. No. 10,922,514

ELECTRONIC APPARATUS

Kyocera Document Solution...

1. An electronic apparatus, comprising:an authentication method selecting unit that automatically selects one user authentication method among predetermined plural user authentication methods on the basis of an output from at least one among an imaging device built in this electronic apparatus, an acceleration sensor built in this electronic apparatus and a position detecting device built in this electronic apparatus; and
a user authenticating unit that performs user authentication in accordance with the user authentication method selected by the authentication method selecting unit,
wherein if a default user authentication method is a passcode authentication or a pattern input authentication, then the authentication method selecting unit (a) determines whether a person other than a user is detected in a photographed image obtained from the imaging device or not, and (b1) selects a fingerprint authentication if a person other than a user is detected in the photographed image and (b2) selects the passcode authentication or the pattern input authentication if a person other than a user is not detected in the photographed image.

US Pat. No. 10,922,512

CONTACTLESS FINGERPRINT RECOGNITION METHOD USING SMARTPHONE

WINNINGI CO., LTD., Seou...

1. A contactless fingerprint recognition method using a smartphone configured to generate a finger guide on a screen thereof and to obtain a fingerprint of a finger by positioning the finger to the finger guide through a camera built-in the smartphone, the method comprising:a lookup table generation step of calculating a correlation between a photographing pattern image obtained by photographing a standard pattern provided in advance by an execution of a smartphone application and a standard pattern image pre-built in the smartphone and calculating a mapping relation of a pixel unit between the photographing pattern and standard pattern images to generate a Look Up Table (LTU);
a photographing step of suggesting the finger guide on the screen and generating a finger image using the camera built-in the smartphone;
a correction step of generating a standard finger image by correcting a size and a position of the finger image photographed in a state the finger image is out of a range of the finger guide and correcting a distortion of a camera lens through the lookup table;
a fingerprint image acquisition step of obtaining a fingerprint image of a fingerprint area from the standard finger image generated in the correction step; and
a recognition fingerprint data generation step of extracting feature points of at least one ridge formed in the fingerprint image to generate biometric data and converting the biometric data into optimal recognition fingerprint data after the fingerprint image acquisition step.

US Pat. No. 10,922,511

EMBEDDED FINGERPRINT RECOGNITION DEVICE BASED ON MOBILE TERMINAL

HuiZhou TCL Mobile Commun...

1. An embedded fingerprint recognition device based on a mobile terminal, comprising:a touch screen module comprising a touch panel, the touch panel comprising a groove defined therein, and a touch screen sensor attached to one side of the touch screen near the mobile terminal; and
a fingerprint recognition module embedded and disposed in the groove;
wherein the groove comprises a first groove part disposed in the one side of the touch screen attached on the mobile terminal, and the fingerprint recognition module comprises a flexible circuit board disposed in the first groove part;
wherein the groove further comprises a second groove part disposed in the other side of the touch screen away from the mobile terminal and connected to the first groove part, and the fingerprint recognition module further comprises a fingerprint recognition sensor disposed in the second groove part;
wherein a decorative ring is printed on the second groove part;
wherein the touch screen comprises first oblique edge parts disposed therein, so that a shape of the first groove part is a trapezoid having a long inner side and a short outer side in a longitudinal view.

US Pat. No. 10,922,509

LABEL READING SYSTEM

TOYOTA JIDOSHA KABUSHIKI ...

1. A label reading system that reads a label attached to a surface of at least one package placed on a conveyor vehicle driven by an operator while the conveyor vehicle passes through a label reading area, the surface of the at least one package extending in a direction parallel to a traveling direction of the conveyor vehicle, the label reading system comprising:a guide device located ahead of the conveyor vehicle in the traveling direction and configured to guide the conveyor vehicle toward the label reading area, by indicating a traveling speed of the conveyor vehicle, and a traveling position of the conveyor vehicle in a horizontal direction perpendicular to the traveling direction, the traveling speed and the traveling position being set in advance so as to enable reading of the label; and
an information reading device configured to take an image of the label in a direction perpendicular to the traveling direction of the conveyor vehicle in the label reading area, and read information on the label.

US Pat. No. 10,922,508

READER DEVICE FOR READING A MARKING COMPRISING A PHYSICAL UNCLONABLE FUNCTION

Merck Patent GmbH, Darms...

1. A method of reading with a reader device a marking comprising a physical unclonable function, PUF, comprising the following steps:a stimulation step, wherein a physical challenge according to a predetermined challenge-response authentication scheme corresponding to the PUF is created and applied to a PUF;
a detection step, wherein a response generated by the PUF in accordance with the challenge-response authentication scheme in reaction to the challenge is detected and a digital signal representing the response is generated;
a processing step, wherein the digital signal is processed in order to generate a hash value of the response by application of a predetermined cryptographic hash function to the digital signal,
an output step, wherein data representing the generated hash value as a first reading result is output, and
a storage step, wherein the first reading result being output in the output step is stored into a block of a first blockchain, wherein the first blockchain comprises at least one cross-blockchain pointer indicating a second reading result corresponding to a second blockchain such that the at least one cross-blockchain pointer maps the block of the first blockchain to a corresponding block of the second blockchain into the block of the first blockchain.

US Pat. No. 10,922,507

DATA READER WITH FRONT-FACING CONNECTOR PANEL

DATALOGIC USA, INC., Eug...

1. A data reader configured for connection to a cable attached to a connector, the data reader comprising:a housing including a front portion, a rear portion and a bottom portion, the housing having a top side, a bottom side and first and second lateral sides extending between the front portion and the rear portion;
a front window disposed in the front portion of the housing;
a cavity formed in the bottom portion of the housing, wherein the cavity includes a rear wall that is parallel to the front window; and
a first socket positioned proximate the rear wall, wherein the first socket is oriented with its opening facing toward the front window to receive a first connector of a first cable in a first direction that is oriented perpendicular to the front window.

US Pat. No. 10,922,506

ILLUMINATION DEVICE FOR AN OPTICAL SYSTEM OF A READER APPARATUS

SICPA HOLDING SA, Prilly...

1. An illumination device for an optical system of a reader apparatus, the illumination device comprising:an annular hollow body configured to receive a light field acquisition device;
a light source arranged externally around the annular hollow body; and
an external light reflector having a proximal end and a distal end, the external light reflector being configured to guide light originating from the light source to illuminate a zone at the distal end;wherein the external light reflector is a hollow piece arranged concentrically to the annular hollow body and with an internal wall made of light reflective material, the internal wall being a surface of revolution having:a first portion with increasing cross sections along a central axis from the proximal end to a first region with maximum cross section,
a second portion with decreasing cross sections from the first region to a second region with minimum cross section;
wherein the projection of the first portion on the central axis is shorter than the projection of the second portion on the central axis;and in that the illumination device further comprises a reflector element having a mirror finish outer surface arranged in front of the light source and configured to redirect light originating from the light source towards the first portion of the internal wall of the external light reflector.

US Pat. No. 10,922,505

RADIO FREQUENCY IDENTIFICATION INTERFACE FOR INTERACTING WITH A PRINTED CIRCUIT BOARD

International Business Ma...

1. A radio frequency identification (RFID) chip to be connected to a printed circuit board (PCB), the RFID chip comprising:an RFID antenna for receiving a radio wave from an RFID controller; and
a register driven by induction power generated by the radio wave received by the RFID antenna,
wherein the RFID chip is configured to write data indicated by a write request from the RFID controller into the register being driven by the induction power, without power being supplied to the PCB from a host device containing the PCB; and
wherein the RFID chip is configured to write data indicated by the write request from the RFID controller into the register asynchronously during runtime of the PCB.

US Pat. No. 10,922,502

STRUCTURAL UNIT FOR A LINEAR ACTUATOR

SKF Motion Technologies A...

1. A structural unit for a linear actuator, the structural unit comprising:a configuration configured to wirelessly absorb energy and to then electrically supply at least one electrical load with wirelessly absorbed energy.

US Pat. No. 10,922,501

INTELLIGENT TRACKING SYSTEM AND METHODS AND SYSTEMS THEREFOR

CULVERT-IOT CORPORATION, ...

1. A system for authenticating tracking devices, comprising:a tracking device that:
generates an encrypted message that indicates a tracking identifier that uniquely identifies the tracking device; and
modulates a response signal that includes the encrypted message for transmission via an antenna of the tracking device;
an authentication server that:
receives the encrypted message;
determines the device identifier based on the encrypted message; and
verifies the device identifier based on a list of known device identifiers, wherein the list of known device identifiers indicates device identifiers of valid tracking devices,
wherein the encrypted message further includes a secret pattern identifier that identifies a secret pattern to the authentication device.

US Pat. No. 10,922,500

HANDHELD DYNAMIC RADIO FREQUENCY IDENTIFICATION DEVICE AND SYSTEM

Z Tech, Inc., Chicago, I...

1. A universal RFID device comprising:radio frequency circuitry configured to:
read a low frequency RFID tag;
read a high frequency RFID tag;
read an ultra-high frequency RFID tag;
emulate a low frequency RFID tag;
emulate a high frequency RFID tag; and
emulate an ultra-high frequency RFID tag; and
control circuitry configured to:
receive a first command to read a first RFID tag;
control the radio frequency to read the first RFID tag based on the first command;
receive a second command to emulate a second RFID tag; and
control the radio frequency to read the first RFID tag based on the first command.

US Pat. No. 10,922,499

CARD READER

NIDEC SANKYO CORPORATION,...

1. A card reader comprising:a break-in sensing circuit structured to sense at least one of:
a state of the break-in sensing circuit being broken,
a state of the break-in sensing circuit being short-circuited,
a state of a case having been removed, and
a state of the card reader having been removed; and
a security circuit structured to output a break-in sensing signal into the break-in sensing circuit, and receive a returned break-in sensing signal that returns from the break-in sensing circuit;
wherein the security circuit comprises an output terminal to output the break-in sensing signal, and an input terminal to receive the returned break-in sensing signal;
the break-in sensing signal is input to an input section of the break-in sensing circuit from the output terminal of the security circuit, and then output from an output section of the break-in sensing circuit as the returned break-in sensing signal, and input to the input terminal of the security circuit;
the break-in sensing signal is a pulse signal; and
at least either one of the output terminal and the input terminal of the security circuit comprises a protection element between the terminal itself and an earth ground,
wherein the break-in sensing circuit is one of a circuit by pattern wiring, a circuit by a switch, and a hybrid circuit including pattern wiring and a switch, and
wherein, with the output terminal and the input terminal of each one in the security circuit being defined as one port in combination, one port is assigned for a connection to the break-in sensing circuit, in the case where the break-in sensing circuit is an element for sensing that the card reader has been removed from a higher-level device where the card reader is installed.

US Pat. No. 10,922,498

METHOD FOR SIMULTANEOUSLY TRANSLATING LANGUAGE OF SMART IN-VEHICLE SYSTEM AND RELATED PRODUCTS

WING TAK LEE SILICONE RUB...

1. A method for simultaneously translating a language of a smart in-vehicle system, wherein the method comprises:receiving, by a smart in-vehicle device, a first language to be played;
acquiring, by the smart in-vehicle device, a first voice of a navigation software, wherein the first voice is a second language, and constructing an input data Xt at a current time t of a cyclic neural network according to the first voice; and
acquiring, by the smart in-vehicle device, an output result St-1 at a previous time of the hidden layer of the cyclic neural network and a weight W; allocating, by the smart in-vehicle device, m threads, and dividing the weight W into m weight blocks, and allocating the m weight blocks to m threads in one-to-one correspondence; dividing the output result St-1 into m output blocks, and dividing the input data Xt into m input blocks; wherein each of the first m?1 weight blocks contains 4 columns of weight W element values, the last weight block contains r columns of weight W element values; each of the first m?1 input blocks contains 4 rows of input data Xt element values, the last weight block contains r rows of weight Xt element values, each of the first m?1 output blocks contains 4 rows of St-1 element values, and the last weight block contains r rows of St-1 element values;
wherein each of the threads calls m input blocks, respectively, to perform an inner product operation with the element value of the weight block corresponding to each of the threads to obtain a first result, the first results of all threads are arranged to obtain a first calculation result, each of the threads calls m output blocks, respectively, to perform an inner product operation with the element value of the weight block corresponding to each of the threads to obtain a second result, the second results of all threads are arranged to obtain a second calculation result, the sum of the first calculation result and the second calculation result is calculated to obtain the output result St of the hidden layer at the time t, an activation operation is performed on St to obtain the output result Ot at the time t, the second voice corresponding to the first language is obtained according to the output result Ot, and the second voice is played;
the r is a remainder of M/4, and the M is a column value of the weight;
m=[M/4]+1.

US Pat. No. 10,922,497

METHOD FOR SUPPORTING TRANSLATION OF GLOBAL LANGUAGES AND MOBILE PHONE

WING TAK LEE SILICONE RUB...

1. A smart phone comprising a processor, a communication means and a speaker device, whereinthe communication means is configured to receive a calling request sent by a terminal, connect the calling request, establish a calling connection, and receive first voice information transmitted through the calling connection; and
the processor is configured to identify a first language and a first dialect that correspond to the first voice information, obtain a translation model corresponding to the first dialect, translate the first voice information of the first dialect into second voice information of a second dialect, and control the speaker device to play the second voice information of the second dialect;
the processor is configured to: if the translation model is a deep learning model, determine a first location range of a weight corresponding to the first dialect in the deep learning model, reserve an element value in the first location range of the weight, zero all remaining locations of the weight to obtain a first weight corresponding to the first dialect, and perform computation and translation by using the first weight and input data that corresponds to the first dialect, to obtain the second voice information of the second dialect.

US Pat. No. 10,922,496

MODIFIED GRAPHICAL USER INTERFACE-BASED LANGUAGE LEARNING

INTERNATIONAL BUSINESS MA...

1. A computer implemented method comprising:establishing a user language learning profile for a user, the user language learning profile indicating language learning preferences and user competency in understanding words of a target natural language;
based on text provided by a plurality of operating system graphical user interface (GUI) elements of an initial GUI of an operating system (OS) being in a source natural language, building and displaying, for the user, a modified GUI in which a plurality of OS GUI elements of the modified GUI provide translated text in the target natural language, the translated text being translated from the text in the source natural language, wherein an OS GUI element, of the plurality of OS GUI elements of the modified GUI, comprises a label for an interactive OS GUI element, the label replacing text in the source natural language displayed on the interactive GUI element in the initial GUI with translated text in the target natural language displayed on the interactive GUI element in the modified GUI;
selecting at least some of the plurality of OS GUI elements of the initial GUI for which to build at least some of the plurality of OS GUI elements of the modified GUI, wherein the modified GUI is incrementally updated over time with the at least some of the plurality of OS GUI elements of the modified GUI;
increasing, over a specified interval, and based on the user profile, a number of OS GUI elements of the initial GUI for which a number of OS GUI elements of the modified GUI are built and displayed to provide translated text in the target natural language that is translated from text in the source natural language; and
tracking the user competency in understanding words of the target natural language by, at least in part, tracking competency of the user in interacting with proper OS GUI elements, which are of the modified GUI and which provide translated text in the target natural language, to invoke desired tasks, wherein the selecting is based at least in part on the tracked competency of the user in interacting with the proper OS GUI elements of the modified GUI, wherein the tracking the user competency in understanding words of the target natural language by tracking competency of the user in interacting with proper OS GUI elements informs of one or more words, of the target natural language, which the user has trouble understanding, and wherein the selecting selects to build modified OS GUI elements for OS GUI elements, of the initial GUI, having labels in the source natural language that translate to those one or more words of the target natural language.

US Pat. No. 10,922,495

COMPUTERIZED ENVIRONMENT FOR HUMAN EXPERT ANALYSTS

MENT SOFTWARE LTD., Tel ...

1. A method providing a computerized environment for at least one human expert analyst community including a multiplicity of human expert analyst end users, the method including:for at least one organization including a human expert analyst community:
defining a prediction ontology stored in computer memory, including at least one predetermined grammatical structure for predictions generated by human expert analysts in the community, and wherein the grammatical structure for conditional predictions includes an antecedent clause and a consequence clause;
providing digitally represented analyst predictions, including at least one individual analyst prediction which is expressed in the prediction ontology, is conditional, and is associated with at least one individual known network location from among a universe of network locations within the organization's computerized data network at which individual known network location, at least one resource pertaining to said individual analyst prediction is stored;
providing a voting functionality enabling analysts to vote on predictions, wherein the voting functionality includes at least one prediction attracting more than N upvotes, including an Nth upvote and an (N+1)th upvote, the Nth upvote increases at least one prediction's crowd score prediction more than the (N+1)th upvote does; and
using a processor for generating and storing in computer memory a uniform resource identifier-embedded prediction graph comprising:
nodes, including at least first and second nodes which represent the individual analyst prediction's antecedent and consequence clauses respectively, and
edges, including at least one directional edge extending between the first and second nodes,
and wherein a uniform resource identifier identifying said individual known location is embedded in at least one of the nodes and edges.

US Pat. No. 10,922,494

ELECTRONIC COMMUNICATION SYSTEM WITH DRAFTING ASSISTANT AND METHOD OF USING SAME

Mitel Networks Corporatio...

1. An electronic communication system comprising:a communication server;
a context analyzer to determine a context within a communication thread on or received from the communication server;
a sentential template repository comprising a plurality of sentential templates; and
an auto-draft builder that receives context information associated with the context from a context repository and one or more sentential templates from the sentential template repository and prepares one or more responses, to an electronic communication in the communication thread, comprising the one or more sentential templates to be displayed on a user device,
wherein the one or more responses to be displayed are generated based on modifying the one or more sentential templates using at least a portion of the context information, and
wherein the context analyzer determines keywords in the communication thread and modifies each of the one or more sentential templates to include one or more of the keywords.

US Pat. No. 10,922,493

DETERMINING A RELATIONSHIP RECOMMENDATION FOR A NATURAL LANGUAGE REQUEST

SPLUNK INC., San Francis...

1. A computer-implemented method, comprising:processing a first natural language (NL) request, wherein the first NL request includes a first artifact;
determining that a first data relationship, associated with the first artifact and useable to process the first NL request, is unavailable in a first NL language processing system;
generating a first data relationship recommendation based on the first NL request, wherein the first data relationship recommendation includes a first element, a second element, and an action that specifies how the first element and the second element are to be linked; and
causing the first data relationship recommendation to be provided to a user.

US Pat. No. 10,922,492

CONTENT OPTIMIZATION FOR AUDIENCES

Adobe Inc., San Jose, CA...

1. A method for performing unsupervised content optimization, the method comprising:processing historic data to generate an audience affect model map that represents a first target emotional affect for communications between first and second communities, each of which includes a plurality of community members;
processing historic data to generate a topic affect model map that represents a second target emotional affect for communications related to a particular topic; and,
performing unsupervised content optimization on an input content document that (a) relates to said particular topic, and (b) is from a member of said first community to a member of said second community, wherein performing unsupervised content optimization comprises using said audience affect model map and said topic affect model map by
performing a candidate word selection using said audience affect model map and said topic affect model map to generate a preliminary list of candidate words;
pruning said preliminary list of candidate words to generate a final list of candidate words;
generating candidate word transformations for candidate words included in said final list of candidate words; and,
performing a transformation on said input content document using said generated candidate word transformations to generate an optimized content document.

US Pat. No. 10,922,491

NATURAL TRANSFER OF KNOWLEDGE BETWEEN HUMAN AND ARTIFICIAL INTELLIGENCE

XBRAIN, INC., Menlo Park...

1. A method comprising:receiving, using one or more processors, as part of a dialogue, a first input indicating a trainer's desire to provide knowledge or know-how to an artificially-intelligent agent;
subsequent to receiving the first input indicating the trainer's desire to provide knowledge or know-how to the artificially-intelligent agent, creating, using the one or more processors, a first natural training session to capture the knowledge or know-how for subsequent use by the artificially-intelligent agent;
receiving, using the one or more processors, the knowledge or know-how from the trainer, wherein receiving the knowledge or know-how includes observing one or more actions performed by a trainer, and wherein actions similar to the one or more actions performed by the trainer are to be performed by the artificially-intelligent agent responsive to a first prompt;
sending, using the one or more processors, as part of the dialogue, a first response to the trainer, the first response requesting the first prompt, wherein a prompt is a user request that, when received by the artificially-intelligent agent, prompts the artificially-intelligent agent to use the knowledge or know-how captured in the first natural training session to respond;
subsequent to sending the first response to the trainer, the first response requesting the prompt, receiving, using the one or more processors, as part of the dialogue, a second input from the trainer including the first prompt;
validating, using the one or more processors, a capability of the artificially-intelligent agent to correctly respond to requests related to the knowledge or know-how captured by the first natural training session; and
receiving, using the one or more processors, additional training after responding to requests using the knowledge or know-how captured in the first natural training session.

US Pat. No. 10,922,490

SYSTEM AND METHOD FOR AUTHORING ELECTRONIC MESSAGES

MICROSOFT TECHNOLOGY LICE...

1. A computing device, the computing device comprising:an electronic processor configured to receive a first fully composed electronic message;
generate a graphical user interface that includes the first electronic message;
categorize the first electronic message based on a message layout type associated with the first electronic message;
determine, with a sentiment analyzer, a first sentiment type and a first sentiment score associated with the first electronic message;
identify a first plurality of words, phrases, or both in the first fully composed electronic message and associated with the first sentiment type;
determine a second plurality of words, phrases, or both for replacing the first plurality of words, phrases, or both in the first fully composed electronic message;
create a second fully composed electronic message having the second plurality of words, phrases, or both replacing the first plurality of words, phrases, or both in the first fully composed electronic message and changing the first sentiment score of the first fully composed electronic message;
determine a second sentiment score and a second sentiment type associated with the second electronic message;
output the second electronic message if the second sentiment score is greater than the first sentiment score; and
output one or more selected from the group consisting of the message layout type, an option to select the message layout type, the second plurality of words, phrases, or both, the second sentiment type, and the second sentiment score associated with the second electronic message.

US Pat. No. 10,922,489

SCRIPT WRITING AND CONTENT GENERATION TOOLS AND IMPROVED OPERATION OF SAME

RivetAI, Inc., Culver Ci...

1. A method of operation in a computational system to operate on scripted narratives, the method comprising:for at least a portion of a narrative, the narrative which comprises of a plurality of scenes, and a number of characters who appear in one or more of the scenes, processing the at least a portion of a narrative by at least one natural language processor previously trained on a corpus of annotated scripted material to extract from the narrative a number of key entities and a number of key relationships that appear in the narrative where the corpus of annotated scripted material on which the at least one natural language processor was previously trained includes at least one narrative or portion of a narrative that is different than the narrative that the at least one natural language processor is currently processing;
generating at least one data structure that represents the extracted key entities and the extracted key relationships as a plurality of nodes and a plurality of edges that define logical associations between pairs of the nodes within the at least one data structure, where a plurality of the key entities are each represented by a respective node, and a number of the edges each respectively represent a respective relationship between a respective pair of the key entities which are each represented by respective nodes of a respective pair of the nodes; and
generating new scripted content by the at least one natural language processor previously trained on the corpus of annotated scripted material based at least in part on the at least one data structure.

US Pat. No. 10,922,488

COMPUTING NUMERIC REPRESENTATIONS OF WORDS IN A HIGH-DIMENSIONAL SPACE

Google LLC, Mountain Vie...

1. A method performed by one or more computers, the method comprising:receiving a request for a numeric representation for a particular text segment in a high-dimensional space;
determining, by accessing a data set that is stored on one or more non-transitory computer readable media and that associates each text segment in a vocabulary of text segment with a respective numeric representation of the text segment in the high-dimensional space, the numeric representation of the particular text segment; and
providing the numeric representation of the particular text segment in response to the request, wherein the data set has been generated by:
obtaining a set of training data, wherein the set of training data comprises sequences of text segments;
training a plurality of classifiers and an embedding function on the set of training data, wherein the embedding function receives an input text segment and maps the input text segment to a numeric representation in the high-dimensional space in accordance with a set of embedding function parameters, wherein each of the classifiers corresponds to a respective position surrounding the input text segment in a sequence of text segments, and wherein each of the classifiers processes the numeric representation of the input text segment to generate a respective text segment score for each text segment in a pre-determined set of text segments, wherein each of the respective text segment scores represents a predicted likelihood that the corresponding text segment will be found in the corresponding position relative to the input text segment, and wherein training the embedding function comprises determining trained values of the embedding function parameters;
processing each text segment in the vocabulary using the embedding function in accordance with the trained values of the embedding function parameters to generate a respective numeric representation of each text segment in the vocabulary;
associating each text segment in the vocabulary with the respective numeric representation of the text segment in the high-dimensional space; and
storing the data set on the one or more non-transitory computer storage media.

US Pat. No. 10,922,487

SYSTEMS AND METHODS FOR PROCESSING SHORTHAND ITEMS IN ELECTRONIC COMMUNICATIONS

DISH Technologies L.L.C.,...

1. A computer implemented method in an electronic communications system, the method comprising:receiving, by at least one computer processor, an electronic message for a recipient;
in response to receiving the electronic message, making a determination, by at least one computer processor, that there exists a shorthand item in the electronic message;
in response to the determination that there exists a shorthand item in the message, determining, by at least one computer processor, a number of times previous messages to the recipient included a replacement of the shorthand item with an expansion;
based on the determined number of times previous messages to the recipient included a replacement of the shorthand item with the expansion, determining, by at least one computer processor, whether to expand the shorthand item in the electronic message; and
if it was determined to expand the shorthand item in the electronic message based on the determined number of times previous messages to the recipient included a replacement of the shorthand item with the expansion, then expanding, by at least one computer processor, the shorthand item in the received electronic message.

US Pat. No. 10,922,486

PARSE TREE BASED VECTORIZATION FOR NATURAL LANGUAGE PROCESSING

INTERNATIONAL BUSINESS MA...

1. A method comprising:constructing a parse tree corresponding to a portion of narrative text, wherein the parse tree comprises a data structure representing a syntactic structure of the portion of narrative text as a set of tokens according to a grammar;
generating, using a token in the parse tree as a focus word, a context window comprising a set of words within a specified distance from the focus word, the distance determined according to a number of links of the parse tree separating the focus word and a context word in the set of words;
generating, for the focus word and the context word, a weight; and
generating, using the weight, a first vector representation of a first word, the first word being within a second portion of narrative text.

US Pat. No. 10,922,485

PLATFORM INTERPRETATION OF USER INPUT CONVERTED INTO STANDARDIZED INPUT

FinancialForce.com, Inc.,...

1. A method interpreting an input string, comprising:displaying, on a graphic user interface, a data set, the data set including a plurality of items that each include a numerically sortable attribute;
receiving via a user input a string including a first set of characters and a second set of characters positioned on either side of a dividing symbol;
converting the first set of characters into a first standardized input that establishes a set of the plurality of items of the data set to sort into a number of groups based on the numerically sortable attribute of the data set;
converting the second set of characters into a second standardized input that establishes how to delineate the set of the plurality of items of the data set into the number of groups based on the numerically sortable attribute of the data set; and
displaying, on the graphic user interface, the number of groups, each group populated by a subset of the set of the plurality of items of the data set as delineated by the second standardized input.

US Pat. No. 10,922,484

ERROR DETECTION IN HUMAN VOICE RECORDINGS OF MANUSCRIPTS

Amazon Technologies, Inc....

1. A system comprising:one or more processors; and
memory storing computer-executable instructions that, when executed, cause the one or more processors to perform operations comprising:
receiving text of a manuscript to be narrated by a person;
calibrating a speech-to-text algorithm, the calibrating including:
analyzing the text of the manuscript to identify one or more special words, the one or more special words including one or more words appearing equal to or greater than a threshold frequency in the text of the manuscript;
generating a user interface to present the one or more special words to be narrated by the person;
receiving training audio data corresponding to the one or more special words; and
training, using the training audio data, one or more machine learning models to perform speech recognition;
causing the user interface to present the manuscript to be narrated by the person;
receiving audio data of a narration of the manuscript by the person;
transcribing the audio data using at least the speech-to-text algorithm and a natural language understanding algorithm to create comparison text;
analyzing the comparison text with respect to the text of the manuscript to identify one or more differences in at least one word;
tagging the one or more differences between the comparison text and the text of the manuscript as one or more defects;
causing the user interface to present the comparison text including the tagging of the one or more defects;
receiving user input to accept at least one of the one or more defects; and
determining to re-record a portion of the manuscript based at least in part on the user input.

US Pat. No. 10,922,482

PASSING FUNCTIONAL SPREADSHEET DATA BY REFERENCE

GOOGLE LLC, Mountain Vie...

1. A method of processing data represented as an electronic spreadsheet, the method comprising:identifying a first cell of a first sheet of the electronic spreadsheet, the first cell having a first cell identifier and including a formula having a first function call, the first function call including an argument comprising a plurality of formula elements, wherein the plurality of formula elements comprise a second cell identifier and a first string;
identifying, based on the second cell identifier, a second cell associated with a function identifier;
identifying a value of the second cell, wherein the value of the second cell is a second string corresponding to a function name that corresponds to a second function call, the second string associated with a second sheet of the electronic spreadsheet;
determining, by a processor, a result of the formula using the function identifier, the first string and the second string, wherein the determining comprises:
performing the first function call to convert the second string into the second function call; and
performing the second function call to derive the result of the formula, the second function call is performed using the function identifier, the first string and one or more values that each correspond to one of one or more cells of a plurality of cells of the second sheet of the electronic spreadsheet; and
causing the result of the formula to be displayed in the first cell of the first sheet of the electronic spreadsheet.

US Pat. No. 10,922,481

VISUAL USER ATTENTION REDIRECTION WHILE FORM FILLING TO ENHANCE AUTO-FILL ACCURACY

International Business Ma...

1. A method comprising:presenting, by a computer, of an electronic form having a plurality of fields arranged in a natural reading order on a user interface device;
determining, from digitally-recorded historical input patterns of the electronic form, a strongest field-field pair relationship within the plurality of fields, wherein the strongest field-field pair relationship is determined by applying greater weight to more recently entered form field values in the digitally-recorded historical input patterns and by applying lesser weight to older field values in the digitally-recorded historical input patterns, and determining a confidence value for each of the plurality of fields using the applied greater weight and lesser weight, and wherein the strongest field-field pair relationship has the highest confidence value;
estimating, from the historical input patterns, a most likely input value for at least one field of the strongest field-field pair having the strongest relationship according to the determining;
providing, by a computer on the user interface device, the estimated input value for the at least one field as a first proposed auto-fill value;
presenting, by a computer on the user interface device, the first proposed auto-file value using a graphical indicator;
responsive to receiving, by a computer, via a user interface device, the acceptance of the first proposed auto-fill value or input of a replacement value in the first electronic form field:
determining, by a computer, from the digitally-recorded historical input patterns of the electronic form, a next stronger field-field pair relationship within the plurality of fields;
estimating, by a computer, a most likely next input value for the determined next electronic form field correlated historically to the value accepted or input into the first electronic form field;
indicating the estimated next input value for the next electronic form field, by a computer, in the electronic form presentation, as a proposed auto-fill value for the next form field; and
redirecting a user's attention from the first field to the next field having the next proposed auto-file value by moving or changing the graphical indicator.

US Pat. No. 10,922,480

PLACE-BASED INFORMATION PROCESSING METHOD AND APPARATUS

Alibaba Group Holding Lim...

1. A method of managing a digital collection of location-based annotations obtained via a mobile terminal device, the method implemented by one or more computing devices, the method comprising:receiving annotation information inputted by a first user;
capturing a first scene image in a place where the first user is located before or after receiving the annotation information inputted by the first user;
extracting a feature information of the first scene image;
acquiring geographical location information of the mobile terminal device;
sending the annotation information, the feature information, and the geographical location information, via the mobile terminal device, to a server, wherein sending the annotation information, the feature information, and the geographical location information enables the server to:
determine information of the place based at least in part on the geographical location information,
establish and store a correspondence relationship between the annotation information and the information of the place,
determine whether the feature information of the first scene image matches a feature information of a second scene image captured at the place by an image capturing apparatus of a second user, and
provide, when the feature information of the first scene image matches the feature information of the second scene image, the annotation information to the second user.

US Pat. No. 10,922,477

RULES/MODEL-BASED DATA PROCESSING SYSTEM FOR INTELLIGENT EVENT PREDICTION IN AN ELECTRONIC DATA INTERCHANGE SYSTEM

OPEN TEXT GXS ULC, Halif...

1. A system for electronic data interchange (EDI) management comprising:a networked EDI system configured to receive EDI documents over a network, capture EDI document data and deliver the EDI documents over the network;
a memory for storing the EDI document data and a delivery model representing element information of EDI documents of a first type and a corresponding delivery status;
a processor that is configured to perform a method comprising:
for an EDI document of the first type:
extracting elements from the EDI document of the first type and creating a document record for the EDI document of the first type, the document record comprising elements extracted from the EDI document of the first type, the extracted elements including an element indicating a requested delivery date;
determining a first delivery status for the EDI document of the first type by processing the extracted elements using a machine learning delivery model, the machine learning delivery model trained on a training set of elements to classify documents according to a plurality of delivery statuses; and
adding the first delivery status to the document record for the EDI document of the first type, the first delivery status accessible to a client computer via a presentation layer.

US Pat. No. 10,922,476

RESOURCE-EFFICIENT GENERATION OF VISUAL LAYOUT INFORMATION ASSOCIATED WITH NETWORK-ACCESSIBLE DOCUMENTS

Microsoft Technology Lice...

1. One or more computing devices for processing network-accessible documents, comprising:hardware logic circuitry, the hardware logic circuitry including: (a) one or more hardware processors that perform operations by executing machine-readable instructions stored in a memory, and/or (b) one or more other hardware logic units that perform the operations using a task-specific set of logic gates, the operations including:
receiving a set of markup-language documents that originate from a repository of the network-accessible documents, a number of documents in the set of markup-language documents being less that a total number of network-accessible documents in the repository;
storing the set of markup-language documents in a sample data store;
producing a set of object-model representations for a plurality of markup-language documents in the set of markup-language documents,
said producing including, for a given markup-language document, accessing information that is linked to the given markup-language document by at least one link, if any, specified in the given markup-language document,
an object-model representation associated with the given markup-language document including visual layout information that specifies a visual appearance of a page that is producible upon display of the given markup-language document by a browser application;
storing the set of object-model representations in an object-representation data store;
generating transformation logic based on the set of markup-language documents and the set of object-model representations, the transformation logic being configured to, when applied to new markup-language documents, convert the new markup-language documents into respective new object-model representations without retrieving at least some information identified by links in the new markup-language documents; and
storing the transformation logic in a model data store.

US Pat. No. 10,922,475

SYSTEMS AND METHODS FOR MANAGING DOCUMENTS CONTAINING ONE OR MORE HYPER TEXTS AND RELATED INFORMATION

Xerox Corporation, Norwa...

1. A method, comprising:receiving an index page and a document comprising text for scanning, the index page comprises one or more text phrases to be hyperlinked and additional information related to each text phrase, the additional information comprises a hyperlink corresponding to a text phrase, a page number of the text phrase and an ordinal number of occurrence of the text phrase on the page number;
scanning the index page to create a scanned index page;
performing an Optical Character Recognition (OCR) on the scanned index page to extract the one or more text phrases and the additional information related to each text phrase;
scanning the document to create a scanned version of the document;
performing OCR on the document to extract content of the document;
comparing the extracted additional information related to each text phrase with the content of the document, wherein comparing comprises searching for:
(i) a page number,
(ii) a text phrase on the page number, and
(iii) an ordinal number of the text phrase in the extracted content of the document;
receiving a selection of at least one text phrase of the one or more text phrases;
for each selected text phrase, embedding the corresponding hyperlink to the searched text phrase in the extracted content of the document;
creating a digital version of the document including the embedded hyperlink corresponding to each selected text phrase; and
sending the digital version of the document to a computing device of a user, where the digital version of the document includes the hyperlink corresponding to each selected text phrase.

US Pat. No. 10,922,474

UNSTRUCTURED UI

Intel Corporation, Santa...

1. A system for implementing an unstructured user interface, the system comprising:a hardware processor; and
a memory device including instructions, which when executed by the hardware processor, cause the hardware processor to implement:
a monitor circuit to monitor, at a compute device, input received at an electronic palette, the input producing a plurality of data elements;
a data tagging circuit to tag each of the plurality of data elements with a corresponding timestamp, and tag each of the plurality of data elements with a corresponding input location on the electronic palette, the input location comprising screen coordinates on the electronic palette corresponding to where each data element was drawn;
a data structure construction circuit to use the timestamps and the input locations of the plurality of data elements to construct the plurality of data elements into a data structure, based on a machine learning algorithm, wherein the timestamps are used to define records of the data structure, the input locations are used to define fields of the data structure, and carriage returns in the plurality of data elements are used to define one-to-many, many-to-one, or many-to-many relationships in the data structure; and
a user interface circuit to present a user interface to a user of the compute device, the user interface based on the data structure, and the user interface to receive changes to the data structure that revise the machine learning algorithm;
wherein to use the input locations of the plurality of data elements to construct the plurality of data elements into the data structure, the data structure construction circuit is to:
detect the input locations of each of the plurality of data elements; and
organize the plurality of data elements into a plurality of fields in a record of the data structure, wherein data elements that were input relatively closely in space to one another are organized as a single field in the plurality of fields in the record in the data structure and data elements that were input relatively far in space from one another are organized as separate multiple fields in the plurality of fields in the data structure.

US Pat. No. 10,922,473

SYSTEM AND METHOD FOR DISTRIBUTED DESIGN OF A VARIABLE DATA PUBLICATION

PTI Marketing Technologie...

1. A method, comprising:receiving, at a client device, layout information that includes instructions for formatting of a plurality of variable data fields;
defining, by a layout engine executing at the client device, a variable data template document based on the layout information and including the plurality of variable data fields;
generating, by a web form definition module executing at the client device, a user interface window wherein the user interface window displays a list of the plurality of variable data fields of the variable data template document;
receiving, through the user interface window, user input specifying a type of each of the plurality of variable data fields and one or more properties of each of the plurality of variable data fields wherein the type is included among a plurality of field types selectable through the user interface window;
generating a preview of a web form based upon the user input received through the user interface window;
defining, at the client device, a web form definition file to include each variable data field from the plurality of variable data fields wherein the web form definition file is defined at the client device based at least in part upon the user input, the web form definition file including instructions to generate the web form, the web form configured to receive field content data;
defining, at the client device, a variable data design file that includes the variable data template document and the web form definition file; and
transmitting, from the client device to the publication server, the variable data design file such that the publication server (1) composes the web form configured to be displayed and to receive the field content data associated with the plurality of variable data fields, (2) composes a variable data document based on the variable data template document and the field content data.

US Pat. No. 10,922,472

METHOD OF MANUFACTURING SEMICONDUCTOR DEVICE

SAMSUNG ELECTRONICS CO., ...

1. A method of manufacturing a semiconductor device, the method comprising:generating a pre-OPC mask layout including a notch design of which a boundary corresponds to an outer boundary of a combined mask pattern of a preliminary rectangular mask pattern and a hexagonal mask pattern that is placed on at least one side of the preliminary rectangular mask pattern;
dividing an edge of the hexagonal mask pattern of the combined mask pattern into a plurality of fragments, wherein the edge of the hexagonal mask pattern of the combined mask pattern is placed outside the preliminary rectangular mask pattern;
inputting mask data of the pre-OPC mask layout with the plurality of fragments to an optical proximity correction (OPC) model;
estimating a contour of a first target pattern transcribed from the combined mask pattern through simulation;
calculating an edge placement error (EPE) that is a difference between the contour and an edge of an intended target pattern;
determining a displacement of each of the plurality of fragments based on the EPE;
generating a corrected mask layout by moving each of the plurality of fragments by the displacement; and
forming a target mask and the semiconductor device based on the corrected mask layout.

US Pat. No. 10,922,471

HIGH PERFORMANCE REGULARIZED NETWORK-ON-CHIP ARCHITECTURE

Intel Corporation, Santa...

1. A computer-implemented method for programming a network-on-chip (NoC) onto an integrated circuit, the method comprising:determining a first portion of a plurality of registers to potentially be included in a NoC design;
determining routing information regarding datapaths between registers of the first portion of the plurality of registers;
determining an expected performance associated with the first portion of the plurality of registers;
determining whether the expected performance is within a threshold range;
including the first portion of the plurality of registers and the datapaths in the NoC design based on determining that the expected performance is within the threshold range, wherein the plurality of registers comprises:
a second portion of the plurality of registers configured to route data vertically away from a data source; and
a third portion of the plurality of registers configured to route data horizontally away from the data source;
receiving a program design associated with a function to be performed by the integrated circuit; and
generating instructions configured to cause circuitry corresponding to the NoC design to be implemented on the integrated circuit by compiling, based on the NoC design, the program design to generate a hardware implementation on the integrated circuit for the function and the NOC design.

US Pat. No. 10,922,470

METHOD AND SYSTEM OF FORMING SEMICONDUCTOR DEVICE

TAIWAN SEMICONDUCTOR MANU...

1. A method of forming a semiconductor device, the method comprising:providing a first circuit having a plurality of circuit cells, wherein the plurality of circuit cells includes a first circuit cell connected to a second circuit cell, and the first circuit cell includes a first pin cell;
wherein providing the first circuit having the plurality of circuit cells includes:
providing a connecting path to connect the second circuit cell to the first pin cell of the first circuit cell;
performing an Electromigration (EM) checking process upon the first circuit by incorporating a first parasitic capacitance of the first pin cell and a second parasitic capacitance of the connecting path into the EM checking process, wherein the first parasitic capacitance and the second parasitic capacitance are included in a loading capacitance file of the first circuit;
examining whether an EM violation exists in the first circuit in response to the EM checking process by determining whether a loading capacitance of the first pin cell is larger than a first predetermined capacitance determined according to an EM rule;
replacing the first pin cell by a second pin cell for generating a second circuit when the loading capacitance is larger than the first predetermined capacitance, wherein the second pin cell is different from the first pin cell; and
generating the semiconductor device according to the second circuit.

US Pat. No. 10,922,469

METHODS AND SYSTEMS OF ENABLING CONCURRENT EDITING OF HIERARCHICAL ELECTRONIC CIRCUIT LAYOUTS

Cadence Design Systems, I...

1. A processor-implemented method for at least two computers to concurrently create an electronic circuit layout, the method comprising:generating, by a processor, a plurality of top-level partitions from a circuit layout according to a predefined attribute, each respective top-level partition corresponding to a portion of the electronic circuit layout at a top level stored as a first database record including the predefined attribute;
generating, by the processor, a plurality of top-level delta views corresponding respectively to each top-level partition, wherein each respective top-level delta view is a cell view configured to store edits to the respective top-level partition as a second database record;
in response to receiving, from a client computer having access rights to the top-level partition, a command to modify the cell view from the top-level partition:
modifying, by the processor, the second database record corresponding to the top-level delta view, thereby resulting in a modified second database record containing a modified top-level delta view;
in response to receiving, from the client computer, a command to modify a subcell view from a top-level partition:
generating, by the processor, a plurality of sub-level partitions based upon the predefined attribute, each respective sub-level partition comprising the predefined attribute inherited from the top-level partition that corresponds to the portion of the electronic circuit layout at a sub level stored as a third database record including the predefined attribute;
generating, by the processor, a plurality of sub-level delta views corresponding respectively to each sub-level partition, wherein each respective sub-level delta view is a subcell view configured to store edits to the respective sub-level partition as a fourth database record; and
modifying, by the processor, the fourth database record corresponding to the sub-level delta view according to the command, thereby resulting in a modified fourth database record containing a modified sub-level delta view; and
displaying, by the processor, a representation of the modified sub-level delta view to the client computer having the access rights,
wherein the first database record and the third database record remain unmodified by the commands.

US Pat. No. 10,922,467

METHODOLOGY USING FIN-FET TRANSISTORS

SYNOPSYS, INC., Mountain...

1. A computer implemented method for designing a circuit, the method comprising:forming, using the computer, a plurality of cells, each cell characterized by:
a plurality of first shapes extending along a first direction, each first shape spaced, along a second direction substantially orthogonal to the first direction, from a neighboring first shape in accordance with a first pitch; and
a cell origin including a first cell coordinate associated with the second direction,
wherein the first cell coordinate is assigned in accordance with an integer multiple of the first pitch when the computer is invoked to form the plurality of cells representing the circuit, wherein each cell is further characterized by a plurality of second shapes extending along the second direction, each second shape spaced from a neighboring second shape along the first direction and in accordance with a second pitch, wherein the cell origin includes a second cell coordinate associated with the first direction, and wherein the second cell coordinate is assigned in accordance with a second integer multiple of the second pitch.

US Pat. No. 10,922,466

CELL LAYOUT OF SEMICONDUCTOR DEVICE

TAIWAN SEMICONDUCTOR MANU...

1. A device, comprising:a cell block comprising a pin, the pin being disposed at a Nth metal layer in a cell layout;
at least one first metal interconnect disposed at a (N+1)th metal layer above the Nth metal layer and stacked over the pin, the at least one first metal interconnect being electrically coupled to the pin; and
a plurality of second metal interconnects disposed at a (N+2)th metal layer and stacked over the at least one first metal interconnect, the plurality of second metal interconnects being parallel to each other, the plurality of second metal interconnects being electrically coupled to the at least one first metal interconnect, and the plurality of second metal interconnects forming an equivalent tapping point of the pin of the cell block,
wherein the equivalent tapping point and the pin are vertically overlapped with each other, and fabrication of the device is initiated after a design rule check (DRC) or a signal electromagnetic (SEM) simulation test is passed,
wherein at least one via connects the at least one first metal interconnect to at least one of the plurality of second metal interconnects, wherein the at least one first metal interconnect is perpendicular to the at least one of the plurality of second metal interconnects.

US Pat. No. 10,922,465

MULTI-INPUT LOGIC CIRCUITRY

Arm Limited, Cambridge (...

1. An integrated circuit, comprising:a first stage having a first group of logic structures coupled in series, wherein the first group of logic structures is activated with multiple signals;
a second stage having a second group of logic structures coupled in parallel, wherein the second group of logic structures is activated with the same multiple signals; and
a third stage having a first input, a second input, and an output, wherein the first input is coupled to the first stage, and wherein the second input is coupled to the second stage, and wherein the output provides an output signal based on the multiple signals.

US Pat. No. 10,922,464

RC TOOL ACCURACY TIME REDUCTION

Taiwan Semiconductor Manu...

1. A semiconductor device fabrication process for fabricating a first semiconductor device cell using a first process based on a first process parameter or material comprising:training an artificial intelligence to obtain a predictive artificial intelligence using training data as input, the training data comprising semiconductor device parameters of the first semiconductor device and the first process parameter or material;
providing a proposed process modification to the predictive artificial intelligence to generate a predicted cell delay by the predictive artificial intelligence; and
evaluating the predicted cell delay against a cell delay threshold.

US Pat. No. 10,922,463

USER DIALOG-BASED AUTOMATED SYSTEM DESIGN FOR PROGRAMMABLE INTEGRATED CIRCUITS

Xilinx, Inc., San Jose, ...

1. A method, comprising:conducting, using a computer hardware, a dialogue with a user, wherein the dialogue describes a user design for a programmable integrated circuit;
extracting, using the computer hardware, a first plurality of features for the user design from the dialog, wherein the first plurality of features specifies one or more cores and one or more values of customizable parameters for the one or more cores;
generating, using the computer hardware, a design specification for the user design based on the first plurality of features;
wherein the design specification specifies the one or more cores and the one or more values of customizable parameters for the one or more cores, and wherein the design specification is executable to control a plurality of computer-based design tools; and
generating a device configuration for the user design by performing a hardware design flow using the plurality of computer-based design tools operating under control of the design specification, wherein the design specification includes the one or more cores having the customizable parameters for the one or more cores set to the one or more values, and wherein the device configuration is loadable within the programmable integrated circuit to implement the user design.

US Pat. No. 10,922,462

INTELLECTUAL PROPERTY BLOCK VALIDATION AND DESIGN INTEGRATION FOR INTEGRATED CIRCUITS

SiFive, Inc., San Mateo,...

1. A method performed by a controller running on a computing device, the method comprising:unpacking a third-party IP block package to obtain the IP block files;
executing an IP block validation rule structure on the IP block files, wherein:
the IP block validation rule structure is encoded in a tool control language;
the IP block validation rule structure includes a plurality of validation tests, each validation test checking a different validity aspect of the IP block files in the IP block package; and
the IP block validation rule structure works with a design parameters data structure;
generating at least one report based on execution of the validation tests to the IP block files;
accessing the design parameters data structure, wherein the design parameters data structure includes values of design parameters of an integrated circuit design and the report on the IP block, wherein the IP block is incorporated into the integrated circuit design;
responsive to a command identifying the design parameters data structure, generating a register-transfer level data structure for an integrated circuit based on the design parameters data structure;
responsive to the command identifying the design parameters data structure, generating a software development kit for the integrated circuit based on the register-transfer level data structure;
responsive to the command identifying the design parameters data structure, generating a physical design data structure for the integrated circuit based on the register-transfer level data structure;
responsive to the command identifying the design parameters data structure, generating a test plan for the integrated circuit based on the design parameters data structure and acceptance criteria;
responsive to the command identifying the design parameters data structure, invoking tests for the integrated circuit based on the test plan, the register-transfer level data structure, the software development kit, and the physical design data structure to obtain a set of test results; and
transmitting, storing, or displaying a design data structure based on the register-transfer level data structure, the software development kit, the physical design data structure, and the test results.

US Pat. No. 10,922,461

METHOD AND APPARATUS FOR PERFORMING REWIND STRUCTURAL VERIFICATION OF RETIMED CIRCUITS DRIVEN BY A PLURALITY OF CLOCKS

Intel Corporation, Santa...

1. A method for designing a system on a target device, the method comprising:performing register retiming on an original design to generate a retimed design of the system;
identifying a maximum number of time frames that reflects a variation in functional behavior because of incorrect computation of initial states of changed flip-flops in the retimed design;
identifying compare points in the original design and the retimed design where signal values reflect initial states of one or more flip-flops;
performing a bounded sequential logic simulation within a time frame, wherein the maximum number of time frames determines an upper bound of the time frame; and
determining whether the changed flip-flops in the retimed design have initial states that are correct by comparing signal values at the compare points from the bounded sequential logic simulation.

US Pat. No. 10,922,460

APPARATUS AND METHOD FOR CONSTRUCTING PARAMETERIZED QUANTUM CIRCUIT

SAMSUNG SDS CO., LTD., S...

1. A method for constructing a parameterized quantum circuit, the method being performed in a computing device including one or more processors and a memory storing one or more programs executed by the one or more processors, the method comprising:inputting learning data to a quantum circuit;
receiving output data for the learning data from the quantum circuit and calculating an error rate from the output data; and
updating, based on the error rate, parameters for at least one sub-circuit block to be updated among one or more sub-circuit blocks included in the quantum circuit.

US Pat. No. 10,922,459

METHODS FOR CONVERTING CIRCUITS IN CIRCUIT SIMULATION PROGRAMS

TEXAS INSTRUMENTS INCORPO...

1. A method comprising:identifying a data object representing a first component of a circuit in a first format that is not recognized by a second circuit simulation program;
creating characteristics for the data object;
converting the data object in the first format to a converted data object in the second format using the created characteristics;
running a first simulation of the data object in the first format using the first simulation program;
running a second simulation of the converted data object in the second format using the second simulation program;
comparing at least one result of the first simulation to at least one result of the second simulation;
determining whether the converted data object is acceptable based on whether the comparison of the at least one result of the first simulation to the at least one result of the second simulation is within a predetermined limitation;
identifying a second data object representing a second component of the circuit in the first format that is recognized by the second circuit simulation program;
converting the second object in the circuit to a format that is recognized by the second simulation program;
generating a file that is compatible with the second simulation program; and
storing the converted data object and second data object in the file.

US Pat. No. 10,922,458

DYNAMIC BRIDGING OF INTERFACE PROTOCOLS

Synopsys, Inc., Mountain...

1. A method for a system level modeling simulation (SLMS) using a mapping registry that includes information related to mapping of attributes between different communication protocols of a plurality of communication protocols, the method comprising:generating, at initialization of the SLMS and using a portion of the information from the mapping registry, run-time bridging logic for translating communications between a first communication protocol and a second communication protocol of the plurality of communication protocols; and
inserting, at the initialization of the SLMS, the run-time bridging logic between a first representation of a first hardware block that uses the first communication protocol and a second representation of a second hardware block that uses the second communication protocol by modifying implementations of application programming interfaces in the first and second representations to intercept a communication payload transmitted from the first representation to the second representation the run-time bridging logic configured to translate, without accessing the mapping registry, at least one of the attributes in the communication payload from the first communication protocol to the second communication protocol only upon demand from the second representation.

US Pat. No. 10,922,457

AUTOMATED OPTIMIZATION OF LARGE-SCALE QUANTUM CIRCUITS WITH CONTINUOUS PARAMETERS

University of Maryland, ...

1. A method for optimizing quantum circuits, comprising:receiving a netlist containing information about a first list of quantum gates that form the quantum circuits;
performing a phase-polynomial reduction operation on the information about the first list of quantum gates to produce a second list of quantum gates that has functional equivalence to the first list of quantum gates, the phase-polynomial reduction operation including a reduction of Rz(?) gates where a rotation angle ? is any value in a range between 0 and 2?, a number of quantum gates in the second list of quantum gates being smaller than a number of quantum gates in the first list of quantum gates;
generating a new netlist containing information about the second list of quantum gates; and
providing the new netlist to implement a functionality of the quantum circuits using the second list of quantum gates.

US Pat. No. 10,922,456

CIRCUIT MODIFICATION FOR EFFICIENT ELECTRO-STATIC DISCHARGE ANALYSIS OF INTEGRATED CIRCUITS

Cadence Design Systems In...

1. A method for processing circuitry for electro-static discharge (ESD) analysis, comprising:receiving, by at least one processor, a netlist of a circuit;
determining, by the at least one processor, a set of ports of the circuit, the set of ports including at least one of a voltage source port, a voltage sink port, or an input-output port;
determining, by the at least one processor, ESD devices in the circuit;
determining, by the at least one processor, non-ESD devices in the circuit;
selecting, by the at least one processor, a set of non-ESD devices from the non-ESD devices in the circuit, wherein for each non-ESD device in the set of non-ESD devices at least one of (i) a least resistance path (LRP) value of at least one terminal of the non-ESD device from any port of the set of ports is less than a first threshold value or (ii) an effective resistance value between at least one terminal of the non-ESD device from any port of the set of ports is less than a second threshold value is true;
generating, by the at least one processor, a reduced netlist of the circuit from the netlist of the circuit, the reduced netlist including the set of ESD devices and the set of non-ESD devices;
simulating, by the at least one processor, the reduced netlist for ESD analysis.

US Pat. No. 10,922,455

METHODS AND SYSTEMS FOR MODELING AN ADVANCED 3-DIMENSIONAL BOTTOMHOLE ASSEMBLY

Halliburton Energy Servic...

1. A method comprising:(a) determining a drill string property for a drill string having a rotary steerable drill bit;
(b) determining a drilling parameter for a drilling operation;
(c) generating a finite element model of the drill string based on the drill string property and the drilling parameter, the finite element model comprising:
a three-dimensional model;
a plurality of nodes representing the drill string;
a plurality of contact elements for each node of the plurality of nodes, the contact elements arranged in opposing pairs with a first pair situated orthogonally to a second pair;
(d) performing a vibrational analysis of the finite element model;
(e) predicting a drill string behavior during the drilling operation based on the vibrational analysis, the drill string behavior including a directional behavior, a rate of penetration, or a drilling efficiency of the rotary steerable drill bit;
detecting, during the drilling operation, whether the rotary steerable drill bit has advanced in the drilling direction by at least a predetermined length that provides an interval to iterate at least some of steps (c)-(e); and
repeating steps (c)-(e) in response to detecting that the rotary steerable drill bit has advanced by at least the predetermined length.

US Pat. No. 10,922,454

METHOD AND APPARATUS FOR FAST ECONOMIC ANALYSIS OF PRODUCTION OF FRACTURE-STIMULATED WELLS

Landmark Graphics Corpora...

1. A computer-implemented method for performing multi-parametric production optimization, the method comprising:defining a class of models by combining a simulated fracture geometry comprising a stimulated reservoir volume with accounting for fluid dynamics and phase transitions in the stimulated reservoir volume for modeling production in a plurality of reservoirs associated with the stimulated reservoir volume, wherein each model in the class of models is based on mass balance equations for gas condensate and water that enable phase transition analysis between gas and oil in a condensate reservoir;
generating, based on at least one model from the class of models, an objective function to optimize the production of gas condensate in the plurality of reservoirs, wherein the objective function accounts for a market price of gas condensate;
determining, based on the objective function, one or more parameters related to fracture stages of a fracture network in a reservoir of the plurality of reservoirs, the one or more parameters being those which optimize the production of gas condensate;
based upon the determined one or more parameters, projecting revenue for condensate produced from the condensate reservoir; and
communicating, via a computer network to a computing device, the determined one or more parameters to be used for at least one of building or operating the fracture network.

US Pat. No. 10,922,453

GROMACS CLOUD COMPUTING PROCESS CONTROL METHOD

SHENZHEN JINGTAI TECHNOLO...

1. A GROMACS cloud computing process control method, comprising the following steps:step (1): acquiring, from ArangoDB, .res or .cif files with crystal structures having energy ranked at the top by cluster ranking, and then importing a yoda library function to carry out symmetric operations, format conversion and unit cell expansion, so that a GROMACS structural file is obtained;
step (2): acquiring, from ArangoDB, optimized force field parameters obtained by force field development, and then importing the yoda library function to automatically convert the optimized force field parameters into a GROMACS force field parameter file;
step (3): importing the yoda library function to automatically generate a corresponding GROMACS simulation parameter file according to simulation types in different stages;
step (4): importing a mixc library function to transmit data to submit GROMACS computation and analysis tasks to a task scheduling platform ;
step (5): adding a corresponding monitor task for a same batch of tasks for each said structure, and acquiring the execution status of the tasks in real time; and
step (6): acquiring corresponding analysis results from ArangoDB after all the tasks are executed, and importing a matplotlib library function to directly plot curves corresponding to the analysis results in a development software.

US Pat. No. 10,922,452

DIGITAL SIMULATION SYSTEM OF POWER DISTRIBUTION NETWORK

CHINA ELECTRIC POWER RESE...

1. A digital simulation system for a power distribution network, comprising:clients and a server, wherein
the server comprises a simulation server cluster formed by simulation servers;
the clients are configured to be connected with the simulation server cluster through a communication bus; and
the server is configured to:
operate information off line within a unit time, estimate a state of the power distribution network, simulate an operation state of the unit time off line, acquire each of operation indexes, comprising a power flow distribution, a voltage, reactive power and line loss,
operate the information in real time within the unit time, estimate the state of the power distribution network, simulate the operation state of the unit time on line, acquire each of operation indexes,
calculate a short-circuit current of the power distribution network,
calculate a reliability level, trend simulation, contingency simulation and reliability simulation of the power distribution network according to a structure and equipment information of the power distribution network, acquire failure reliability, a system average power outage frequency and a power outage duration,
calculate a capacitor capacity and position of a reactive power compensation device, provide a wiring solution meeting loads of the power distribution network, and
implement unified maintenance of graphic data and attribute data;
the server comprises a data layer, an encapsulation layer and a service layer, wherein the data layer is configured to extract simulation data from a simulation database and an external data source; the encapsulation layer is configured to encapsulate a simulation module of the service layer into a simulation service; and the service layer is configured to provide for unified calling of the simulation service of the encapsulation layer for the clients;
the service layer is further configured to:
select a coordination server from the simulation server cluster, and configure the coordination server to give responses to access requests of the clients, maintain a to-be-processed task queue and allocate simulation tasks by adopting a dynamic polling method;
read a unified topology of the power distribution network from the task queue of the database and provide for sharing with each simulation server;
use the coordination server to continuously monitor and continuously update each simulation server;
analyze each simulation server in real time to allocate the simulation tasks to the simulation servers;
when a total number of the power distribution network nodes for a certain task exceeds a threshold value, divide the simulation task based on the complexity of the power distribution network and total number of the power distribution network nodes and distribute the divided simulation task to idle simulation servers;
maintain a coordinated communication process with each simulation server; and
integrate an intermediate values of the power distribution network nodes generated by each simulation server to generate a simulation result of the power distribution network;
when a total number of the power distribution network nodes for a certain task does not exceed the threshold value end simulation calculation, and return the simulation result;
the service layer is further configured to:
poll N simulation servers, N being an integer greater than or equal to 1;
acquire real-time performance and current task load of each simulation server;
estimate current task load time to be ti (i calculate estimated current task execution time T={t1, t2, t3 K},
where t1 represents estimated time to perform the current task that is distributed to the 1st simulation server, t2 represents estimated time to perform the current task that is distributed to the 2nd simulation server, and t3 represents estimated time to perform the current task that is distributed to the 3rd simulation server, and
calculate performance coefficients ?={?1, ?2, ?3 K} of all the simulation servers,
where ?1 represents the computing efficiency of the 1st simulation server, ?2 represents the computing efficiency of the 2nd simulation server, ?3 represents the computing efficiency of the 3rd simulation server;
acquire a to-be-allocated simulation task set Re=fmin(T×?, m),
where Re represents the set of all possible solutions for distributing m simulation tasks to N simulation servers,
fmin represents the minimum value of estimated computing time for performing all simulation tasks by all simulation servers,
m represents the number of simulation tasks, and
fmin(S, m) represents m values, which are lower than all other values for a set S,
S represents a solution of distribution of simulation tasks to simulation servers while the estimated computing time for performing all simulation tasks is minimum;
allocate m tasks according to the set S; and
update the to-be-processed task queue.

US Pat. No. 10,922,451

ENSEMBLE-BASED RESERVOIR CHARACTERIZATION METHOD USING MULTIPLE KALMAN GAINS AND DYNAMIC DATA SELECTION

KOREA INSTITUTE OF GEOSCI...

1. An ensemble-based reservoir characterization method using multiple Kalman gains and dynamic data selection, the method comprising:preparing available data including static and dynamic data;
generating initial ensembles by using the prepared static data;
clustering and separating the generated initial ensembles on the basis of a distance-based method;
selecting data among all the dynamic data;
dynamically simulating the selected dynamic data by using the generated initial ensembles;
calculating multiple Kalman gains by using initial models clustered in the same group as the selected dynamic data;
updating ensemble members by means of the selected dynamic data and the multiple Kalman gains; and
predicting a movement of a reservoir by using the updated ensemble members, and evaluating uncertainty thereof and wherein at the updating the ensemble members by using an ensemble smoother, the state vector v, representing the ensembles, is expressed by the following equation:
where, g represents a group a model belongs to and is selected from 1 to the number of clusters (Nc), k represents the model in the group g and is selected from 1 to the total number of models (Ng) in the group g, thus yti,k,g represents a state vector of k-th model in the group g at an initial time ti, mtia and mtid represent static and dynamic parameters at the initial time, ti, respectively, and d represents dynamic data prediction; and the state vector is assimilated by using the multiple Kalman gains and the dynamic data selection by the following equation:yk,ga=yk,gp+Kg(dk,g?Hyk,gp)
where, superscripts a and p indicate an assimilated and a previous states, respectively, yk,ga and yk,gp mean an assimilated and a previous state vectors of the k-th model in the group g, respectively, H represents a measurement operator matrix, and dk,g represents the dynamic data predication of the k-th model in the group g.

US Pat. No. 10,922,450

ASSOCIATING COMPUTER-EXECUTABLE OBJECTS WITH TIMBER FRAMES WITHIN AN ARCHITECTURAL DESIGN ENVIRONMENT

DIRTT ENVIRONMENTAL SOLUT...

1. A method for creating a timber framework within a variable spatial framework for use in designing and manufacturing an architectural component, the method comprising:receiving a variable spatial framework for use in designing and manufacturing an architectural component, wherein the variable spatial framework digitally defines the architectural component;
receiving input to divide the variable spatial framework into one or more independent spaces within the variable spatial framework;
creating at least a first independent space and a second independent space based upon the received input, wherein creating the first independent space and the second independent space includes:
associating with at least the first independent space a first independently executable software object and the second independent space a second independently executable software object, each of the first and second independently executable software objects being configured to communicate data to each other, and
wherein:
the first independently executable software object and the second independently executable software object each comprise a set of computer-executable instructions used in object-oriented program code, and
the first independently executable software object and the second independently executable software object each are associated with a different space and executable actions specific to the different spaces;
automatically incorporating a digital representation of a first timber framework into the first independent space, wherein the characteristics of the first timber framework are determined by the first independently executable software object;
receiving input to modify one or more characteristics associated with the first independent space; and
in response to the received input, automatically modifying the second independent space based on the received input, wherein automatically modifying the second independent space includes at least:
the first independently executable software object automatically sending a communication associated with the received input to the second independently executable software object; and
in response to receiving the communication, the second independently executable software object automatically modifying one or more characteristics associated with the second independent space,
wherein the first independently executable software object and the second independently executable software object are mutually configurable.

US Pat. No. 10,922,449

COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS

Best Apps, LLC, Miami Be...

1. A computer-aided design (CAD) computer system comprising:a computing device;
a network interface;
a non-transitory data media configured to store instructions that when executed by the computing device, cause the computing device to perform operations comprising:
provide for display on a terminal of a first user a product selection user interface enabling the first user to select a product image;
receive over a network using the network interface, from the first user, a selection of an image of a first product via the product selection interface;
provide, for display on the terminal of the first user, a design customization user interface enabling the first user to define a first template for use in product customization;
enable the first user to define the first template using a design customization user interface by:
associating at least a first item of content to a first area of the first product;
indicating for at least a second area of the first product whether an end user is permitted to add end user provided content to the second area,
specifying color characteristics associated with the second area;
enable a depiction of the first product to be displayed by an end user device via a customization user interface;
enable the end user to provide a second item of content comprising a second image;
process the second image to correspond to the specified color characteristics associated with the second area;
enable the processed second image to be printed or embroidered on a physical instance of the first product at the second area;
train a plurality of neural networks to identify respective body parts in images;
enable the first user to specify at least one prohibited body part with respect to at least the second area of at least the first product;
receive, from the first user a specification of a prohibited first body part with respect to at least the second area of at least the first product;
use a neural network trained to identify the first body part to identify whether the first body part is present in a third image; and
at least partly in response to the neural network, trained to identify the first body part, identifying the first body part in the third image, inhibit the customization of the first product using the third image.

US Pat. No. 10,922,448

SYSTEMS AND METHODS FOR OPTIMIZING FIT OF AN IMPLANT TO ANATOMY

1. A method for pre-operatively optimizing a fit of an orthopaedic implant relative to an anatomy of an individual, the method comprising:receiving information including a three-dimensional anatomic model of the anatomy of the individual;
identifying an abnormal morphology at a periphery of a simulated resection portion of the three-dimensional anatomic model;
determining a modified periphery of the simulated resection portion that excludes the identified abnormal morphology;
selecting an orthopaedic implant model corresponding to an orthopaedic implant and having an associated size;
positioning the selected orthopaedic implant model relative to the simulated resection portion;
generating a first random point set comprising a plurality of points at the modified periphery of the simulated resection portion;
generating a second random point set comprising a plurality of points at a periphery of the selected orthopaedic implant model;
determining whether the position of the periphery of the selected orthopaedic implant model relative to the modified periphery of the simulated resection portion is optimal based on the first random point set and the second random point set;
determining whether the selected orthopaedic implant model results in overhang relative to the simulated resection portion; and
verifying one or more of the position and the size of the orthopaedic implant.

US Pat. No. 10,922,447

METHOD AND SYSTEM FOR SELECTING SURFACE FINISHES

Biomet 3I, LLC, Palm Bea...

20. A method of selecting a surface finish for a computer designed component associated with an anatomical area of a specific patient, comprising:creating the computer designed component including an outer surface;
displaying an image of the component and the outer surface;
accepting an input from a user that defines a portion of the outer surface;
analyzing a plurality of surface roughness finishes to determine a number of the plurality of surface roughness finishes that are compatible with the portion of the outer surface defined by the user;
displaying, based on the input from the user, the number of the plurality of surface roughness finishes, wherein the number of the plurality of surface roughness finishes is less that a total number of the plurality of surface roughness finishes analyzed; and
accepting a selection of one of the plurality of surface roughness finishes for the portion of the outer surface via a user interface.

US Pat. No. 10,922,446

COMPUTATIONAL ACCELERATOR FOR DETERMINATION OF LINKAGES ACROSS DISPARATE WORKS IN MODEL-BASED SYSTEM ENGINEERING

Raytheon Company, Waltha...

1. A computational accelerator system for determination of linkages across disparate works in a model-based system engineering (MBSE) regime, the system comprising:a MBSE work interface input to access textual content of a first MBSE work and textual content of a second MBSE work, wherein the textual content of each MBSE work includes a plurality of textual statements, and wherein the textual content of the first MBSE work is structurally, grammatically, and quantitatively diverse from the textual content of the second MBSE work;
a MBSE work preprocessor communicatively coupled to the MBSE work interface input, and configured to autonomously preprocess each MBSE work to produce a first preprocessed data structure representing the first MBSE work and a second preprocessed data structure representing the second MBSE work, wherein the MBSE work preprocessor comprises:
a term extractor to gather significant terms from the textual content of each MBSE work, wherein the significant terms include terms of the textual content of each MBSE work that differentiate individual statements from among other statements of the same MBSE work, and omit terms that are distributed throughout that MBSE work; and
a statement differentiator to delineate the textual content of each MBSE work into segments corresponding to separately identifiable textual statements of that MBSE work;
a statement comparator to autonomously perform a segment-wise comparison between segment pairings of the first preprocessed data structure and the second preprocessed data structure to produce a set of segment-wise comparison results based on terms common to each segment pairing;
a linkage generator to autonomously determine statement-wise linkages between statements of the first MBSE work and the second MBSE work based on the set of segment-wise comparison results, and store the statement-wise linkages as a linkage set data structure; and
a linkage overlap detector to access the linkage set data structure, and to compare the statement-wise linkages associated with each statement of a given MBSE work against the statement-wise linkages associated with every other statement within the given MBSE work to produce an intra-work linkage comparison result.

US Pat. No. 10,922,445

COMPUTING SYSTEMS AND METHODS

BANKVAULT PTY LTD, West ...

1. A security device for connection as a peripheral device to a local computer, said security device comprising a connector to the local computer, a locked-down system environment that includes a remote-access connector and an authenticator facility,wherein the remote-access connector is configured to initiate a remote connection request with a remote virtual-computer service, wherein the authenticator facility is configured to provide first authentication-data to said remote-access connector for ensuring that said security device has permission to be allocated a virtual computer from said remote virtual-computer service,
wherein the first authentication-data comprises a unique identifier of the security device and/or the local computer, wherein the first authentication-data is usable by the remote virtual-computer service to associate a user account on the remote virtual-computer service to the local computer itself or to the local computer when the security device is connected to the local computer, wherein said locked-down system environment comprises an operating system directed to preventing third-party attacks and that provides no more than remote desktop services and authentication services.

US Pat. No. 10,922,443

SYSTEM FOR PROTECTING AN INPUT DEVICE

INGENICO GROUP, Paris (F...

1. A system for protecting an electronic user input device, the system comprising:a printed circuit board comprising a false key;
a pressurizing device comprising a tube for receiving a flexible pressurizing element at an open end of the tube, the flexible pressurizing element configured to press on the false key at an extremity;
and
a spacer made of rigid material and of predetermined length, spacing the flexible pressurizing element apart from a closed end of the tube;
wherein when a current through the false key falls below a threshold current, the system is configured to indicate tampering.

US Pat. No. 10,922,442

ELECTRONIC CIRCUIT SECURED BY DISRUPTION OF ITS POWER SUPPLY

TIEMPO, Montbonnot St-Ma...

1. Electronic circuit comprising:a first logic circuit configured to perform a first function,
a number generator configured to generate at least one series of successive first numbers over a first time period,
a voltage generator connected to the number generator so as to receive a first series of successive data representative of the series of first numbers, the voltage generator being configured to supply the first logic circuit with a first supply voltage higher than a minimum operating voltage of the first logic circuit and to supply a variable additional second voltage having electrical characteristics that are functions at least of the first series of successive data,
wherein the variable additional second voltage comprises at least:
a component representative of a fixed voltage defined by an offset voltage value,
a component representative of a first periodic voltage defined at least by a first frequency and a first amplitude,
wherein the voltage generator is configured in such a way that the offset voltage value, the first frequency and/or the first amplitude are defined at least from the series of first numbers, over the first time period, taken from a first series of offset voltages comprising several different offset voltage values, a second series of first frequencies comprising several different first frequency values and a third series of first amplitudes comprising several different first amplitude values, and
wherein the voltage generator is configured to deliver a component representative of the first periodic voltage which presents a first waveform different from a second waveform of the component representative of the second periodic voltage, the first waveform and second waveform being advantageously chosen from a sinusoidal signal, a square signal, a triangular signal, a trapezoid signal, a saw-tooth signal, an exponential signal and a logarithmic signal.

US Pat. No. 10,922,441

DEVICE AND METHOD FOR DATA SECURITY WITH A TRUSTED EXECUTION ENVIRONMENT

Huawei Technologies Co., ...

1. A computing device comprising:a trusted execution environment with access to a secure memory storing a deletable root key, the secure memory inaccessible by a second execution environment; and
at least one processor operable in the trusted execution environment, wherein when operating in the trusted execution environment, the at least one processor is configured for:
based on a request from the second execution environment, using the deletable root key in the secure memory to perform a root key operation on an encryption key utilized by the second execution environment to secure data accessible by the second execution environment; and
deleting the deletable root key in the secure memory upon detection of a security event.

US Pat. No. 10,922,440

CUSTOMIZED SMART DEVICES AND TOUCHSCREEN DEVICES AND CLEANSPACE MANUFACTURING METHODS TO MAKE THEM

2. An encryption protocol protected communication system comprising:a first smart device comprising:
a first display screen, comprising a touchscreen;
a first wireless communication circuit, wherein the first wireless communication circuit communicates digital data into and out of the first smart device;
a first memory circuit of the first smart device;
a first processor, wherein the first processor performs processing steps of application software of the first smart device stored within the first memory circuit, wherein the processing steps of application software display at least a first display message on the first display screen;
a first hardware encryption device comprising:
a second memory circuit, comprising a data storage function with a write capability, wherein data values stored within the second memory circuit are written during an assembly process of the hardware encryption device into the first smart device as a series of encryption codes;
a second processor, wherein the processor receives an input data value at a data bus connected to the processor, and wherein the processor performs an encryption algorithm utilizing data values of the second memory circuit;
a second smart device comprising:
a second display screen, comprising a touchscreen;
a second wireless communication circuit, wherein the second wireless communication circuit communicates digital data into and out of the second smart device;
a third memory circuit of the second smart device;
a third processor, wherein the third processor performs processing steps of application software of the second smart device stored within the third memory circuit, wherein the processing steps of application software display at least a first display message on the second display screen;
a second hardware encryption device comprising:
a fourth memory circuit, comprising a data storage function with a write capability, wherein the data values stored within the fourth memory circuit are written during an assembly process of the hardware encryption device into the second smart device as a series of encryption codes, and wherein the data values stored within the fourth memory circuit match the data values stored within the second memory circuit;
a fourth processor, wherein the fourth processor receives an input data value at a data bus connected to the fourth processor, and wherein the fourth processor performs an encryption algorithm utilizing data values of the fourth memory circuit; and
a self-destruction device, wherein the self-destruction device may be activated by an electrical signal from the smart device.

US Pat. No. 10,922,439

TECHNOLOGIES FOR VERIFYING MEMORY INTEGRITY ACROSS MULTIPLE MEMORY REGIONS

Intel Corporation, Santa...

1. A method of verifying the integrity of data stored to main memory of a host device, comprising, with a memory controller of the host device:generating a first integrity value in response to a write command from a first domain, the write command targeting at least one first physical address of a first allocated region of said main memory;
generating a second integrity value in response to a read command from the first domain, the read command targeting read data stored to the at least one first physical address; and
verifying the integrity of the read data at least in part by comparing the first integrity value to the second integrity value;wherein:generating the first integrity value comprises:
performing first integrity operations on plaintext of write data targeted by the write command to produce a first output;
performing second integrity operations on an integrity key and ciphertext of the write data to be written in response to the write command to produce a second output, wherein the integrity key is different from an encryption key used to generate the ciphertext, wherein the encryption key is specific to the first domain and the integrity key is used by each of a plurality of domains of the host device in respective integrity operations of the plurality of domains;
combining the first and second outputs to generate the first integrity value; and
the method further comprises, with the memory controller:
causing the first integrity value to be written to the first allocated region of said main memory.

US Pat. No. 10,922,437

INSTALLATION AND MANAGEMENT OF CLIENT EXTENSIONS

Microsoft Technology Lice...

1. A method implemented in a computing environment for providing application extension management, the method comprising:installing a plurality of extensions at a central repository;
providing a centralized user interface for managing the plurality of application extensions for a plurality of users within an organization;
configuring, by an organizational administrator via the centralized user interface, access permissions for at least a first application extension of the plurality of application extensions for a first user and a first group, wherein the first group comprises a second user and a third user of the plurality of users, wherein the first application extension of the plurality of application extensions is configured with a mandatory access setting for the first user and an optional access setting for the first group including the second user and the third user;
providing automatic access to the first application extension to the first user; and
providing a notification of an availability of access to the first application extension to the second user and the third user.

US Pat. No. 10,922,436

SECURING SENSITIVE DATA USING DISTANCE-PRESERVING TRANSFORMATIONS

Microsoft Technology Lice...

1. A computing device for securing biometric data used in an authentication, the computing device comprising:a processor;
a memory, comprising instructions, which when performed by the processor, cause the processor to perform operations comprising:
receiving a first set of data points representing a biometric characteristic of a user;
determining a function parameter set for a distance-preserving transformation;
transforming the received first set of data points to a second set of data points using the distance-preserving transformation and the function parameter set, the distance-preserving transformation mapping the first set of data points to the second set of data points in a new metric space, wherein distances between respective data points of the first set of data points are unchanged in the second set of data points; and
invoking an authentication operation for the user by transmitting the second set of data points to a network-based authentication service over a communications network, the authentication operation causing storage of the second set of data points or a comparison of the second set of data points to a stored value to produce an authentication result.

US Pat. No. 10,922,434

INFORMATION SECURITY IMPLEMENTATIONS WITH EXTENDED CAPABILITIES

8x8, Inc., Campbell, CA ...

1. A security system comprising:at least one central server coupled to a plurality of client computers and configured to:
in response to a notification received from one of the plurality of client computers, monitor data communications of the one of the plurality of client computers for sensitive data by reviewing data communications therefrom;
receive identified data from applications running on the plurality of client computers and which data indicates an access of sensitive data matching criteria indicated by configuration data used to indicate a sensitivity level of the sensitive data and monitored data communications;
in response to the identified data indicating that a first trigger event occurred, determine that a second trigger event occurred which is related to the identified data, wherein the first trigger event includes at least access of an external email address associated with said one of the plurality of client computers, and the second trigger event includes a cut and paste operation also associated with said of the plurality of client computers; and
select and perform a security action based on the occurrence of the first and second trigger events, and based on a risk-level associated with the first and second trigger events.

US Pat. No. 10,922,431

SYSTEMS AND METHODS FOR DYNAMICALLY MASKING VIDEO AND IMAGES CAPTURED BY A DRONE DEVICE CAMERA

Honeywell International I...

11. A system comprising:a drone device;
a camera carried the drone device;
and a control system in communication with the drone device or the camera,
wherein the drone device receives instructions to fly proximate to a potential surveillance area while in a learning mode and subsequently receives instructions to fly proximate to an active surveillance area in a standard mode,
wherein the camera carried by the drone receives instructions to capture learning mode video or images of the potential surveillance area and receives instructions to capture standard mode video or images of the active surveillance area, and
wherein the control system is configured to:
receive the learning mode video or images of the potential surveillance area from the camera or the drone device;
identify learning mode privacy masking areas from the learning mode video or images, wherein each learning mode privacy masking area corresponds to a region having a fixed geographical location in the potential surveillance area;
receive the standard mode video or images of the active surveillance area from the camera or the drone device;
identify each of one or more learning mode privacy masking areas in the standard mode video or images based at least in part on the fixed geographical location of the region that corresponds to the learning mode privacy masking area;
dynamically mask a portion of the standard mode video or images that contains any of the identified learning mode privacy masking areas.

US Pat. No. 10,922,430

SYSTEM AND METHOD FOR DATA SECURITY GRADING

Beijing DiDi Infinity Tec...

1. A method for data security grading, implementable by a computer, the method comprising:receiving a request to access a query data field;
searching for the query data field from a security level table;
in response to finding the query data field from the security level table, obtaining from the security level table a security level corresponding to the query data field; and
in response to not finding the query data field from the security level table, determining a security level corresponding to the query data field based at least on the security level table and a lineage tree tracing
the query data field to one or more source data fields, wherein:
the lineage tree traces the query data field to one or more first level parent data fields, the each first level parent data field being one of the one or more source data fields or a first level derived data field, and the query data field deriving from the one or more first level parent data fields based on a first deriving function;
for the first level derived data field, the lineage tree traces the first level derived data field to one or more second level parent data fields, the each second level parent data field being one of the one or more source data fields or a second level derived data field, and the first level derived data field deriving from the one or more second level parent data fields based on a second deriving function;
the tracing is replicable on any derived data field until tracing to the one or more source data fields;
the lineage tree comprises the first and second deriving functions; and
the security data level table comprises one or more security levels corresponding to the one or more source data fields.

US Pat. No. 10,922,429

SYSTEM, METHOD, AND APPARATUS FOR DATA ACCESS IN A CLOUD COMPUTING ENVIRONMENT

ALIBABA GROUP HOLDING LIM...

1. A data access method in a cloud computing environment including one or more service object spaces, comprising:receiving a request of a user for accessing a data package, wherein the request includes a user identification;
determining, among the one or more service object spaces, a service object space of the data package corresponding to the request; and
providing the data package to the user according to the service object space of the data package and the user identification, wherein:
the data package comprises an external data package of the service object space, and the external data package is used among the one or more service object spaces, and
providing the data package to the user according to the service object space of the data package and the user identification comprises:
using the user identification to determine that the user has a designated access authorization configured based on the user identification, and
using the designated access authorization to provide the external data package of the service object space to the user.

US Pat. No. 10,922,428

HANDLING SENSITIVE DATA IN AN APPLICATION USING EXTERNAL PROCESSING

International Business Ma...

1. A method for handling sensitive data required by an application in a secure computer system, said method comprising:receiving, by one or more processors of an external computer system that is external to the secure computer system, a transformed request message sent by the secure computer system, said transformed request message including one or more data aspects having tokenized data that has replaced transformed sensitive data after sensitive data in the one or more aspects had been transformed from a data format required by a service in the external computer system into a data format required by the application, said transformed request message further including additional data aspects transformed from the data format required by the service into the data format required by the application;
said one or more processors generating a response message from the transformed request message by including, in the response message: the additional data aspects transformed from the data format required by the service into the data format required by the application; the tokenized data in the one or more data aspects, and annotations with transform instructions for transforming the transformed sensitive data, from the data format required by the service into the data format required by the application, after the tokenized data has been replaced by the transformed sensitive data in the one or more data aspects; and
said one or more processors sending the response message to the secure computer system.

US Pat. No. 10,922,427

SYSTEMS AND METHODS FOR CYBERSECURITY

JPS Engineering Corp., S...

11. A method of providing secure access to an isolated computer system, comprising:receiving, at a first input/output (I/O) port of a multi-port hardware interface, a request to access the isolated computer system from a computing device associated with a user, the first I/O port comprising a first Ethernet controller;
receiving, at the first I/O port, a first credential from the computing device associated with the user;
causing, by one or more hardware finite state machines, the first credential to be stored in a first credential latch in communication with a first bus;
starting, by the one or more hardware finite state machines, a hardware timer hardwired to send a timeout signal to the one or more hardware finite state machines after a predetermined threshold time;
actuating, by the one or more hardware finite state machines in response to the first credential, a bidirectional switch to allow access to the first bus from a second I/O port of the multi-port hardware interface different from the first I/O port, the second I/O port comprising a second Ethernet controller independent of the first Ethernet controller;
receiving, at the second I/O port, a second credential from a computing device associated with a supervisor;
causing, by the one or more hardware finite state machines, the second credential to be stored in a second credential latch in communication with the first bus;
authenticating, by one or more digital comparators, the first credential and the second credential based on a previously stored user credential and a previously stored supervisor credential;
sending an authentication signal from the one or more digital comparators to the one or more hardware finite state machines indicating that the first credential and the second credential were authenticated; and
actuating a digital gate under control of the one or more hardware finite state machines to permit access between the first bus and a second bus communicatively coupled to a processor, the processor configured to implement an additional layer of user authentication.

US Pat. No. 10,922,425

ESTABLISHMENT OF A CONFIDENTIAL BLOCKCHAIN NETWORK

Microsoft Technology Lice...

1. An apparatus, comprising:a device including at least one memory adapted to store run-time data for the device, and at least one processor that is adapted to execute processor-executable code that, in response to execution, enables the device to perform actions, including:
causing a permissioned blockchain to be deployed to a plurality of nodes;
establishing a plurality of access level blocks, wherein each access level block is configured to store a plurality of nanoblocks, wherein each nanoblock is an encrypted database, wherein the access level blocks include access levels blocks for users, and wherein the corresponding access level block for each user includes security credentials for the user; and
for each access level block of the plurality of access level blocks:
selecting nodes among the plurality of nodes for deployment of the access level block; and
replicating the access level block to each of the selected nodes, such that:
after replicating the access level blocks, there are at least two copies of each access level block on the permissioned blockchain, and the permissioned blockchain is capable of performing cryptographic operations, including determining permissions of the users based at least in part on the security credentials for the users, and is further capable of storing details of the cryptographic operations as nanoblocks of the access level blocks; and
such that, after the access level block is replicated to each of the selected nodes, the access level block is stored on the selected nodes among the plurality of nodes, and not stored on nodes among the plurality of nodes that are not selected nodes.

US Pat. No. 10,922,424

METHOD AND SYSTEM FOR SECURELY PROVIDING VEHICLE SERVICES DATA TO A VEHICLE

M2MD TECHNOLOGIES, INC., ...

1. A method, comprising:receiving, with a vehicle wireless communication device, a download notification that vehicle-centric services data are to be downloaded; wherein a determination that the vehicle-centric services data that are to be downloaded is made based on a location of a vehicle associated with the vehicle wireless communication device and wherein the download notification is generated by a telematics services provider (“TSP”) backend computer system;
determining a current operational state of the vehicle associated with the vehicle wireless communication device to which the vehicle-centric services data are to be downloaded;
determining whether a download permission configuration associated with the vehicle communication device permits downloading of the vehicle-centric services data during the current operational state of the vehicle, wherein the vehicle wireless communication device includes a vehicle-centric hardware Subscriber Identity Module (“SIM”) and a consumer-centric hardware SIM;
establishing a connection over a consumer-centric wireless communication network that corresponds to the consumer-centric hardware SIM using information that is stored in the consumer-centric hardware SIM and that is unique to the consumer-centric hardware SIM; and
downloading the vehicle-centric services data using the connection established using the information that is stored in, and unique to, the consumer-centric hardware SIM when the download permission configuration permits, based on the current operational state of the vehicle.

US Pat. No. 10,922,423

REQUEST CONTEXT GENERATOR FOR SECURITY POLICY VALIDATION SERVICE

AMAZON TECHNOLOGIES, INC....

1. A system, comprising one or more processors and memory storing computer-executable instructions that, when executed by the one or more processors, cause the system to:receive information associated with a user account of a computing resource service provider, the information specifying a first security policy encoding a first set of security permissions for accessing a computing resource provided by the computing resource service provider and associated with the user account;
obtain a first partial request context comprising a first parameter, of a set of request context parameters describing a request for access to the computing resource, and a corresponding first value of the first parameter that satisfies the first set of security permissions;
determine a second set of security permissions for accessing the computing resource, the first and second sets of security permissions both requiring the request to include the first parameter set to the corresponding first value in order to grant access to the computing resource in response to the request;
determine a first propositional logic expression based at least in part on the first set of security permissions;
determine a second propositional logic expression based at least in part on the second set of security permissions;
identify a first set of parameter values, each parameter of the set of request context parameters being associated with a corresponding parameter value of the first set of parameter values, the first set of parameter values being sufficient to determine the first propositional logic expression and the second propositional logic expression lack equivalency such that applying the first security policy to the first set of parameter values results in a grant of access to the computing resource and applying a second security policy, comprising the second set of security permissions, to the first set of parameter values results in a denial of access to the computing resource, the first set of parameter values associating the first value with the first parameter; and
perform an action associated with validating the first security policy based on the first set of parameter values.

US Pat. No. 10,922,422

BLOCKCHAIN-BASED IMAGE PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based image processing method, comprising:obtaining, by a computing device, copyright-related information corresponding to an original image;
sending, by the computing device, the copyright-related information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the copyright-related information and to store the ciphertext information in the blockchain;
obtaining, by the computing device, the ciphertext information from the blockchain; and
performing, by the computing device, obfuscation on a pixel matrix of the original image based on the ciphertext information to generate a target image carrying the copyright-related information, by:
encoding the ciphertext information to obtain a binary string corresponding to the ciphertext information;
inserting at least one character of the binary string into the pixel matrix according to a set character spacing; and
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting the binary string into at least one of the pixel regions; or
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting a portion of the binary string into each of the pixel regions.

US Pat. No. 10,922,421

REGULATING BLOCKCHAIN CONFIDENTIAL TRANSACTIONS

Advanced New Technologies...

1. A system comprising:one or more computers; and
one or more computer-readable memories coupled to the one or more computers and having instructions stored thereon which are executable by the one or more computers to perform operations comprising:
generating, by a regulator node of a blockchain network, a pair of a public key and a private key;
publishing, by the regulator node, the public key to a plurality of client nodes of the blockchain network;
obtaining, by the regulator node from a consensus node of the blockchain network, a content of a confidential transaction of a client node, wherein the content of the confidential transaction comprises:
one or more commitment values of the confidential transaction generated by the client node by applying a cryptographic commitment scheme to transaction data of the confidential transaction;
one or more zero-knowledge proofs of the transaction data; and
encrypted regulatory information generated by the client node by encrypting the transaction data using the public key of the regulator node;
obtaining the transaction data by decrypting the encrypted regulatory information using the private key of the regulator node; and
verifying, by the regulator node, that the confidential transaction is legitimate based on the content of the confidential transaction and the transaction data.

US Pat. No. 10,922,418

RUNTIME DETECTION AND MITIGATION OF VULNERABILITIES IN APPLICATION SOFTWARE CONTAINERS

Twistlock, Ltd., Herzliy...

1. A method for runtime detection of vulnerabilities in an application software container, wherein the application software container is configured to execute an application, the method comprising:detecting the application stored in an image of the application software container;
identifying, based on at least one predetermined potential location for the application, configuration data stored in the application software container for the application;
determining, based on the identified configuration data, at least one intended behavior of the application when executed in the application software container and at least one first unauthorized action, wherein each first unauthorized action defines a deviation from the at least one intended behavior, wherein the at least one first unauthorized action is indicated in a predetermined list of unauthorized actions for the application executed by the application software container;
monitoring execution of the application software container, wherein the monitoring includes comparing the execution of the application software container to the at least one intended behavior and to the at least one first unauthorized action;
detecting a second unauthorized action by the application software container when the execution of the application software container is anomalous as compared to the at least one intended behavior, wherein the execution of the application software container is anomalous when one of the at least one first unauthorized action occurs during the execution of the application software container; and
generating a detection event when the second unauthorized action by the software container is detected.

US Pat. No. 10,922,417

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM

NEC CORPORATION, Tokyo (...

1. An information processing apparatus comprising:a memory storing one or more instructions; and
a processor configured to execute the one or more instructions to:
receive an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
read out terminal-specific countermeasure information, indicating a countermeasure applicable for each of a plurality of terminals against the vulnerability, from a storage that stores the terminal-specific countermeasure information, and based on assumption that the selected countermeasure is applied to the plurality of terminals, identify remaining terminals from among the plurality of terminals which are terminals that would be left with the vulnerability due to non-applicability of the selected countermeasure based on the read-out terminal-specific countermeasure information;
count a number of terminals identified as the remaining terminals; and
display a screen including first information indicating the number of remaining terminals,
wherein the processor is further configured to determine one or more combinations of countermeasures in which the number of the remaining terminals is the smallest on the basis of the terminal specific countermeasure information, and determine a combination from among the one or more combinations of countermeasures in which the number of countermeasures included in the combination is the smallest.

US Pat. No. 10,922,416

SYSTEM, DEVICE, AND METHOD FOR TRANSIENT EVENT DETECTION

FEDERAL HOME LOAN MORTGAG...

1. A device, comprising:processing circuitry configured to:
receive, from at least one computing device, node data of plural nodes, each node including attribute values related to a proposed transaction corresponding to the respective node;
store the received node data, including the attribute values of plural proposed transactions, each of the plural proposed transactions corresponding to one of the plural nodes;
organize the stored node data into one or more node groupings, each node grouping including nodes of the node data having one or more same stored attribute values related to different proposed transactions of different nodes of the plural nodes;
determine, based on one or more transient event detection priorities, a node grouping processing scheme for detecting one or more transient event occurrences within the one or more node groupings such that two or more nodes having attribute values identifying a same applicant or a same property in a node grouping are detected as a single transient event occurrence; and
execute the node grouping processing scheme to detect the one or more transient event occurrences within the one or more node groupings.

US Pat. No. 10,922,415

METHOD AND SYSTEM FOR FAIL-SAFE BOOTING

ONITEO AB, Kista (SE)

1. A computer unit comprising:a read-only memory (ROM) arrangement comprising port check code and boot ROM code;
an internal memory;
a fixed storage media comprising a fixed storage media boot application (FSMBA);
a removable media port; and
at least one processor,
wherein the at least one processor is adapted to:
use the boot ROM code to start the computer unit;
use the port check code to determine that a removable storage media is present on the removable media port;
use the boot ROM code to load any objects present on said removable storage media into the internal memory;
use the boot ROM code to verify integrity of said objects loaded into the internal memory;
use the boot ROM code to verify that said objects loaded into the internal memory comprise a removable storage media boot application (RSMBA);
boot the computer unit using said RSMBA;
continue operation of the computer unit by loading payload objects from the fixed storage media into the internal memory; and
verify integrity of payload objects on the fixed storage media by:
loading a payload map from the fixed storage media into the internal memory;
verifying integrity of the payload map;
determining algorithm or algorithms used to generate the payload map;
applying said determined algorithm or algorithms to the payload objects and receiving a result;
comparing said result to the payload map; and
verifying the integrity of the payload objects if said result corresponds to the payload map.

US Pat. No. 10,922,414

POINT OF SALE DEVICE BUILD SECURITY

Target Brands, Inc., Min...

1. A system comprising:a store LAN (Local Area Network) comprising:
a managed network switch; and
a Point of Sale (POS) device having a POS device identifier and a communication link to the managed network switch;
a build system remote from the store LAN and comprising:
build system memory comprising build system instructions that when executed by a build system processor cause the build system processor to:
receive the POS device identifier;
add the POS device identifier to a build system data store;
provide the POS device identifier to a Network Access Control (NAC) system; and
control deployment of a build image to devices based on the build system data store; and
the NAC system comprising:
NAC system memory comprising NAC system instructions that when executed by a NAC system processor cause the NAC system processor to:
obtain the POS device identifier; and
add the POS device identifier to an access data store,
wherein the managed network switch is a computer networking device configured to control access to other devices connected to the store LAN using the access data store and is further configured to:
provide a first VLAN (Virtual LAN);
provide a second VLAN; and
permit devices connected to the first VLAN to access a build environment managed by the build system; and
disallow devices connected to the second VLAN from accessing the build environment,
wherein controlling access to the store LAN using the access data store includes:
adding the POS device to the first VLAN based on the POS device identifier of the POS device being located in the access data store.

US Pat. No. 10,922,413

METHODS AND APPARATUS TO APPLY A FIRMWARE UPDATE TO A HOST PROCESSOR

Intel Corporation, Santa...

1. An apparatus to apply a firmware update to a host processor, the apparatus comprising:a baseboard management controller interface to access a notification from a baseboard management controller that a firmware image is available in a baseboard management memory;
a host communicator to, in response to the notification, force a restart of the host processor, the restart of the host processor to trigger a boot process, the host communicator to halt the boot process;
a baseboard management memory interface to access the firmware image in the baseboard management memory;
an image validator to validate the firmware image; and
a firmware memory interface to, when the firmware image is valid, write the firmware image to a firmware memory of the host processor, the host communicator to enable the boot process using the firmware image stored in the firmware memory.

US Pat. No. 10,922,412

AUTOMATIC TAMPERING DETECTION IN NETWORKED CONTROL SYSTEMS

The Boeing Company, Chic...

1. A configuration management device in a closed-loop, Networked Control System (NCS), wherein the NCS comprises a plurality of network components and control management circuitry that manages the plurality of network components, the configuration management device comprising:a communications interface configured to communicate with the plurality of network components in the NCS and with the control management circuitry in the NCS; and
processing circuitry operatively connected to the communications interface and configured to:
detect whether a discrepancy in configuration data received from a network component in the NCS exists based on a comparison of the configuration data with reference configuration data stored in a database;
responsive to detecting the discrepancy, send a tamper detection signal to the control management circuitry indicating that the network component has been tampered with; and
responsive to detecting that no discrepancy exists in the configuration data:
monitor characteristics of data sent by the network component to the control management circuitry while the network component is in an operational mode;
detect a discrepancy in the characteristics of the data sent by the network component based on a comparison to reference characteristics stored in the database; and
responsive to detecting the discrepancy in the characteristics of the data sent by the network component, send the tamper detection signal to the control management circuitry indicating that the network component has been tampered with.

US Pat. No. 10,922,411

INTELLIGENT EVENT COLLECTION FOR CLOUD-BASED MALWARE DETECTION

MALWAREBYTES INC., Santa...

1. A method for detecting malware comprising:detecting a plurality of events, each event associated with a process performing an operation on a file having a particular predefined characteristic;
determining if each event of the plurality of events associated with the process matches an entry in an exclusions list;
responsive to determining that each event of the plurality of events associated with the process is absent from the exclusions list, logging a plurality of event data describing the plurality of events associated with the process in an event log on a client device and sending the plurality of event data to a server;
receiving, by the client device, an indication from the server of whether the process corresponds to malware based on whether the plurality of event data includes a pattern of events indicative of malware; and
responsive to the received indication indicating that the process does not correspond to malware:
maintaining, by the client device, a count of logged events corresponding to historical operations by the process performed on files having the particular predefined characteristic on the client device, and
responsive to the count exceeding a threshold, adding an entry to the exclusions list stored on the client device to exclude future operations by the process on files having the particular predefined characteristic.

US Pat. No. 10,922,410

SYSTEM AND METHOD FOR GENERATING A CONVOLUTION FUNCTION FOR TRAINING A MALWARE DETECTION MODEL

AO KASPERSKY LAB, Moscow...

1. A method for generating a hash function for training a malware detection model, comprising:selecting, by a processor, one or more commands from a behavior log according to a set of predetermined rules;
forming, by the processor, one or more behavior patterns from the one or more selected commands, wherein each behavior pattern comprises the one or more commands selected from the behavior log and one or more parameters describing the one or more selected commands;
determining, by the processor, a feature vector of the one or more behavior patterns;
generating, by the processor, a hash function of the feature vector using an auto-encoder, wherein a size of a result of the hash function is less than the size of the feature vector, and wherein a degree of similarity of the feature vector and a result of an inverse of the hash function of the result of the hash function of the feature vector is greater than a predetermined value; and
computing, by the processor, one or more parameters for training a malware detection model using the hash function on the one or more behavior patterns.

US Pat. No. 10,922,409

DEEP REINFORCEMENT LEARNING TECHNOLOGIES FOR DETECTING MALWARE

MICROSOFT TECHNOLOGY LICE...

1. A method performed on at least one computing device that includes at least one processor and memory, the method comprising:executing at least a portion of a file;
identifying, during execution of the at least the portion of the file, a sequence of monitored events, the sequence of monitored events having a sequence length that varies according to a content of the file, the sequence of monitored events comprising any type of event;
building, based on the monitored events, an event state that comprises an event histogram;
generating, based at least on the event state, at least one value from a reinforcement learning model, the at least one value representing an expected utility of halting the execution of the at least the portion of the file;
and
halting, based on the at least one value, the execution of the at least the portion of the file.

US Pat. No. 10,922,408

PORTABLE POWER CHARGER WITH WIRELESS AND DIRECT CHARGING CONNECTIVITY

HALO INTERNATIONAL SEZC L...

1. A portable charger unit for recharging at least one electronic device having a rechargeable internal battery by wireless and/or direct means, said portable charger unit comprising:a charger housing internally storing a rechargeable battery;
a connector cable storable in the charger housing for operative connection between the rechargeable battery and at least one of an electronic device and an external power source for direct connection, and capable of directly providing a direct output power supply from said rechargeable battery to the electronic device when the electronic device is connected to the portable charger unit via the connector cable, or directly receiving a direct input power supply from the external power source when the portable charger unit is connected to the external power source via the connector cable; and
a wireless transmitter operatively connected to the rechargeable battery capable of wirelessly transmitting a wireless output power supply to an electronic device; and
a wireless receiver operatively connected to the rechargeable battery for receiving a wireless input power supply transmitted from an external wireless power transmission device and directing said wireless input power supply to the rechargeable battery for recharging said rechargeable battery;
wherein the charger housing has at least one generally flat surface for receiving the electronic device to be wirelessly charged via the wireless transmitter;
wherein the charger unit is capable of simultaneously supplying the direct output power supply via the connector cable and the wireless output power supply via the wireless transmitter to respective electronic devices when both said electronic devices are connected to the charger unit; and
wherein the charger unit is capable of supplying at least one of the direct output power supply via the connector cable and the wireless output power supply via the wireless transmitter while simultaneously receiving at least one of the direct input power supply via the connector cable and the wireless input power supply via the wireless receiver.

US Pat. No. 10,922,407

DISCRIMINANT POWER BASED THREAT DETECTION

INTERNATIONAL BUSINESS MA...

1. A system, comprising a hardware processor configured to:receive a discriminant power graph comprising links between a plurality of detector names and a plurality of malware families, wherein each of the plurality of detector names in the discriminant power graph has a respective associated discriminant power;
receive a set of detector names associated with an indicator of compromise from an antivirus aggregator;
determine a set of malware families, wherein each malware family of the set of malware families is linked to at least one detector name of the set of detector names in the discriminant power graph;
for each malware family of the set of malware families, determine a sum of the associated discriminant power of any detector names that are linked to the malware family in the discriminant power graph; and
determine that the indicator of compromise belongs to a malware family of the set of malware families that has a highest determined sum.

US Pat. No. 10,922,406

PROTECTING METHOD AND SYSTEM FOR MALICIOUS CODE, AND MONITOR APPARATUS

Wistron Corporation, New...

1. A protecting method for malicious code, comprising:circulating a monitor module, which includes a plurality of antivirus systems, to at least one electronic apparatus by a monitor apparatus in a communication system, so as to monitor the at least one electronic apparatus in the communication system;
in response to the monitor module is circulated to one of the electronic apparatuses in the communication system, detecting whether there is a malicious code by the monitor module;
in response to the malicious code is detected by the monitor module, analyzing at least one aggressive behavior corresponding to the malicious code received from at least one electronic apparatus to calculate a behavior characteristic vector by the monitor apparatus;
executing a behavior prediction based on the behavior characteristic vector by the monitor apparatus to predict an evolution direction of the aggressive behavior from the behavior characteristic vector and to calculate an evolution bias vector related to the plurality of antivirus systems based on the evolution direction;
deciding, by the monitor apparatus, whether the monitor module is an admixture model or an association model based on the evolution bias vector, wherein in a condition that the monitor module is the admixture model, the evolution bias vector is a probability vector, and in a condition that the monitor module is the association model, the evolution bias vector is a weight vector;
determining a protection result by the monitor module; and
executing one or more corresponding process actions based on the protection result by the monitor module;
wherein in response to the malicious code is detected by the monitor module, the step of determining the protection result by the monitor module comprises:
in the condition that the monitor module is the admixture model, comprising:
selecting one of the antivirus systems corresponding to an element with a highest probability in the probability vector as a selected module, and determining the protection result corresponding to the malicious code by the selected module;
based on a first probability vector decided by the selected module, identifying a first representative cluster corresponding to the malicious code by the selected module; and
using the evolution bias vector calculated by the monitor apparatus and the first probability vector decided by the selected module as a set of characteristic vectors and inputting the set of characteristic vectors to a Bayesian linear regression model to obtain a set of the process actions corresponding to the first representative cluster and using the set of process actions as the protection result; and
in the condition that the monitor module is the association model, comprising:
deciding a correlation weight between each of the antivirus systems and the malicious code based on the weight vector, and determining the protection result corresponding to the malicious code by associating all of the antivirus systems included in the monitor module based on the correlation weight;
in each of the antivirus systems, based on a second probability vector decided by each of the antivirus systems, identifying a second representative cluster corresponding to the malicious code in each of the antivirus systems; and
using the evolution bias vector calculated by the monitor apparatus and each of the second probability vectors decided by each of the antivirus systems as the set of characteristic vectors and inputting the set of characteristic vectors to the Bayesian linear regression model to obtain the set of the process actions corresponding to the second representative cluster and using the set of process actions as the protection result.

US Pat. No. 10,922,405

DATA GENERATION FOR DATA PROTECTION

MICROSOFT TECHNOLOGY LICE...

1. A system comprising:a data storage system storing database tables, each of the database tables including authentic data;
a memory device storing processor-executable process steps; and
a processor to execute the processor-executable process steps to cause the system to:
generate simulated data records based on authentic data records of a database table stored in the data storage system, the authentic data records being periodically-modified;
store the simulated data records in the database table with the periodically-modified authentic data records;
periodically identify the simulated data records stored in the database table and, in response to each periodic identification of the simulated data records, modify only the identified simulated data records and not the periodically-modified authentic data records;
receive a request for data of the database table from a requesting system;
determine if the request is related to an electronic attack; and
based at least on a determination that the request is related to an electronic attack, provide the simulated data records stored in the database table to the requesting system.

US Pat. No. 10,922,404

CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM

Palantir Technologies Inc...

1. A computerized method comprising:by a system of one or more computer systems,
aggregating indications of processes executing in memory of disparate computing systems, the computing systems being configured to access sensitive information, wherein the sensitive information represents transactions associated with payment instruments;
determining that one or more processes are not authorized to access the sensitive information, wherein a first process of the determined processes is determined to be monitoring payment instruments; and
causing presentation, via an interactive user interface, of information summarizing the determined processes and information summarizing computing systems executing the determined processes, wherein the interactive user interface enables generation of one or more alerts associated with payment instruments determined to be monitored by the first process, and wherein the interactive user interface:
presents summary information associated with processes executing on the computing systems that are not authorized to access the sensitive information, wherein the summary information comprises a graphical depiction of a measure associated with the processes,
presents summary information associated with checkout systems executing processes that are not authorized to access the sensitive information, wherein the summary information comprises a graphical depiction of a measure associated with the checkout systems, and
responds to user input associated with the alerts, wherein the interactive user interface triggers determination as to a risk level associated with the first process based on a hash associated with the first process, and wherein in response to user input the interactive user interface is configured to present detailed information associated with the first process.

US Pat. No. 10,922,403

METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE APPLICATION EXECUTION ENVIRONMENT USING DERIVED USER ACCOUNTS FOR INTERNET CONTENT

Google LLC, Mountain Vie...

1. A method comprising:intercepting a request for installing an application;
determining, based upon a network resource providing the application, if the application is trusted or untrusted;
if the application is determined to be trusted, installing and executing the application within a first user account; and
if the application is determined to be untrusted:
creating a second user account;
installing and executing the application within the second user account; and
associating the application with the second user account wherein the second user account and the first user account are both associated with a same user and are dynamically invoked based on the application within a same integrated user environment of the same user to enable an integrated execution environment for both trusted and untrusted applications,
wherein the second user account is persistent, and wherein the associated application is configured to launch within the second user account on subsequent executions of the application.

US Pat. No. 10,922,402

SECURING SECRET DATA EMBEDDED IN CODE AGAINST COMPROMISED INTERRUPT AND EXCEPTION HANDLERS

VMware, Inc., Palo Alto,...

1. A method of securing secret values stored in registers in a computer system operable in a plurality of privilege levels, wherein the method executes at a first privilege level and comprises:intercepting a first interrupt or exception that is targeted to an operating system executing instructions at a second privilege level, the instructions including a move instruction that sets a register to a secret value by moving an immediate value in the move instruction into the register, a compare instruction that determines whether or not the register contains the secret value by comparing a pre-determined erasure constant with contents of the register containing the secret value, and instructions that rely on the register containing the secret value for correct processing of the instructions, wherein the second privilege level is lower than the first privilege level and the first interrupt or exception is triggered during execution of the instructions that are executing at the second privilege level;
in response to the intercepting, overwriting the secret value stored in the register with the pre-determined erasure constant; and
then forwarding the first interrupt or exception to the operating system for handling of the first interrupt or exception by the operating system, wherein the operating system interprets the pre-determined erasure constant stored in the register as a trigger to re-execute the instructions.

US Pat. No. 10,922,401

DELEGATED AUTHORIZATION WITH MULTI-FACTOR AUTHENTICATION

Pivotal Software, Inc., ...

1. A computer-implemented method comprising:maintaining, by a distributed resource system of one or more computers, a plurality of resources associated with a resource owner, wherein some of the plurality of resources are designated by the resource owner to be critical resources and some of the plurality of resources are designated by the resource owner to be noncritical resources;
receiving, by an authorization system executing on one or more computers, an access request from a client application, wherein the access request requests access by the client application to one of the plurality of resources;
performing, by the authorization system, a first authentication of the resource owner;
determining that the first authentication was successful;
in response to determining that the first authentication was successful, providing, to the resource owner by the authorization system, a selectable list of resources associated with the resource owner;
receiving, by the authorization system from the resource owner, a first delegation request to delegate, to the client application, access to one or more first selected resources among the selectable list of resources associated with the resource owner, wherein the first delegation request comprises a first selection of one or more delegated access permissions for the one or more first selected resources;
evaluating, by the authorization system, resource-specific designations made by the resource owner to determine whether any of the first selection of one or more delegated access permissions is for a resource designated as a critical resource by the resource owner;
determining that none of the first selection of one or more delegated access permissions are for a resource designated as a critical resource by the resource owner;
in response, bypassing multi-factor authentication for the resource owner;
receiving, by the authorization system from the resource owner, a second delegation request to delegate, to the client application, access to one or more second selected resources among the resources associated with the resource owner, wherein the second delegation request comprises a second selection of one or more delegated access permissions for the one or more second selected resources;
if and only if at least one of the second selection of one or more delegated access permissions is for a resource designated as a critical resource by the resource owner, performing multi-factor authentication for the resource owner before issuing a first access token to the client application, comprising:
performing, by the authorization system, a second authentication by requesting multi-factor credentials from the resource owner and authenticating the multi-factor credentials;
determining that the second authentication was successful; and
in response to determining that the second authentication was successful, granting, by the authorization system, the first access token permitting the client application to access the one or more second selected resources on the resource system as designated by the resource owner, wherein the first access token includes access scopes covering some or all of the critical resources on the resource system.

US Pat. No. 10,922,400

USER IDENTIFICATION BASED ON THE MOTION OF A DEVICE

Roku, Inc., Los Gatos, C...

1. A computer implemented method, comprising:detecting a motion of a remote control for controlling a media device;
comparing the detected motion with one or more stored motions, wherein each stored motion is associated with a user ID;
determining a variance between a stored set of movements corresponding to the user ID and the detected motion;
determining that a subsequent authentication in a form of an alpha-numeric passcode is required in addition to the detected motion to provide the user access to the media device;
requesting the subsequent authentication that the determined user ID correctly identifies user operating the remote control;
receiving, from the remote control and responsive to the requesting, the alpha-numeric passcode corresponding to the user ID as the subsequent authentication;
confirming that the alphanumeric passcode corresponds to the user ID;
updating the variance corresponding to the user ID after the receiving the alphanumeric passcode and the confirming; and
providing access to the media device to the user ID based on both the detected motion and the subsequent authentication,
wherein the detecting, comparing, determining, and providing are performed by one or more computer processors.

US Pat. No. 10,922,399

AUTHENTICATION VERIFICATION USING SOFT BIOMETRIC TRAITS

Advanced New Technologies...

1. A method for verifying an authenticated state of a device, the method comprising:capturing, during a primary authentication process in which primary user identifying information is obtained for a subject using a device, first auxiliary user identifying information for a secondary authentication verification of the subject, wherein the first auxiliary user identifying information includes first clothing characteristics of clothing worn on an upper torso;
determining, after the primary authentication process, to perform a secondary authentication verification process to verify identify of the subject; and
performing the secondary authentication verification process, including:
capturing second auxiliary user identifying information for the subject, wherein the second auxiliary user identifying information includes second clothing characteristics of clothing worn on an upper torso;
comparing the first auxiliary user identifying information to the second auxiliary user identifying information, comprising comparing the first clothing characteristics to the second clothing characteristics; and
determining whether the authenticated state of the device is valid based on comparing the first auxiliary user identifying information to the second auxiliary user identifying information.

US Pat. No. 10,922,398

OPTICAL FINGERPRINT SENSOR WITH NON-TOUCH IMAGING CAPABILITY

SHENZHEN GOODIX TECHNOLOG...

1. An apparatus for implementing optical fingerprint sensing in an electronic device having a display panel and a top transparent layer over the display panel, the apparatus comprising:an optical sensor module for being placed underneath an extended section of the top transparent layer and located adjacent to one end of the display panel, the extended section of the top transparent layer extending beyond the one end of the display panel; the optical sensor module including one or more probe light sources to produce probe light to illuminate an object above or in contact with the top transparent layer for optical sensing, and an optical sensor array including optical detectors to detect reflected light from the object above or in contact with the top transparent layer to detect both a first signal to provide a first indication of whether the object is a finger of an authorized user and a second different signal to provide a separate second indication of whether the object is a finger of an authorized user; and
an optical sensor controller coupled to the optical sensor module to control operations of the one or more probe light sources and the optical sensor array to trigger capturing of different images of the object including an image of the object when the object is above the top transparent layer without contacting the top transparent layer as part of the first signal and another image of the object when the object is in contact with the top transparent layer as part of the second signal.

US Pat. No. 10,922,397

METHOD AND DEVICE FOR COMPARING PERSONAL BIOLOGICAL DATA OF TWO USERS

DNANUDGE LIMITED, London...

1. A computer-implemented method of comparing one or more genetic traits of two users, each user having a wearable device storing data indicative of the one or more genetic traits, the data having been obtained by an analysis of a biological sample provided by the user, the method comprising:transmitting the data indicative of the one or more genetic traits from a first of the wearable devices to a first computer device using a short-range wireless data connection;
transmitting the data from the first computer device to a second computer device over a data network;
transmitting the data from the second computer device to a second of the wearable devices over a short-range wireless data connection; and
comparing the data from the first wearable device with the data stored on the second wearable device to determine whether there is a match between the users' one or more genetic traits.

US Pat. No. 10,922,395

FACIAL AUTHENTICATION SYSTEMS AND METHODS UTILIZING TIME OF FLIGHT SENSING

STMICROELECTRONICS, INC.,...

1. A device, comprising:an ambient light sensor that detects, in operation, a change in ambient light in a field of view, the change of the ambient light in the field of view exceeding a minimum threshold indicative of a presence of a user;
a ranging sensor including a time of flight sensor that generates, in operation, a plurality of distance measurements from the time of flight sensor to a plurality of elements on a face of the user, the time of flight sensor configured to have a first mode and a second mode of operation, wherein both the first mode and the second mode, in use, detect a skin reflectance value of the user, the first mode of the time of flight sensor, in operation, detects motion of the user based on a change of distance from the user and the time of flight sensor within a face recognizable distance, the face recognizable distance being a distance between a first presence detection threshold and a second presence detection threshold, the second mode of the time of flight sensor, in operation, generates a depth map of the user's face based on the plurality of distance measurements within the face recognizable distance, the depth map of the user including a depth map of the face of the user; and
a processor coupled to the time of flight sensor and that in operation, receives inputs from the time of flight sensor and outputs a user presence signal in response to the plurality of inputs and activates a facial recognition process in response to the user presence signal and determines whether the depth map of the face of the user is associated with an authorized user of the device.

US Pat. No. 10,922,394

ELECTRONIC DEVICE INCLUDING FINGERPRINT SENSOR AND METHOD FOR OPERATING THE SAME

Samsung Electronics Co., ...

1. An electronic device, comprising:a display;
a fingerprint sensor disposed corresponding to a first area of the display;
a touchscreen panel disposed corresponding to the display; and
at least one processor configured to:
receive, from the touchscreen panel, information about a position of a first touch input for setting up first security information for unlocking the electronic device,
identify the first security information based at least in part on the information about the position of the first touch input, and
control the display to display a user interface for unlocking the electronic device,
wherein the user interface for unlocking the electronic device comprises visual items for unlocking the electronic device,
wherein a plurality of visual items among the visual items correspond to the first security information, the plurality of visual items including at least one first visual item and at least one second visual item, the first security information including a first part and a second part, and
wherein the plurality of visual items are arranged such that the at least one first visual item corresponding to the first part is displayed on the first area of the display corresponding to a position of the fingerprint sensor, and the at least one second visual item corresponding to the second part is displayed on a second area of the display other than the first area.

US Pat. No. 10,922,393

DEEP NEURAL NETWORK FOR IRIS IDENTIFICATION

Magic Leap, Inc., Planta...

1. A system comprising:an authentication training system configured to execute one or more deep neural networks to determine an embedding configured to determine embedding space representations of eye images using a deep neural network with a triplet network architecture, wherein the authentication training system is configured to:
access an anchor eye image of a user, a positive eye image of the user, and a negative eye image of another user, wherein the user is an authorized user;
map, using the one or more deep neural networks, the anchor eye image to a first image embedding space to generate an anchor embedding space representation;
map, using the one or more deep neural networks, the positive eye image to the first image embedding space to generate a positive embedding space representation;
map, using the one or more deep neural networks, the negative eye image to the first image embedding space to generate a negative embedding space representation;
update the one or more deep neural networks to:
reduce a distance in the first image embedding space between the positive embedding space representation and the anchor embedding space representation; or
increase a distance in the first image embedding space between the negative embedding space representation and one or more of the positive and anchor embedding space representations;
generate the embedding based on the updated one or more deep neural networks; and
generate at least one classifier usable to determine a likelihood that embedding space representations of images are associated with the user; anda wearable display system comprising:a display;
an image capture device configured to capture eye images of a wearer, wherein the wearable display system is configured to:
receive a first eye image from the image capture device;
receive, from the authentication training system, the embedding and the at least one classifier;
process the first eye image to generate a representation of the first eye image in polar coordinates;
process the representation of the first eye image using the embedding to generate a first embedding space representation of the first eye image, wherein the first embedding space representation is an n-dimensional vector, and
wherein a majority of elements of the first embedding space representation are statistically independent;
process the first embedding space representation using the at least one classifier to calculate a likelihood score that the first eye image is associated with an authorized user;
grant or deny the wearer access to the wearable display system based on the likelihood score;
transmit the first eye image to the authentication training system; and
receive an updated embedding determined by the authentication training system using the first eye image.

US Pat. No. 10,922,392

SYSTEMS AND METHODS FOR GENERATING AND MANAGING COMPOSITE DIGITAL IDENTITIES

TATA CONSULTANCY SERVICES...

1. A processor-implemented method, comprising:receiving a request comprising an identifier associated with an entity from an identity seeker, wherein said request comprises a context associated with a transaction being initiated by said entity;
identifying, from one or more encrypted tokens stored in a database, an encrypted token corresponding to said identifier;
decrypting said encrypted token to obtain a context matrix; performing an analysis on said context matrix with respect to said request comprising said context associated with said transaction being initiated by said entity;
determining an activity status associated with said transaction based on said analysis being performed;
based on said determined activity status; performing:
a) Obtaining a verification message from said entity, wherein said verification message pertains to said transaction being performed by said entity, and generating a composite provisional digital identity of said entity, specific to said transaction based on said verification message, and wherein the composite provisional digital identity of the entity is sent to the identity seeker for authorizing the transaction:
b) Creating a persona representing a behavioral characteristic based on the composite provisional digital identity of said entity, wherein said persona is dynamic and is generated on a continual basis, and wherein the composite provisional digital identity confirms the identity of the entity to the identity seeker and does not expose the
persona of the entity to the identity seeker: and
c) Generating real time analytics and heuristics to provide a context and an offer specific to said transaction.

US Pat. No. 10,922,391

USER INTERFACE COMPETENCE BASED AUTHENTICATION

WELLS FARGO BANK, N.A., ...

1. A method, comprising:providing a user interface on a user device, wherein the user interface provides an interactive experience for a user;
monitoring at least one user interaction by the user on the user device, the at least one user interaction is one of controlling, navigating, or inputting to the user interface on the user device;
determining a user proficiency based on the at least one user interaction;
monitoring subsequent user interactions with the user interface on the user device;
updating the user proficiency according to the subsequent user interactions with the user device to determine an updated user proficiency;
determining a change in user proficiency based on the updated user proficiency, wherein the change in user proficiency is an increase of user proficiency according to at least one of speed of movement, speed of selections, access to critical files, typing speed, data entry, or time between selections; and
comparing the change in user proficiency to a threshold change.

US Pat. No. 10,922,389

IDENTIFYING COPYRIGHTED MATERIAL USING COPYRIGHT INFORMATION EMBEDDED IN ELECTRONIC FILES

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in one or more pages for presenting digital content, the method comprising:generating, by a computing device, a unique identifier (ID) based on copyright information associated with the digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and wherein the copyright information associated with the digital content includes one or more of at least a portion of the digital content or identity information of a copyright holder of the digital content,
and wherein the digital content is recorded on the blockchain as a first transaction associated with a first blockchain transaction ID and the identity information is associated with a second transaction associated with a second blockchain transaction ID, and wherein the first blockchain transaction ID or the second blockchain transaction ID is associated with one or more transaction records associated with the digital content;
identifying, by the computing device, one or more visual attributes associated with a page design of one or more blank pages of an electronic file;
embedding, by the computing device, the unique ID in the one or more blank pages by changing the one or more visual attributes to be representative of the unique ID, wherein the embedding produces one or more unique ID-embedded pages that each enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a difference between the one or more blank pages and the one or more unique ID-embedded pages is not apparent to an unaided human eye;
allocating, by the computing device, the digital content to at least one of the one or more unique ID-embedded pages, to produce one or more unique ID-embedded pages allocated with the digital content; and
distributing, by the computing device, the one or more unique ID-embedded pages allocated with the digital content to the blockchain network.

US Pat. No. 10,922,388

SESSION CONTROL FOR CLIENT-SIDE APPLICATIONS IN PROXY SOLUTIONS

Microsoft Technology Lice...

1. A computer-implemented method for session control in a proxy service for client-side applications in a client, the method comprising:receiving a service request from a client;
sending the service request to a service provider;
receiving a service response from the service provider that includes a document responsive to the service request;
injecting into the document event monitoring code for monitoring user actions on the client;
sending the service response with the document and event monitoring code to the client;
intercepting by the event monitoring code a user request for action for the document on the client;
sending a query message to the proxy service with data identifying the user request for action and a client-side application used by the user;
receiving by the proxy service the query message with the data identifying the user request for action and the client-side application used by the user;
searching for access data pertaining to the document;
if access data pertaining to the document is found that indicates that the user request for action and the client-side application used by the user is permitted, then sending a query response to the event monitoring code with information indicating that the user request for action is permitted;
if no access data pertaining to the document is found that indicates that the user request for action and the client-side application used by the user is permitted, sending the query response to the event monitoring code with information indicating that the user request for action is not permitted;
receiving in the event monitoring code the query response from the proxy service;
if the query response indicates that the user request for action is permitted, allowing normal execute flow for the user request for action; and
if the query response indicates that the user request for action is not permitted, blocking execution flow for the user request for action.

US Pat. No. 10,922,387

METHOD AND CONTROL SYSTEM FOR CONTROLLING AN EXECUTION OF A SOFTWARE APPLICATION ON AN EXECUTION PLATFORM

SFNT GERMANY GMBH, Munic...

1. Method for controlling an execution of a software application on an execution platform, the execution platform including at least one hardware processor, the method comprising:a) determining, by the at least one hardware processor, a point in time of at least one software update including at least one of the following software updates: installation of an operation system on the execution platform, installation of at least one computer program running on the execution platform, updating of the operation system, and updating of the at least one computer program,
b) generating, by the at least one hardware processor, at least one platform information item based on the at least one software update and the determined point in time according to the step a),
c) generating, by the at least one hardware processor, a first fingerprint based on the at least one generated platform information item of the step b), said first fingerprint being characteristic for the execution platform at the time of carrying out the step a), said first fingerprint being related to the at least one software update,
d) generating a license including said first fingerprint, said license defining terms of an allowed execution of the software application on said execution platform, and
e) controlling, by the at least one hardware processor, the execution of the software application by:
determining at least one of the at least one generated platform information item as used for generating the first fingerprint at the time of executing the software application and generating a second fingerprint based on the at least one determined platform information item,
comparing the second fingerprint with the first fingerprint of the license, and
allowing the execution of the software application according to the terms of the license only when the second fingerprint complies with the first fingerprint.

US Pat. No. 10,922,385

GENERATING LICENSE FILES IN AN INFORMATION HANDLING SYSTEM

Dell Products, L.P., Rou...

1. A method for generating a license file, the method comprising:receiving, via a processor of a first information handling system (IHS), a plurality of input parameters associated with a product;
generating license data at least partially based on the input parameters;
transmitting the license data to a hardware security module (HSM);
triggering the HSM to retrieve a certificate containing allowable use data, the allowable use data including a subject organizational unit and a subject title, the subject organizational unit being one of an OEM IHS and a sub-contractor IHS, and the allowable use data at least partially identifying a permitted installation of a license for the product and utilized to determine if the license can be installed on a target IHS;
triggering the HSM to embed a signer identifier within the certificate, the signer identifier being a name of the first IHS;
triggering the HSM to sign the certificate using using a private key, the private key being generated along with a corresponding public key that is embedded in the certificate;
receiving the signed certificate from the HSM;
generating a license file including the license data and the signed certificate, wherein the signed certificate comprises the allowable use data and the public key; and
transmitting the license file to a second IHS wherein:
the second IHS uses the allowable use data and the signer identifier to determine if installation of the license is permitted on the second IHS;
the public key allows contents of the license file to be verified as generated from a sender with access to the private key, and is therefore a trusted entity; and
in response to determining that installation of the license is permitted on the second IHS, the second IHS initiating installation of the license on the second IHS.

US Pat. No. 10,922,384

CONTENTS BLOCKCHAIN PLATFORM

Whoborn, Inc., Seoul (KR...

1. A content right management method, comprising:receiving contents from a user;
generating a create key for a right for the contents by encrypting the contents using encryption information, wherein the create key includes a copyright of the contents and a creation right of the contents, and wherein the creation right of the contents includes a right to create encrypted contents and a right to create a coin, wherein the coin is a right to access the contents;
in response to the create key being generated, creating the encrypted contents and the coin using bioinformation of the user, and
setting a number of pieces of encrypted contents and a number of coins to be created based on the bioinformation of the user,
wherein the number of coins to be created is set based on a usage right option for a period of use of the contents.

US Pat. No. 10,922,383

ATHLETIC ACTIVITY MONITORING METHODS AND SYSTEMS

adidas AG, Herzogenaurac...

1. An athletic activity monitoring method for use with a sensor module that is physically coupled to an object during an athletic activity conducted by a user, the athletic activity monitoring method comprising:the sensor module detecting movement of the object at a first time;
the sensor module determining that the movement of the object corresponds to a predetermined activation movement, wherein the determination that the movement of the object corresponds to the predetermined activation movement occurs when a raw data value satisfies a threshold data value at the first time;
the sensor module entering an active state in response to the determination that the movement of the object corresponds to the predetermined activation movement; and
upon the sensor module entering the active state, detecting movement of the object at a second time,
wherein the detecting movement of the object at one of the first time and the second time comprises determining a change in the location of the object with respect to a magnetic vector of the object, and
wherein the sensor module in the active state determines a correlation between the movement of the object and an activity metric at the second time by reference to a data structure having magnetic field data.

US Pat. No. 10,922,382

PRECISION DISPENSER FOR LIQUIDS, COMPRISING A DEVICE FOR REMOTE CONTROL AND MONITORING

1. A liquid methadone dispenser device comprising:a liquid methadone precision dispenser comprising a hydraulic and electronic control system configured to be operated by a remote computing device external to the liquid methadone precision dispenser to dispense pre-determined doses of liquid methadone, at an accuracy within 0.5% by volume of the pre-determined doses, to a plurality of patients based on a therapeutic protocol established by a healthcare provider for each of the plurality of patients;
a patient identification device integrated with the liquid methadone dispenser; and
a computing device external to and remotely coupled to the liquid methadone dispenser, the computing device being connected via one or more communication networks to a remote web-based server storing an identification profile comprising the therapeutic profile for each of the plurality of patients, the computing device comprising a processor and a memory coupled to the processor which is configured to execute one or more programmed instructions comprising and stored in the memory to:
receive a patient request from one of the plurality of patients for authorization to dispense the predetermined dose of the liquid methadone at the patient identification device, wherein each of the plurality of patients are authorized to receive the liquid methadone from a plurality of liquid methadone dispensers in a plurality of geographical locations;
transfer the patient request via the one or more communication networks to the remote web-based server;
provide instructions to control the hydraulic and electronic control system of the liquid methadone dispenser to dispense the pre-determined dose of the liquid methadone upon a receipt of an authorization from the web-based server based on the patient request; and
provide instructions to the liquid methadone dispenser not to dispense the pre-determined dose of the liquid methadone upon receipt of a non-authorization from the web-based server, wherein the non-authorization is based on an attempt by the one of the plurality of patients to obtain more than the pre-determined dose of the liquid methadone from another of the plurality of liquid methadone dispensers within a period of time.

US Pat. No. 10,922,381

RE-EQUILIBRATED QUANTUM SAMPLING

D-WAVE SYSTEMS INC., Bur...

1. A method of operation of a hybrid computing system to generate approximate equilibrium statistics, the hybrid computing system comprising an analog processor and a digital processor, the method comprising:initializing the analog processor in a first state at a time t0;
evolving the analog processor from a value of one for an annealing parameter at time t0 until the annealing parameter is equal to an intermediate value between a value of zero and a value of one at a time t1, wherein a time interval ?t0,1 between t0 and t1 is greater than a time interval required for a non-adiabatic transition to an energy state higher than a ground state of the analog processor;
holding the annealing parameter of the analog processor at the intermediate value from the time t1 to a time t2;
evolving the analog processor from the intermediate value at the time t2 until the annealing parameter is equal to one at a time t3, wherein a time interval ?t2,3 between the time t2 and the time t3 is greater than a time interval required for a non-adiabatic transition to an energy state higher than a ground state of the analog processor, wherein at the time t3 the analog processor is in a second state; and
reading out the second state of the analog processor.

US Pat. No. 10,922,380

DISTRIBUTED MATRIX MULTIPLICATION FOR NEURAL NETWORKS

Intel Corporation, Santa...

1. A matrix processor, comprising:a memory to store a plurality of input matrices;
a plurality of matrix processing units (MPUs) to perform matrix multiplication arithmetic;
controller circuitry to:
receive an instruction to be executed by the matrix processor, wherein the instruction instructs the matrix processor to perform a matrix multiplication operation on the plurality of input matrices;
partition the plurality of input matrices into a plurality of input partitions based on a number of available MPUs;
distribute the plurality of input partitions among the plurality of MPUs, wherein each input partition is distributed to a particular MPU of the plurality of MPUs;
perform a plurality of partial matrix multiplication calculations using the plurality of MPUs;
transmit partial matrix data between the plurality of MPUs while performing the plurality of partial matrix multiplication calculations, wherein each MPU is to transmit a portion of the partial matrix data to one or more of the plurality of MPUs simultaneously while each of the plurality of partial matrix multiplication calculations is being performed; and
determine a result of the matrix multiplication operation based on the plurality of partial matrix multiplication calculations.

US Pat. No. 10,922,379

METHOD FOR PROCESSING ELECTRONIC DATA

City University of Hong K...

1. A method for processing digital image data, comprising the steps of:transforming the digital image data to a matrix representation including a plurality of matrices;
decomposing the matrix representation into a series of matrix approximations;
processing, with an approximation process, the plurality of matrices thereby obtaining a low-rank approximation of the plurality of matrices; and
constructing at least one digital image based on the low-rank approximation of the plurality of matrices, wherein the approximation process includes:
a greedy pursuit approximation process, and
a linear regression process, and further includes:
determining a best rank-one approximation of a plurality of residual matrices in each of a plurality of iteration steps in the approximation process; and
subtracting a plurality of rank-one basis matrices from the plurality of residual matrices.

US Pat. No. 10,922,378

SIMULATION METHOD, SIMULATION UNIT, AND PROGRAM

SUMITOMO HEAVY INDUSTRIES...

1. A simulation method for simulating a change in a current flowing through a current path when a voltage applied to the current path is changed in a system including the current path and a member that is acted upon by the current flowing through the current path and affects the current flowing through the current path, the method comprising:representing the current path and the member by aggregates of a plurality of particles; and
updating a value of the current flowing through the current path from a value at a present time to a value obtained by a calculation by calculating electromagnetic action from the other particles to each of the plurality of particles configuring the current path based on the current value at the present time of the current flowing through the current path and a voltage value of an external voltage applied to the current path and by calculating the current flowing through the current path based on a calculation result of the electromagnetic action.

US Pat. No. 10,922,377

INTERNET-BASED PROXY SERVICE TO LIMIT INTERNET VISITOR CONNECTION SPEED

CLOUDFLARE, INC., San Fr...

1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat; and
responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open.

US Pat. No. 10,922,376

PERFUME PACKAGE ACCESSORY DESIGN SYSTEM AND METHOD OF OPERATING PERFUME PACKAGE ACCESSORY DESIGN SYSTEM

1. A method of operating a perfume package accessory design system, the method comprising:a first step of logging-in to a design server through an application installed on a producer's portable terminal;
a second step of providing a 3D model design and an image photograph of a perfume package accessory having a function of storing perfume in a database of the design server, to remodel the perfume package accessory with the image in the model design;
a third step of allowing a producer to download the remodeled perfume package accessory modeling data and apply his/her appearance and the perfume package accessory to augmented reality with a camera of the portable terminal;
a fourth step of returning augmented reality video data and data determining whether modeling of the perfume package accessory is suitable to the design server;
a fifth step of feeding back to the second step when the modeling of the perfume package accessory is determined not to be suitable;
a sixth step of determining whether or not to infringe a copyright when the modeling of the perfume package accessory is determined to be suitable and feeding back to the second step when the copyright is determined to be infringed;
a seventh step of assigning a production number to the perfume package accessory modeling data when the copyright is determined not to be infringed;
an eighth step of registering the perfume package accessory modeling data to which the production number is assigned together with perfume package accessory image data and the augmented reality video data on a public registration window;
a ninth step of allowing a purchaser to view the public registration window when the purchaser logs in the design server through an application installed on a smartphone; and
a tenth step of allowing the purchaser to download the perfume package accessory modeling data when the purchaser makes a purchase or sets a license for the perfume package accessory through the public registration window.

US Pat. No. 10,922,374

TECHNIQUES TO DETERMINE RELATIONSHIPS OF ITEMS IN WEB-BASED CONTENT

Capital One Services, LLC...

1. A computer-implemented method, comprising:determining, by a system, co-occurrences of a pair of items of a plurality of items, wherein each of the co-occurrences of the pair items is summed into a number of co-occurrences of the pair of items of the plurality of items in a search session comprising a plurality of search queries and in web-based content detected by a data mining operation, wherein the data mining operation is a web crawling operation;
generating, by the system, a co-occurrence matrix comprising rows and columns, wherein each entry of the entries of the co-occurrence matrix indicates the number of co-occurrences between the pair of items of the plurality of items;
receiving, by the system, an indication of a web-based search performed for an item of the plurality of items;
determining, by the system, related pairs of the plurality of items based on the entries of the co-occurrence matrix and a relationship threshold value, wherein each related pair includes the item searched in the web-based search and another item of the plurality of items; and
providing, by the system, an indication of each other item of the plurality of items that is related to the item searched based on the related pairs.

US Pat. No. 10,922,373

DYNAMIC LANGUAGE TRANSLATION OF WEB SITE CONTENT

MOTIONPOINT CORPORATION, ...

1. A method implemented on a computer having at least one processor, storage, and communication platform for managing localization of content with respect to a web page, the method comprising the steps of:identifying a location of a web page where content to be displayed therein can be localized;
obtaining one or more versions of localized content, each of which is localized with respect to the content to be displayed at the location;
associating each version of localized content with one or more conditions that need to be satisfied for the localized content to be displayed at the location, the one or more conditions being specified with respect to a language in which online activity of a user accessing the web page is conducted; and
storing the one or more versions of the localized content with the associated one or more conditions with respect the location of the web page so that the localized content can be obtained in the future when the one or more conditions are met.

US Pat. No. 10,922,372

METHODS AND SYSTEMS FOR GENERATING CUSTOM CONTENT USING UNIVERSAL DEEP LINKING ACROSS WEB AND MOBILE APPLICATIONS

Capital One Services, LLC...

1. A system for generating customized content on a website or mobile application through a hyperlink, the method comprising:memory configured to store:
a user profile; and
a feature registry, wherein the feature registry is a centralized catalog for feature providers to register native applications and add and configure features for toggling and throttling in the native applications; and
control circuitry configured to:
receive a feature registry request from a feature registry application on a local device, wherein the feature registry request is generated by the local device in response to a user selection of an anchor link for hyperlink content associated with the feature registry application, and wherein the user selection of the anchor link causes a web browser to load the feature registry application;
in response to receiving the feature registry request:
retrieve an identity of a user associated with the user selection;
retrieve information in the user profile associated with the user; and
retrieve a description of the hyperlink content from the feature registry application on the local device, wherein the description of the hyperlink content comprises a feature reference assigned by the feature registry application provider, for the feature registry;
filter, using a machine learning model, available features on a feature registry based on the identity of the user, the information from the user profile, and the description of the hyperlink content;
select a customized feature for the user from the filtered available features; and
populate a feature template of a native application on a local device with the customized feature.

US Pat. No. 10,922,371

QUERY SELECTION METHOD AND SYSTEM

HITHINK ROYALFLUSH INFORM...

1. A query selection method specifically for querying data from one or more databases, implemented on a hardware which has at least one processor and a storage device, comprising:obtaining, by the at least one processor, a natural sentence;
generating, by the at least one processor, a standard node sequence based on the natural sentence, the standard node sequence including multiple index nodes and at least one condition node, wherein the multiple index nodes correspond to indexes of the one or more database, the at least one condition node including at least one of a number node, a date node, or a character string node;
constructing, by the at least one processor, a node tree according to the standard node sequence, wherein the node tree is structured to include the multiple index nodes, the at least one condition node, a first relationship between a first index node of the multiple index nodes and a second index node of the multiple index nodes, and a second relationship between at least one index node of the multiple index nodes and the at least one condition node;
generating, by the at least one processor, a data query command according to the node tree;
querying, by the at least one processor, data using the data query command from the one or more databases to obtain a query result; and
filtering the query result based on the node tree to obtain a filtered result.

US Pat. No. 10,922,370

PERSONALIZED RECOMMENDATIONS USING LOCALIZED REGULARIZATION

Adobe Inc., San Jose, CA...

1. A method implemented by one or more computing devices, the method comprising:obtaining, by the one or more computing devices, known values for each item in a first subset of a set of items, the known values corresponding to a user of multiple users of the system;
identifying, by the one or more computing devices, a second subset of the set of items, each item in the second subset having an unknown value for the user;
generating, by the one or more computing devices, a model based on localized regularization by:
adding the known values of the user in the first subset into the model;
generating, for each unknown value in the second subset, an expected value based on regularization of the known values of other users in the model; and
generating an estimated value for at least one said unknown value, localized for the user, based on a respective said expected value and at least one of the added known values; and
generating, by the one or more computing devices, a personalized recommendation for the user based on the estimated value.

US Pat. No. 10,922,368

SYSTEM AND METHOD TO DISPATCH INTELLIGENT INVITATIONS TO USERS WITHIN A NETWORK

1. A non-transitory machine-readable storage medium containing instructions that, when executed, cause a scheduler to:send a request to a plurality of subscribers who fit a first profile to play a physical sport at a first venue during a first time period;
wherein the first profile comprises at least one criteria which is partially set by a sender of the request and, in part, configured by default settings;
wherein the at least one criteria further comprises settings associated with a user profile associated with the sender of the request.

US Pat. No. 10,922,367

METHOD AND SYSTEM FOR PROVIDING REAL TIME SEARCH PREVIEW PERSONALIZATION IN DATA MANAGEMENT SYSTEMS

Intuit Inc., Mountain Vi...

1. A computing system implemented method for providing personalized search results to users of a data management system, the method comprising:providing data management interview content data to a user of the data management system as part of a data management interview;
receiving query data from the user corresponding to a request for assistance related to the data management system;
generating initial search results data indicating an assistance document likely to be relevant to the request based on the query data;
training a predictive model, with a machine learning process, to identify characteristics of a preview document that are likely to be relevant to users of the data management system based on attributes of the user;
generating, for the assistance document, personalized assistance document preview data including a preview of the assistance document personalized for the user based on the identified characteristics of the preview document that are likely to be relevant to users of the data management system;
generating personalized search results data identifying the assistance document and including the personalized assistance document preview data; and
outputting the personalized search results data to the user.

US Pat. No. 10,922,366

SELF-ADAPTIVE WEB CRAWLING AND TEXT EXTRACTION

International Business Ma...

1. A method for crawling and extracting main content from a web page, the method comprising:retrieving a HTML document associated with a web page;
identifying at least one entry point located in the retrieved HTML document by utilizing a self-adaptive entry point locator, wherein identifying at least one entry point located in the retrieved HTML document by utilizing a self-adaptive entry point locator comprises identifying at least one domain entry point associated with the retrieved HTML document based on at least one similar entry point in a similar HTML document with a same title as the retrieved HTML document, wherein the retrieved HTML document is located in a different domain from the similar HTML document;
extracting a main content article associated with the retrieved HTML document based on the identified at least one entry point; and
presenting the extracted main content article associated with the retrieved HTML document to a user.

US Pat. No. 10,922,365

SECURE SOCIAL CONNECTION VIA REAL-TIME BIOMETRICS AND COGNITIVE STATE COMPARISON

International Business Ma...

1. A method for connecting users, comprising:measuring biometric information to identify a user state, the user state including both a biometric state and a cognitive state, of a first user via at least one biometric sensor which the first user has interaction with;
matching the user state of the first user to a set of user states of respective other users using a processor;
limiting the set of user states in accordance with user preferences including how recently the user state of a first user was measured relative to the time of a measurement of the user state of another user, by excluding users having a user state that was measured at a time in the past greater than a time threshold, and by weighting each user state according to each respective other user's distance from the first user; and
forming a real-time communications connection between a first user device in the possession of the first user and a second user device in the possession of a second user from the limited set of user states having a best match by determining the second user from the limited set of user states having a most similar or most complementary user state to the first user.

US Pat. No. 10,922,364

WEB CRAWLING METHOD AND SERVER

TENCENT TECHNOLOGY (SHENZ...

1. A web page grabbing method, which is performed by a web page grabbing apparatus comprising at least one processor, the method comprising:obtaining, by the at least one processor, communication time between n grabbing servers and a website (n being an integer greater than 1) and determining, by the at least one processor, a grabbing server having shortest communication time;
grabbing via the determined grabbing server, by the at least one processor, a target web page on the website, the target web page comprising a web page corresponding to a Hypertext Markup Language 5 (H5) content and a web page corresponding to a non-H5 content;
detecting, by the at least one processor, the web page corresponding to the H5 content according to web page source code of the target web page;
performing, by the at least one processor, dynamic rendering on the web page corresponding to the H5 content, to obtain a rendered web page; and
extracting, by the at least one processor, content details information corresponding to the H5 content from the rendered web page.

US Pat. No. 10,922,363

CODEX SEARCH PATTERNS

1. A method operating on a system including, a plurality of computers linked together forming a neural network functioning as a single entity, the system employing a search pattern database (Codex), the Codex being stored in a digital memory device within the system, at least one end user computing terminal in digital communication with the neural network to search the Codex, the search pattern database residing in the Codex, the search pattern database including a comprehensive collection of recognized search pattern to a specific language, a webpage database residing in the Codex, the webpage database including a master index and a partial master index for each element of the Codex, and optimizer software residing in a digital memory device of a respective end user computing terminal, wherein the optimizer software includes execution instructions to transform a user's input into a search pattern based upon rules of grammar and semantics and to store the data in the digital memory device of the respective end user computing terminal, the method comprising:employing and coordinating, by the system, web crawlers to continuously interact with, scan, gather, analyze and distill raw documents from an Internet environment and process the raw documents into a formatted implementable representation of data for human monitoring and evaluation and updating the Codex with the latest statistically significant formatted implementable representation of data for human monitoring and evaluation;
receiving, by the system, a recognized search pattern and then storing the recognized search pattern in the search pattern database;
data mining, by the system, the webpage database stored in the Codex by executing software instructions based on rules of semantics as trending data stored in the web page database, wherein the rules of semantics include programming to analyze, parse and index refine the database to determine portions of the database that are relevant, using rules of semantic relevancy, to the most recent formatted data received;
searching, by the system, the Codex for at least one match to the interactively mapped recognized search pattern;
comparing, by the system, the trending data to top search results from the search using the recognized search pattern to proactively generate output based upon an occurrence of the trending data matching the recognized search pattern; and
automatically communicating, by the system, updated output from the search using the recognized search pattern to the end user computing terminal.

US Pat. No. 10,922,362

MODELS FOR UTILIZING SILOED DATA

Clover Health, Jersey Ci...

1. A system comprising:one or more processors; and
computer-readable media storing first computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, from a first source associated with a first country, first data associated with health of a first individual, the first data corresponding to a first data type;
receiving, from at least one of the first source or a second source associated with the first country, second data associated with the health of the first individual, the second data corresponding to a second data type;
receiving, from a remote system associated with a second country, a first indication that the remote system is associated with:
third data associated with health of a second individual, the third data corresponding to the first data type, the third data being restricted from transfer from the remote system; and
fourth data associated with the health of the second individual, the fourth data corresponding to a third data type, the fourth data being restricted from transfer from the remote system;
receiving a second indication of a health-related outcome to be determined with respect to the second individual;
sending, to the remote system and based at least in part on the third data and the fourth data being restricted from transfer, a predictive-layer configuration including pseudo code configured for use by the remote system to generate a first predictive layer configured to accept the third data and the fourth data and to determine a first probability of the healthrelated outcome occurring with respect to the second individual;
generating, based on the remote system being associated with the third data and receiving the first data, a second predictive layer configured to accept the first data and to determine a second probability, based on the first data, of the health-related outcome occurring with respect to the first individual;
sending the second predictive layer to the remote system, the second predictive layer configured to generate a first feature configured as an input to the first predictive layer;
receiving, from the remote system, a third predictive layer configured to generate a second feature;
generating a fourth predictive layer configured to accept the first data, the second data, and the second feature; and
determining a third probability of the health-related outcome occurring with respect to the first individual based on the fourth predictive layer.

US Pat. No. 10,922,361

IDENTIFYING AND STRUCTURING RELATED DATA

Microsoft Technology Lice...

1. A method comprising:receiving an indication of an input entity via a user interface;
initiating display of one or more related attribute types via the user interface, wherein each related attribute type of the one or more related attribute types is determined to be related to the input entity;
initiating display of a plurality of related entities via the user interface, wherein each related entity of the related entities is determined to be related to the input entity;
receiving an attribute type selection via the user interface, the attribute type selection identifying a selected attribute type of the one or more related attribute types;
in response to receiving the attribute type selection, initiating display of at least one attribute value of the selected attribute type for the input entity;
receiving a related entity selection via the user interface;
upon receipt of the related entity selection, identifying an entity attribute value of the selected attribute type for the related entity selection; and
updating the display of the plurality of related entities, wherein display of each related entity is based on the selected attribute type of each related entity including the entity attribute value.

US Pat. No. 10,922,360

ANCILLARY SPEECH GENERATION VIA QUERY ANSWERING IN KNOWLEDGE GRAPHS

International Business Ma...

1. A processor-implemented method for generating ancillary speech in response to one or more natural language queries, the method comprising:receiving a query from a querent;
interpreting the one or more terms of the received query using a plurality of schema information;
rewriting the initial query into a plurality of related queries;
pruning one or more related queries from the plurality of related queries on at least one of one or more contemporary circumstances;
retrieving one or more preferences associated with the querent, where each of the one or more preferences is assigned a weight representing an importance of each preference to the querent;
filtering out one or more of the one or more pruned related queries that do not match the one or more preferences;
sorting the one or more filtered pruned related queries according to the weight of each matching preference; and
based on the sorting, answering a pruned query of the one or more filtered pruned related queries with a knowledge graph.

US Pat. No. 10,922,359

COMPUTERIZED SYSTEM AND METHOD FOR EXTRACTING ENTITY INFORMATION FROM TEXT COMMUNICATIONS AND DISPLAYING CONTENT BASED THEREFROM

VERIZON MEDIA INC., New ...

1. A method comprising the steps of:identifying, via a computing device, a message addressed to a user, said message at least comprising text within a body of the message;
analyzing, via the computing device, said message, and based on said analysis, determining a context of said message;
parsing, via the computing device, said message according to the determined context, and based on said parsing, identifying entity information within said message corresponding to said context, said entity information comprising a portion of text within said message referencing a real-world or digital entity;
extracting, via the computing device, said entity information;
generating, via the computing device, a search query based on said extracted entity information;
receiving, via the computing device, a result of the search query;
searching and identifying, via the computing device, digital content based on said received result;
generating, via the computing device, for inclusion in a user interface (UI), an electronic content card for said entity information, said content card comprising said digital content identified from said result; and
automatically causing, via the computing device, to be displayed on a device of said user without user input, said generated UI comprising a content card in association with said message.

US Pat. No. 10,922,358

SYSTEM AND METHOD FOR ANALYSIS OF STRUCTURED AND UNSTRUCTURED DATA

KPMG LLP, New York, NY (...

1. A computer-implemented method for analyzing at least one of structured and unstructured data, the method comprising:receiving at least one input file to be analyzed, wherein the at least one input file includes the structured and unstructured data;
splitting the at least one input file into a plurality of documents based on rules-based patterns and artificial intelligence trained on domain-specific knowledge to detect boundaries and split the document along the detected boundaries;
classifying, through rules-based patterns and machine learning, each page of the plurality of documents as one of structured or unstructured data, and the type of structured or unstructured data;
parsing, via rules-based patterns and machine learning, the pages of the plurality of documents classified as unstructured data into domain specific sections;
extracting relevant data from the parsed pages;
mapping each of the extracted relevant data to standardized output;
generating canonical data sets based on the standardized outputs; and
training and refining the machine learning based on the mapping of relevant data to the standardized output.

US Pat. No. 10,922,357

AUTOMATICALLY MAPPING NATURAL LANGUAGE COMMANDS TO SERVICE APIS

Amazon Technologies, Inc....

14. A non-transitory, computer-readable storage medium, storing program instructions that when executed by one or more computing devices cause the one or more computing devices to implement:receiving a request to map one or more application programming interface (API) functions to one or more natural language commands;
responsive to the request, evaluating the one or more application programming interface (API) functions corresponding to one or more web-based services according to one or more grammatical rules that apply a common command structure to a plurality of different web-based services to automatically generate a mapping of the one or more natural language commands to a corresponding one of the application programming interface (API) functions; and
selecting one of the API functions corresponding to one of the natural language commands using the generated mapping and invoking the selected one of the API functions for one of the web-based services mapped to the one of the natural language commands in response to identifying the one of the natural language commands in a natural language input.

US Pat. No. 10,922,356

EXPANDABLE DATA OBJECT MANAGEMENT AND INDEXING ARCHITECTURE FOR INTERSYSTEM DATA EXCHANGE COMPATIBILITY

Slack Technologies, Inc.,...

1. A group-based communication platform configured for generating a work graph based on one or more work objects, the group-based communication platform comprising:one or more memory storage areas; and
one or more processors collectively configured to:
intake one or more work objects from a validated external resource for distribution to one or more client devices via at least one of one or more group-based communication channels, wherein the one or more work objects comprise metadata and body content data;
determine a work object type for each of the one or more objects;
extract work object data from each of the one or more work objects, wherein the work object data extracted from each of the one or more work objects is identified based at least in part on the work object type, and wherein the work object data is extracted from the metadata and the body content data;
identify, based at least in part on the work object data, relationships established via each of the one or more work objects; and
establish, based at least in part on the relationships established via each of the one or more work objects; a work graph data structure interrelating one or more work objects shared via the group-based communication platform.

US Pat. No. 10,922,355

METHOD AND APPARATUS FOR RECOMMENDING NEWS

Baidu Online Network Tech...

1. A method for recommending news, comprising:receiving a voice request for playing news;
analyzing the voice request, and determining a target attribute associated with the voice request from a preset user attribute set based on an analysis result;
acquiring user attribute information corresponding to the target attribute; and
selecting out target news from a to-be-recommended news database for recommendation based on the analysis result of the voice request and the user attribute information corresponding to the target attribute, wherein the selecting out target news from a to-be-recommended news database for recommendation based on the analysis result of the voice request and the user attribute information corresponding to the target attribute comprises:
acquiring summary information of to-be-recommended news in the to-be-recommended news database, the summary information comprising a title and a content summary;
calculating a first similarity between the summary information of the to-be-recommended news and the analysis result;
calculating a second similarity between the summary information of the to-be-recommended news and the user attribute information corresponding to the target attribute;
obtaining a weighted summation of the first similarity and the second similarity;
selecting out the target news based on the weighted summation of the first similarity and the second similarity; and
pushing the target news.

US Pat. No. 10,922,354

REDUCTION OF UNVERIFIED ENTITY IDENTITIES IN A MEDIA LIBRARY

Apple Inc., Cupertino, C...

1. A method for combining feature vector clusters on an electronic device, the method comprising:obtaining, at the electronic device, cluster data, wherein the cluster data comprises:
first cluster data indicative of a first feature vector cluster comprising a plurality of first feature vectors determined to be similar to one another; and
second cluster data indicative of a second feature vector cluster comprising a plurality of second feature vectors determined to be similar to one another, wherein each feature vector of each one of the plurality of first feature vectors and the plurality of second feature vectors is representative of a face of an unverified entity appearing in a digital asset of a plurality of digital assets;
grouping, at the electronic device, the plurality of first feature vectors and the plurality of second feature vectors in a bundle of feature vectors based on determining that a distance between a centroid of the first feature vectors of the plurality of first feature vectors and a centroid of the second feature vectors of the plurality of second feature vectors is less than a first threshold distance;
presenting, at the electronic device, a bundle of digital assets representative of each digital asset of the plurality of digital assets that comprises a face represented by a feature vector of the bundle of feature vectors; and
facilitating, at the electronic device, identity verification of a single identity to every feature vector of the bundle of feature vectors using the presented bundle of digital assets.

US Pat. No. 10,922,353

HYBRID DETECTION RECOGNITION SYSTEM

Ricoh Company, Ltd., Tok...

1. A method comprising:receiving, by one or more processors, a first image;
determining, by the one or more processors, a first region of interest and a second region of interest in the first image;
determining, by the one or more processors, a first classification score for the first region of interest and a second classification score for the second region of interest using a convolutional neural network, the convolutional neural network assigning the first region of interest the first classification score corresponding to a class and the second region of interest the second classification score corresponding to the class;
determining, by the one or more processors, whether the first region of interest and the second region of interest share a similar spatial location;
responsive to determining that the first region of interest and the second region of interest share the similar spatial location, combining, by the one or more processors, the first classification score and the second classification score to determine a result class for the similar spatial location; and
identifying, by the one or more processors, a first product in the first image based on the combined classification score.

US Pat. No. 10,922,352

PLACARD-TO-PIN INTERACTION

CoStar Realty Information...

1. A computer-implemented method comprising:providing, for output and by an application server that is associated with a search system, an initial search results page that includes (i) an initial ranked list of properties that satisfy an initial search query, and (ii) representations of the properties that satisfy the initial search query, overlaid on an initial map;
receiving, by the application server that is associated with the search system, data indicating that a particular representation has been selected; and
in response to receiving the data indicating that the particular representation has been selected:
generating, by the application server that is associated with the search system, an updated search query using data for the particular representation that has been selected;
determining, by the application server that is associated with the search system and using the updated search query, an updated list of properties that satisfy the updated search query, the updated list of properties including one or more properties included in the initial ranked list of properties that satisfy the initial search query;
generating, by the application server that is associated with the search system, an updated ranked list of the properties that satisfy the updated search query, the updated ranked list including one or more properties included on the initial ranked list of properties that satisfy the initial search query; and
providing, for output and by the application server that is associated with the search system, an updated search results page that includes (i) the updated ranked list of the properties that satisfy the updated search query, the updated ranked list including one or more properties included on the initial ranked list of properties that satisfy the initial search query, and (ii) representations of properties that satisfy the updated search query, overlaid on an updated map that has an increased zoom level relative to the initial map.

US Pat. No. 10,922,351

DYNAMIC FEEDBACK IN A RECOMMENDATION SYSTEM

RCRDCLUB Corporation, Ne...

1. A method for managing a pool of media items, the method comprising:generating a profile vector of a user based upon vector representations of a plurality media items previously consumed by the user;
effecting a change to the profile vector in a manner that is inversely proportional to a total number of times that the user has consumed a specific media item;
selecting, by a processor and based on the profile vector of a user, a seed media item from among a plurality of media items, wherein a selection of the seed media item is based on dot products between the profile vector and a vector representation of media items of a first subset of the plurality of media items;
generating, by the processor, a first pool of media items based upon the seed media item, the first pool including a second subset of the plurality of media items;
receiving, by the processor, a feedback signal about a media item of the first pool; and
modifying, by the processor and based on the feedback signal, contents of the first pool to produce a second pool, wherein the second pool includes a media item not included in the first pool.

US Pat. No. 10,922,350

ASSOCIATING STILL IMAGES AND VIDEOS

Google LLC, Mountain Vie...

1. A system comprising one or more computers including one or more storage devices storing instructions that when executed by the one or more computers cause the one or more computers to perform operations comprising:receiving a search query submitted by a user of a user device;
identifying one or more images that are responsive to the search query;
determining that a video is related to one or more of the images responsive to the search query, wherein determining that the video is related to a particular image responsive to the search query comprises:
extracting one or more features from the particular image responsive to the search query;
extracting one or more features from the video;
comparing the features extracted from the particular image responsive to the search query to the features extracted from the video; and
determining that the video is related to the particular image responsive to the search query based on the comparison of the features extracted from the particular image responsive to the search query to the features extracted from the video; and
presenting the video alongside the images that are responsive to the search query on a display of the user device.

US Pat. No. 10,922,349

FILTERING REMOTE ACCESS MONITORING DATA

Amazon Technologies, Inc....

1. A computer-implemented method comprising:under control of one or more processing devices,
receiving, from an image capturing device, captured image data for a monitored location;
receiving, from a delivery system, delivery information for an item delivered at the monitored location, wherein the delivery information includes: (i) an identifier for the monitored location; and (ii) temporal information indicating when the item was delivered at the monitored location;
identifying a portion of the captured image data showing delivery of the item, wherein identifying the portion of the captured image data comprises:
identifying a monitoring threshold, wherein the monitoring threshold corresponds to the identifier for the monitored location, and wherein the monitoring threshold identifies a desired size of the portion of the captured image data,
determining a starting point, in the captured image data, of the portion of the captured image data based at least in part on the temporal information indicating when the item vas delivered at the monitored location,
identifying the portion of the captured image data based at least in part on the starting point in the captured image data, and
determining that a size of the portion of the captured image data satisfies the desired size of the portion of the captured image data; and
transmitting the portion of the captured image data to a device associated with the monitored location.

US Pat. No. 10,922,348

REPRESENTATION OF A DATA ANALYSIS USING A FLOW GRAPH

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method, comprising:generating, by a device operatively coupled to a processing unit, a directed acyclic graph that traces a flow of objects during execution of a data analysis program, wherein vertices of the directed acyclic graph correspond to respective function calls of a plurality of function calls during the execution of the data analysis program, and an edge connected to the node represents an output of a function associated with the function call;
annotating, by the device, for respective recognized function calls of the plurality of function calls that are determined to have matching annotation labels in a set of annotation databases, first vertices of the vertices of the directed acyclic graph corresponding to the respective recognized function calls with their matching annotation labels, wherein the annotating generates an annotated directed acyclic graph comprising annotated function calls;
removing, by the device, second vertices of the vertices from the annotated directed acyclic graph corresponding to respective unrecognized function calls of the plurality of function calls that are determined not to have matching annotation labels in the set of annotation databases, and removing, by the device, edges connected to the second vertices from the annotated directed acyclic graph;
annotating, by the device the node of the directed acyclic graph with a name of the function associated with the function call,
annotating, by the device, the edge with a name of the object being output by the function;
annotating, by the device, first the vertices based on an annotation database of the set of annotation databases, selected based on a type of programming language of the data analysis program;
identifying, by the device, a taxonomy of functions;
taxonomizing, by the device, the annotated directed acyclic graph based on the taxonomy of functions and the respective recognized function calls, resulting in the respective recognized function calls being semantically grouped by concept, resulting in a semantic directed acyclic graph;
facilitating, by the device, identifying a similar data analysis program based on the semantic directed acyclic graph, wherein the similar data analysis program comprises data analysis functions and data sets that are conceptually similar to the data analysis program; and
tracking, by the device, semantic labels of the set of semantic labels matched by the semantic labeling component over a plurality of runs of data analysis programs.

US Pat. No. 10,922,347

HIERARCHICAL DICTIONARY WITH STATISTICAL FILTERING BASED ON WORD FREQUENCY

1. A method for organizing a plurality of words associated with a document, comprising:inputting, by a processor of a computing device, each of the plurality of words associated with the document to a memory coupled to the computing device, the memory including instructions to perform:
for each of the plurality of words:
identifying a hash value corresponding to a word and determining whether a bucket associated with the hash value in a first hash map is available, the first hash map having a first word capacity;
based upon the determination, storing the word and updating a frequency of the word in the first hash map; and
in a second hash map, storing the word and ranking the word relative to each other of the plurality of words based on the frequency, the second hash map having a second word capacity, the second word capacity being greater than the first word capacity; and
after a predetermined period of time has elapsed, transferring a portion of the plurality of words based upon the ranking to a third hash map, the third hash map having a third word capacity, the third word capacity being greater than the second word capacity.

US Pat. No. 10,922,346

GENERATING A SUMMARY BASED ON READABILITY

Micro Focus LLC, Santa C...

1. A method executed by a computer system, comprising:extracting a set of sentences from a digital document;
scoring, by a computer, each respective sentence of the set of sentences using a respective informativeness measure that is computed:
i) based on a similarity score representing a similarity of the respective sentence with at least one other sentence of the set of sentences, and
ii) based on a number of words in the respective sentence that have term frequency-inverse document frequency (tf-idf) values indicating that the number of words are key words;
scoring each respective sentence of the set of sentences using a respective readability measure that is calculated based on a number of words in the respective sentence that are on a reading list;
selecting selected sentences in the set of sentences based on the respective readability measures and the respective informativeness measures, wherein the selected sentences in the set of sentences are selected using a linear program optimization that maximizes informativeness and readability of an electronic readable summary as measured by the respective informativeness measures and the respective readability measures of the respective sentences in the set of sentences;
identifying a low readability, high informativeness sentence from the set of sentences, wherein the low readability, high informativeness sentence has an informativeness measure that is greater than informativeness measures of other sentences of the set of sentences, and has a readability measure that is less than readability measures of the other sentences;
creating a concatenated sentence by concatenating at least one contextual sentence with the low readability, high informativeness sentence, wherein the concatenated sentence has a higher readability than the low readability, high informativeness sentence;
computing a readability measure of the concatenated sentence satisfying a specified criterion; and
generating the electronic readable summary of the digital document, the electronic readable summary including the concatenated sentence and the selected sentences.

US Pat. No. 10,922,345

SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIES

People.ai, Inc., San Fra...

1. A method comprising:identifying, by one or more processors, a first electronic activity and a second electronic activity associated with a data source provider that has been transmitted by a sender of the first electronic activity and the second electronic activity and received by one or more recipients of the first electronic activity and the second electronic activity, the first electronic activity and the second electronic activity readable by the one or more recipients;
parsing, by the one or more processors, the first electronic activity to identify one or more electronic accounts associated with at least the sender or the one or more recipients of the first electronic activity;
determining, by the one or more processors, responsive to parsing the first electronic activity, that the first electronic activity is sent from or received by an electronic account of the one or more electronic accounts, the electronic account corresponding to the data source provider;
determining, by the one or more processors, responsive to parsing the second electronic activity, that the second electronic activity is sent from or received by the electronic account of the one or more electronic accounts;
selecting, by the one or more processors based on the electronic account, one or more filtering policies associated with the data source provider to apply to the first electronic activity and the second electronic activity, the selected one or more filtering policies including at least one of i) a keyword policy configured to identify electronic activities including a predetermined keyword; ii) a regex pattern policy configured to identify electronic activities including one or more character strings that match a predetermined regex pattern; or iii) a logic-based policy configured to identify electronic activities based on participants of the electronic activities satisfying a predetermined group of participants;
determining, by the one or more processors, by applying the selected one or more filtering policies to the first electronic activity, to restrict the first electronic activity from being matched with one or more record objects of a system of record of the data source provider based on the first electronic activity satisfying at least one of the selected one or more filtering policies, the system of record of the data source provider including a plurality of record objects;
restricting, by the one or more processors, the first electronic activity from being matched with one or more record objects of the system of record;
determining, by the one or more processors, by applying the selected one or more filtering policies to the second electronic activity, to match the second electronic activity with one or more record objects of the system of record of the data source provider based on the second electronic activity not satisfying any of the selected one or more filtering policies;
matching, by the one or more processors, responsive to determining to match the second electronic activity with the one or more record objects, the second electronic activity with a first record object of the one or more record objects responsive to a match policy; and
transmitting, by the one or more processors, to the system of record, instructions to store an association between the second electronic activity and the first record object in the system of record.

US Pat. No. 10,922,344

IMPORTING DOCKETING DATA

Black Hills IP Holdings, ...

1. A method for importing docketing data, the method comprising:retrieving, from a storage device, a data structure that includes docketing information for a plurality of matters comprising a first matter from a source docketing system;
searching a publicly available database to retrieve information associated with the first matter;
verifying that data in at least one field of the first matter matches data in a corresponding field of the retrieved information;
obtaining an expected activity type sequence that indicates a second activity type is expected to be present following occurrence of a first activity type;
automatically detecting existence of an error in the first matter based on a combination of two or more fields of the first matter, the automatically detecting existence of the error comprising determining that a sequence of a plurality of activity types of the first matter does not match the expected activity type sequence; and
storing the first matter in a target docketing system.

US Pat. No. 10,922,343

DATA SEARCH DEVICE, DATA SEARCH METHOD, AND RECORDING MEDIUM

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable recording medium storing a data search program that causes a computer to execute a process comprising:receiving a search character string for target text data; and
searching for the search character string by a logical operation between index information associated with appearance positions in the target text data of each of characters or words appearing in the target text data as bitmap data and search bitmap data generated to be associated with an appearance order in the search character string of respective characters or respective words constituting the search character string, wherein
the searching includes performing full-text searching using a bitmap index (BI) while considering continuity of the positions of the respective characters or the respective words, without performing substantive matching,
the receiving includes receiving the target text data,
the process further includes generating the index information with respect to each of characters or words appearing in the target text data and encoding the text data in units of the characters or in units of the words,
the receiving includes receiving a search character string for the encoded target text data, and
the searching includes searching for the search character string by a logical operation between the generated index information and search bitmap data generated to be associated with an appearance order in the search character string of respective characters or respective words constituting the search character string, wherein the searching includes searching for the search character string by searching for the search character string using the bitmap index without decoding the encoded target text data.

US Pat. No. 10,922,342

SCHEMALESS SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING AND UTILIZING A CHATBOT KNOWLEDGE BASE OR THE LIKE

STRATIFYD, INC., Charlot...

1. A system for automatically building a knowledge base, comprising:memory storing question-and-answer detection instructions forming a textual analytics tool executed by a processor and operable for parsing a query to a platform utilizing an existing knowledge base to identify a missing question-and-answer pair associated with the existing knowledge base;
the memory storing answer formulation instructions executed by the processor and operable for manually or automatically generating an answer to the query to form a potential question-and-answer pair;
the memory storing question-and-answer validation instructions executed by the processor and operable for manually or automatically validating the formulated potential question-and-answer pair; and
the memory storing question-and-answer substitution instructions executed by the processor and operable for updating the existing knowledge base with the validated formulated potential question-and-answer pair to form a new knowledge base;
wherein the potential question-and-answer pair associated with the query and question-and-answer pairs associated with the existing knowledge base are vector encoded by a deep neural network (DNN) and compared for semantic similarity distance to determine if the existing knowledge base is expanded to form the new knowledge base, wherein the DNN is trained with training data utilizing a text clustering algorithm to discover hidden topics and provide a taxonomy that informs data inclusion in the new knowledge base; and
wherein the platform is operable for receiving another query and responding utilizing the new knowledge base.

US Pat. No. 10,922,341

NON-TABULAR DATASOURCE CONNECTOR

Splunk Inc., San Francis...

1. A method comprising:activating, by a native data search and processing system, a datasource connector of the native data search and processing system, the datasource connector configured to communicate with an external source;
receiving, by the native data search and processing system, a plurality of attributes of a query in a native language of the native data search and processing system, the plurality of attributes being displayed and received via a customized user interface configured to assist in building a query language statement;
formatting, by the datasource connector, the plurality of attributes of the query into the query language statement in a native language of the external source, the native language of the external source being different from the native language of the native data search and processing system;
causing display of the query language statement in the native language of the external source on the customized user interface displaying the plurality of attributes, the display of the query language statement being automatically updated after each input of an attribute of the plurality of attributes on the customized user interface;
making, by the datasource connector, an application programming interface (API) call to the external source in response to activation of a search trigger associated with the displayed query language statement on the customized user interface, the API call including transmission of the query language statement to the external source, the API call causing the external source to perform a query using the query language statement;
receiving, by the datasource connector, results of the query performed at the external source, the results being in a non-tabular format;
reformatting, by the datasource connector, the results in the non-tabular format into a tabular format;
persisting the results, as a lookup table, for use in a further query performed within the native data search and processing system; and
performing the further query in the native language of the native data search and processing system using either the lookup table or in real-time using the results.

US Pat. No. 10,922,340

CONTENT EXTRACTION FOR LITERARY WORK RECOMMENDATION

AMAZON TECHNOLOGIES, INC....

1. A system for providing book recommendations, the system comprising:one or more processors; and
one or more non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform acts comprising:
receiving, from a user device of a user, a request for a book recommendation, the request representing a string of text entered by the user via the user device;
analyzing the request using natural language processing (NLP);
determining, based on analyzing the request using NLP, one or more keywords that are associated with the book recommendation;
determining, based on the one or more keywords, a plot, a setting, and a genre of the book recommendation;
searching a database of digital books based on the plot, the setting, and the genre of the book recommendation to identify one or more digital works related to the plot, the setting, and the genre of the book recommendation, wherein digital books in the database of digital books are stored in association with metadata that indicates the plot, the setting, and the genre of the digital books, and wherein the metadata is generated based at least in part on using NLP to analyze at least one of a review of individual digital books or text of the individual digital books;
determining, based on searching the database of digital books:
a first similarity value indicating a first similarity between first metadata stored in association with a first digital book and the one or more keywords; and
a second similarity value indicating a second similarity between second metadata stored in association with a second digital book and the one or more keywords, wherein the first digital book and the second digital book are responsive to the request;
determining that the first similarity value is greater than the second similarity value; and
sending, to the user device, responsive to the request, and based on the first similarity value being greater than the second similarity value, a recommendation of the first digital book.

US Pat. No. 10,922,339

PORTABLE GLOBE CREATION FOR A GEOGRAPHICAL INFORMATION SYSTEM

Google LLC, Mountain Vie...

1. A method for providing a portable globe for a geographical information system (GIS) from a remote device to a local device, comprising:receiving, by one or more processors, one or more queries associated with at least one selected region corresponding to a geographical region of a master globe;
organizing, by the one or more processors, geospatial data from the master globe based on the at least one selected region, the geospatial data including geospatial data associated with the at least one selected region and geospatial data associated with a geographic area located outside the at least one selected region; and
creating the portable globe based on organized geospatial data from the master globe based on the at least one selected region, wherein the portable globe is smaller in data size than the master globe; and
transmitting the portable globe to a local device configured to render the portable globe, wherein the at least one selected region is capable of being rendered at the local device during a period of reduced network connectivity between the local device and the remote device.

US Pat. No. 10,922,338

METHODS, SYSTEMS, NETWORKS, AND MEDIA FOR GENERATING LOCATION BASED CLUSTERS OF MERCHANTS BASED ON CONSUMER TRANSACTION ACTIVITY

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for generating merchant clusters based upon monitored consumer transaction activity, comprising:obtaining, by a processor, transaction activity of consumers;
generating, by the processor, a reference cluster based on the obtained transaction activity;
generating, by the processor, at least one regional merchant cluster for each of a plurality of different geographic regions based on the obtained transaction activity;
determining, by the processor, at least one match score of the at least one regional merchant cluster in the plurality of different geographic regions against the reference cluster thereof;
generating, by the processor, a reference vector and a regional vector for each of the plurality of different geographic regions;
generating, by the processor, a cluster labeling scheme, for each of the plurality of different geographic regions, based on comparing each of the regional merchant clusters in that corresponding geographic region against the reference cluster; and
realigning, by the processor, cluster labels for each of the regional merchant clusters in each of the plurality of different geographic regions based on the corresponding cluster labeling scheme generated for the corresponding geographic region.

US Pat. No. 10,922,337

CLUSTERING OF DATA RECORDS WITH HIERARCHICAL CLUSTER IDS

AMPERITY, INC., Seattle,...

1. A system comprising:a database that stores at least one database table comprising a plurality of records; and
a memory coupled to a processor; the memory comprising a plurality of instructions that cause the processor to:
access a subset of records derived from at least one database table;
generate a hierarchical clustering for the subset of records by iteratively performing ordinal classifications on a plurality of pairwise comparisons over a plurality of iterations, the hierarchical clustering comprising a plurality of tiers, wherein each tier corresponds to a respective degree of confidence among the records within the tier, wherein the ordinal classifications are performed by an ordinal classifier that generates a non-binary output based on training data comprising ordinal, non-binary labels;
assign a respective hierarchical cluster ID to each record in the subset of records according to the hierarchical clustering, the hierarchical cluster ID comprising a series of values, wherein each value reflects a respective tier among the plurality of tiers; and
receive a hierarchical cluster ID from a client device to allow a selection of a cluster corresponding to one tier among the plurality of tiers of the hierarchical clustering according to the hierarchical cluster ID.

US Pat. No. 10,922,336

SYSTEMS AND METHODS FOR INDEXING AND AGGREGATING DATA RECORDS

Palantir Technologies Inc...

1. A system comprising:a memory device configured to store a set of instructions; and
one or more processors configured to execute the set of instructions to:
access a plurality of data records comprising a plurality of data values;
identify those of the plurality of data records having a matching data value within the plurality of data values of the data record, wherein the identified data records also include one or more non-matching data values;
determine a measure of the identified data records, wherein the measure of the identified data records is based on an aggregation of the identified data records; and
generate a summarized data record indicating the matching data value and the measure of the identified data records, wherein the summarized data record does not include at least some of the non-matching data values of the identified data records.

US Pat. No. 10,922,335

USER TARGETING USING AN UNRESOLVED GRAPH

Facebook, Inc., Menlo Pa...

1. A method comprising:identifying, by an online system, a set of unresolved identifiers, wherein an unresolved identifier defines a context in which a client device accesses one or more online systems, and wherein the context has not been determined to be associated with a specific user;
identifying, by the online system, for each unresolved identifier of the set of unresolved identifiers, information associated with the unresolved identifier, the information describing characteristics of one or more access events associated with the unresolved identifier;
for each pair of unresolved identifiers:
determining, by the online system, based on the information associated with each unresolved identifier, a similarity score for the pair of unresolved identifiers;
determining, by the online system, that the determined similarity score exceeds a threshold similarity score; and
responsive to determining that the similarity score exceeds the threshold similarity score:
clustering, by the online system, the pair of unresolved identifiers in a graph, the clustering indicating a prediction that the pair of unresolved identifiers are associated with a common user; and
displaying, by the online system, on one or more user devices associated with at least one unresolved identifier of the set of unresolved identifiers, a content item, wherein the displaying is based on the clustering of the unresolved identifiers in the graph.

US Pat. No. 10,922,334

MIXTURE MODEL BASED TIME-SERIES CLUSTERING OF CRIME DATA ACROSS SPATIAL ENTITIES

Conduent Business Service...

1. A crime analysis system comprising:at least one processor; and
a storage device communicatively coupled to said at least one processor, said storage device storing instructions which, when executed by said at least one processor, cause said at least one processor to perform operations comprising:
receiving information provided by at least one data collection source;
storing said information, wherein said stored information is formatted;
processing said information to generate crime clustering data associated with at least one region and at least one crime, wherein said processing of said information to generate crime clustering data associated with said at least one region and said at least one crime further comprises:
extracting features from said information;
identifying feature distribution associated with said extracted features; and
clustering said information according to feature extraction and feature distribution, wherein said clustering of said information further comprises: applying a mixture model based time-series clustering framework to said identified extracted features, wherein said mixture model based time-series clustering framework uses a set of statistical and domain-level features for clustering across spatial entities, and wherein said mixture model based time-series clustering framework handles heterogeneity in time series-data from a scheduled job according to spatial parameters and crime types;
processing said crime clustering data associated with at least one region and at least one crime to generate benchmarking of said at least one region with at least one other region;
providing crime clustering data associated with at least one region and at least one crime, and benchmarking of said at least one region with at least one other region for presentation through a user interface; and
permitting a granulating of said at least one region and said at least one other region to be adjustable according to a user preference.